Archive

Category Archives for "Networking"

NetQ agent on a host

We all know and love NetQ – it works hand-in-hand with Linux to accelerate data center operations. Customers love how easy it is to install and operate which makes their lives easier. Also, it can prevent and find issues in a data center by viewing the entire data center as a whole and providing three different types of services:

  • Preventative: NetQ allows an engineer to check all data center configurations and state in a few steps from any location in the network. The validation can be done on a virtual network using vagrant with Cumulus VX or if a virtual environment is not available, it can also be used during an change outage window. Since NetQ has built in analyzers of the network as a whole, no scripting is required and the validation is done from one location, rather than hop by hop. It can also shorten outage windows needed for network changes allowing shorter outage windows virtually or during outage windows.
  • Proactive: NetQ supplies notifications if something goes wrong in the network by either logging it to a file or integrating with third party applications like Slack, PagerDuty, or Splunk. It can also be filtered to ensure the right Continue reading

Watch Live – DNSSEC Workshop on October 24 at ICANN 63 in Barcelona

ICANN 63 banner image

What can we learn from recent success of the Root KSK Rollover? What is the status of DNSSEC deployment in parts of Europe – and what lessons have been learned? How can we increase the automation of the DNSSEC “chain of trust”? And what new things are people doing with DANE?

All these topics and more will be discussed at the DNSSEC Workshop at the ICANN 63 meeting in Barcelona, Spain, on Wednesday, October 24, 2018. The session will begin at 9:00 and conclude at 15:00 CEST (UTC+2).

The agenda includes:

  • DNSSEC Workshop Introduction, Program, Deployment Around the World – Counts, Counts, Counts
  • Panel: DNSSEC Activities
    • Includes presenters from these TLDs: .DK, .DE, .CH, .UK, .SE, .IT, .ES, .CZ
  • Report on the Execution of the .BR Algorithm Rollover
  • Panel: Automating Update of DS records
  • Panel: Post KSK Roll? Plan for the Next KSK Roll?
  • DANE usage and use cases
  • DNSSEC – How Can I Help?

It should be an outstanding session!  For those onsite, the workshop will be room 113.

 

  • More info and slides are available from these URLs (ICANN’s online schedule system breaks it up into sections based on breaks and lunch):

IDG Contributor Network: Self-healing SD-WAN removes the drama of high-availability planning

My humble beginnings Back in the early 2000s, I was the sole network engineer at a startup. By morning, my role included managing four floors and 22 European locations packed with different vendors and servers between three companies. In the evenings, I administered the largest enterprise streaming networking in Europe with a group of highly skilled staff.Since we were an early startup, combined roles were the norm. I’m sure that most of you who joined as young engineers in such situations could understand how I felt back then. However, it was a good experience, so I battled through it. To keep my evening’s stress-free and without any IT calls, I had to design in as much high-availability (HA) as I possibly could. After all, all the interesting technological learning was in the second part of my day working with content delivery mechanisms and complex routing.To read this article in full, please click here

IDG Contributor Network: Self-healing SD-WAN removes the drama of high-availability planning

My humble beginnings Back in the early 2000s, I was the sole network engineer at a startup. By morning, my role included managing four floors and 22 European locations packed with different vendors and servers between three companies. In the evenings, I administered the largest enterprise streaming networking in Europe with a group of highly skilled staff.Since we were an early startup, combined roles were the norm. I’m sure that most of you who joined as young engineers in such situations could understand how I felt back then. However, it was a good experience, so I battled through it. To keep my evening’s stress-free and without any IT calls, I had to design in as much high-availability (HA) as I possibly could. After all, all the interesting technological learning was in the second part of my day working with content delivery mechanisms and complex routing.To read this article in full, please click here

Cloudflare’s network boosts security and performance for IBM Cloud customers

Cloudflare’s network boosts security and performance for IBM Cloud customers

Today our partner IBM® announced the general availability of Cloud Internet Services (CIS) Enterprise. It marks a significant step forward in the partnership that we announced at the IBM THINK event in March.

