With VMworld Europe just around the corner, we are excited to announce that our valued partner Check Point’s product CloudGuard has met all the certification requirements for NSX-T Data Center North-South service insertion! This is the first such certification following the recent release of version 2.3. It is particularly exciting given that NSX-T is designed to connect and protect workloads running in multiple environments like public clouds and on-premises data centers, and CloudGuard for North-South traffic works at the point of connection between these networks. 
Enhancing security gateway capabilities with Check Point’s CloudGuard for traffic moving between virtual machines and external networks secures your assets and data in the cloud against even the most sophisticated threats, with multi-layered protections including: Firewall, IPS, Application Control, IPsec VPN, Antivirus, Anti-Bot, and award-winning SandBlast Threat Emulation and Threat Extraction technologies.
NSX-T Data Center was designed with the concept of service insertion top of mind, enabling users with specific needs to seamlessly add third party applications at various points throughout the network. Having a robust ecosystem of partners is key to providing maximum flexibility for NSX-T Data Center, enabling you to add partner functionality that is tailored to your unique requirements without degrading performance elsewhere in the SDDC. Partner applications are Continue reading
Time spent working on DevOps projects has opened a window into some common mistakes that organizations make when trying to deliver a true DevOps initiative.
Yves Haemmerli, Consulting IT Architect at IBM Switzerland, sent me a thoughtful response to my we need product documentation rant. Hope you’ll enjoy it as much as I did.
Yes, whatever the project is, the real added value of an IT/network architect consultant is definitely his/her ability to create models (sometimes meta-models) of what exists, and what the customer is really looking for.
Read more ...This is not a networking post.
Schematic , sensor code and spec – https://www.linuxnorth.org/raspi-sump
My code – https://github.com/yukthr/auts/blob/master/random_programs/water_sensor.py
1x Breadboard
1x Raspberry pi zero w
1xhcsr04 ultrasonic sensor
2x1kohm resistors
Just as a side note i do not have any intro into resistors nor electronics, but what all i did was to follow some posts written by people who already did it, its not hard believe me, if i could do it any one should easily be able to do it as am very far away from electronics and programming, so let these things not overwhelm you.
Problem – Am not sure in other parts of the world, but place I live has an over head water Tank which stores water. So every day you technically turn on a water motor which sucks water from a reserve under the ground and pumps it to all the the way to a three store high building
So what’s the issue – The issue is that we have no clue what’s the current water level in the tank nor how long would it take to fill the water tank. There are two tribal ways by which we Continue reading

The Working Group sessions start tomorrow at IETF 103 in Bangkok, Thailand, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. Only four days have been scheduled for the working groups this time around, which means there’s a lot of pack into each day; with Monday being no exception.
V6OPS is a key group and will be meeting on Monday morning starting at 09.00 UTC+7. It’s published four RFCs since its last meeting, including Happy Eyeballs v2, and this time will kick-off with a presentation on the CERNET2 network which is an IPv6-only research and education in China.
There’s also four drafts to be discussed, including three new ones. IPv6-Ready DNS/DNSSSEC Infrastructure recommends how DNS64 should be deployed as it modifies DNS records which in some circumstances can break DNSSEC. IPv6 Address Assignment to End-Sites obsoletes RFC 6177 with best current operational practice from RIPE-690 that makes recommendations on IPv6 prefix assignments, and reiterates that assignment policy and guidelines belong to the RIR community. Pros and Cons of IPv6 Transition Technologies for IPv4aaS discusses different use case scenarios for the five most prominent IPv4-as-a-service (IPv4aaS) transitional technologies, Continue reading
If IBM does what it says it’s going to do with the assets, then it becomes a more formidable competitor against Amazon Web Services (AWS) and Microsoft Azure.
SDxCentral Wrap for November 2, 2018. IBM Gobbles Up Red Hat for $34B in Hybrid Cloud, Container Push.
Company executives hinted about a new data center product that is slated to launch next week.
Execs didn’t say which competitors Fortinet’s security products displaced, but it competes against companies including Palo Alto Networks, Check Point Software, and Cisco.
Qualys buys Layered Insight for container-native security; Microsoft and Nasdaq partner on blockchain; Resin.io renames as balena, releases core platform.
Today's Weekly Show podcast delves into home automation, IoT, and security with guest Chris Young. We talk about Chris's experience building and running his home automation network, how to reverse-engineer undocumented APIs, and the security implications of home automation.
The post Weekly Show 414: Security Implications Of Home Automation appeared first on Packet Pushers.
What is DNSSEC? What does it do? How widely is it deployed? In a technological environment where DNS attacks are common, Russ explores why DNSSEC isn’t as widely deployed as one would hope and provides some suggestions on how to get some momentum behind this important technology.
The post Short Take – DNSSEC Deployment appeared first on Network Collective.

The Pakistan School on Internet Governance 2018 (pkSIG) took place at the Regent Plaza Hotel in Karachi from 3-6 September 2018. It offered a four day intensive learning course, covering the political, legal, economic, socio-cultural, and technological dimensions of Internet Governance within the context of the Pakistani national imperatives. The program included theoretical sessions, role play, and participant engagement activities.
One of the objectives of the seminar was to develop a shared understanding of youth participation in Internet Governance by building expertise through the alumni of the school. A fellowship opportunity was offered to young applicants from the Sindh and Baluchistan provinces who presented a strong motivation to continue to work locally on IG issues after the pkSIG.
The involvement of students and young professionals, like the ICT engineer Sohaib Bukhari, is a successful example of meaningful participation in the shaping of the Internet. They are the generation that has been using the Internet since they were children, they are the ones who will be using it for the next 50 years. Sohaib was thrilled to have an open dialogue with the key stakeholders, while gaining access to comprehensive and structured knowledge on various aspects of the Internet Governance.
So, Continue reading