CIS delivers security and performance to IBM Cloud® customers’ internet applications. It brings together Cloudflare’s 150+ points of presence with IBM Cloud’s 60 data centers, stopping attacks before they can even reach the IBM Cloud. CIS Enterprise is integrated into IBM Cloud, allowing IBM Cloud customers to set up and manage Cloudflare’s DDoS mitigation, web application firewall, smart routing and highly customizable load balancer, all from within the IBM Cloud user interface.  

Cloudflare’s network boosts security and performance for IBM Cloud customers

Our Network Map (as of 10/18/18). Click here for the latest version

We thought it timely to give a refresher on how Cloudflare’s network supports IBM Cloud customers. The network is designed to meet requirements of the most demanding enterprise customers. It is based on an architecture that differentiates it from legacy CDN, DNS and DDoS-mitigation services to ensure that internet applications stay online, even in the face of extremely high volume attacks or legitimate traffic spikes.

Cloudflare’s network of data centers, distributed across 74 countries (including 22 in China), has a network Continue reading

Using nmap on your home network

Nmap, the "network mapper" has long been used on corporate networks to collect information on desktop systems and servers. The tool provides information on the systems and services that are running (i.e., open ports). It can also help to identify rogue systems and vulnerabilities. Nmap makes it easy to detect changes as well as new systems on the network. Typical uses include: host discovery -- probing by IP address and providing information on the systems that respond port scanning -- identifying services that are available for use version detection -- identifying applications and their versions OS detection -- determining the operating system along with some hardware characteristics Sysadmins have been installing nmap on Linux for more than 20 years. Originally released in 1997, nmap has since that time become available for Windows and other Unix variants as well. In fact, it's considered a standard security tool and is a free and open source security scanner. It's typically used in corporate settings for collecting information on systems and doing security analysis.To read this article in full, please click here

Is the IoT in space about to take off?

Space may not be the final frontier for the Internet of Things, but evidence is mounting that it could be the technology’s next golden opportunity. While we’re still a ways away from the IoT in space becoming a commercially viable mainstream technology, a variety of companies are pushing the envelope in two significant ways.First, companies are working to realize the promise of satellite-powered networks that would bring the Internet of Things everywhere on earth. Second, vendors — and NASA — are exploring actual IoT applications and use cases beyond Earth’s atmosphere, in satellites and rockets.To read this article in full, please click here

Is the IoT in space about to take off?

Space may not be the final frontier for the Internet of Things, but evidence is mounting that it could be the technology’s next golden opportunity. While we’re still a ways away from the IoT in space becoming a commercially viable mainstream technology, a variety of companies are pushing the envelope in two significant ways.First, companies are working to realize the promise of satellite-powered networks that would bring the Internet of Things everywhere on earth. Second, vendors — and NASA — are exploring actual IoT applications and use cases beyond Earth’s atmosphere, in satellites and rockets.To read this article in full, please click here

Oracle Cloud Infrastructure Is Proud to Join the Internet Society

The Internet has become the world’s most powerful tool for commerce, communication, and innovation because of a commitment from its stakeholders to work collaboratively to make it highly performant and more secure.

At Oracle Cloud Infrastructure, we take that commitment to a better Internet seriously and want to align ourselves with other organizations that share a similar vision. That is why I am so proud to announce our partnership with the Internet Society, a global non-profit organization dedicated to the open development, evolution and use of the Internet.

I have spoken previously about how highly I regard the Internet Society’s new CEO, Andrew Sullivan, but my admiration for the work being done extends throughout the organization. This is why it is important to me that our relationship with the Internet Society is more than ceremonial. We want to roll up our sleeves and get to work because there is much work to be done.

One area we feel we can help is in security. The Internet is a trust-based network of networks and it’s consistently under attack by bad actors. We believe there is simply greater strength in the collaboration of the good guys and gals. Security is a Continue reading