Got this response to my Stretched Layer-2 Revisited blog post. It’s too good not to turn it into a blog post ;)
Recently I feel like it's really vendors pushing layer 2 solutions, rather than us (enterprise customer) demanding it.
I had that feeling for years. Yes, there are environment with legacy challenges (running COBOL applications on OS/370 with emulated TN3270 terminals comes to mind), but in most cases it’s the vendors trying to peddle unique high-priced non-interoperable warez.
Read more ...Following concerns from Senator Marco Rubio that American companies are not using their repatriated cash to invest in the American worker, we looked into what seven tech companies are planning to do with the billions they brought back.
What: Attend a half-day lecture and lab designed to get you started with Micro-segmentation and Multi-Site Cloud Networking (Disaster Recovery).
Why: Not only will you get a business and technical overview of NSX Data Center, you’ll also receive hands-on experience with the products. We’ll make sure you leave knowing how NSX can help secure and extend your network across multiple sites, and into the cloud.
Exploitation of Rowhammer attack just got easier. Dubbed ‘Throwhammer,’ the newly discovered technique could allow attackers to launch Rowhammer attack on the targeted systems just by sending specially crafted packets to the vulnerable network cards over the local area network. Known since 2012, Rowhammer is a severe issue with recent generation dynamic random access memory (DRAM) chips in which repeatedly accessing a row of memory Continue reading
Under this scenario Dell would exchange its common stock, privately held by Michael Dell and Silver Lake, for shares of the company’s publicly traded VMware stock.
The contract comes as Microsoft competes against other cloud providers for a $10 billion Pentagon deal called JEDI.
The platform relies on Canonical's Ubuntu Core OS and Snaps application packaging system.
Today on the Packet Pushers Weekly show, we investigate how to monitor hybrid and SD-WAN.
If your WAN looks like a mix of legacy MPLS, SD-WAN, and uplinks to cloud, this is your show. Our sponsor today is LiveAction, who is going to shine a light on the hybrid and SD-WAN through monitoring and automation.
Our guest is John Smith, Founder, CTO and EVP of LiveAction.
We talk about LiveAction’s software and how it works, why it’s essential to have visibility into your hybrid WAN and SD-WAN, and how LiveAction can provide highly visual and intuitive insights and actionable intelligence for day-to-day operations, troubleshooting, and long-term planning.
LiveAction’s Packet Pushers Resources – LiveAction
The post Show 390: Visualizing Complex SD-WAN With LiveAction (Sponsored) appeared first on Packet Pushers.
Airship will build clouds ‘where absolutely everything is a container from the bare metal up.’
Red Hat enhances its virtualization game; HPE releases AI and ML suite for telcos; CA Technologies gets stamp of approval from U.S. Department of Defense.
The Atlanta-based firm expects to add new data centers by year-end to support multi-access edge computing and cloud services.
Dustin Phillips, Co-Executive Director of ICANNWiki, is traveling across the United States in his red Toyota Corolla, making connections with the people who are making their communities – and the Internet – a better place. While making his way to the Bay Area from Portland, Oregon, he took a slight detour.
On my way down to the Bay Area from Portland, I made a trip through the Redwood National and State Parks of Northern California. These Coastal Redwoods have existed for over 20 million years and individual trees can live over 2,000 years. What makes these ancient giants so resilient?
They find strength in community.
Redwoods grow in groves, or “communities,” where the roots only go down 10-13 feet (3-4 m) before spreading outward 60-80 feet (20-27 m). In this phenomenon, survival is dependent on interconnection, meaning the roots intertwine and fuse with each other to provide resiliency against the threats of nature and share the resources necessary to thrive.
This lesson from the redwoods is directly applicable to the Internet. The “network of networks” would be nothing without interconnection or the shared resources of open standards and protocols. Expanding wider, not deeper, is essential to the resilience Continue reading
Peyton Maynard-Koran was the keynote speaker at InteropITX this year. If you want to catch the video, check this out:
Readers of my blog my remember that Peyton and I don’t see eye-to-eye on a few things. Last year I even wrote up some thoughts about vendors and VARs that were a direct counterpoint to many of the things that have been said. It has even gone further with a post from Greg Ferro (@EtherealMind) about the intelligence level of the average enterprise IT customer. I want to take a few moments and explore one piece of this puzzle that keeps being brought up: You.
You are a critical piece of the IT puzzle. Why? You’re a thinking person. You can intuit facts and extrapolate cause from nothing. You are NI – natural intelligence. There’s an entire industry of programmers chasing what you have. They are trying to build it into everything that blinks or runs code. The first time that any company has a real breakthrough in true artificial intelligence (AI) beyond complicated regression models will be a watershed day for us all.
However, you are also the problem. You have requirements. You need a Continue reading
Whether you’ve just started your CCIE training journey, or are already several months along, an INE bootcamp can help get you to where you need to be before taking the CCIE Written or lab exam. This blogpost is for anyone who may be interested in attending a CCIE Security bootcamp but is hesitant to dive in. Keep reading to find out what a bootcamp is and what you should expect when attending a CCIE Security Bootcamp with INE.
What is a Bootcamp?
Bootcamps are intensive, live classes that typically last from 5-7 days. Bootcamps allow you to dive further into your study path in a small classroom environment with an in-person, expert INE instructor leading the way. Each bootcamp class will cover a specific list of topics tailored to the Cisco track and certification level you are studying. Our instructors will customize the training to focus on certain topics and technologies that best meet the individual requests of the students in your bootcamp.
What to expect: Instructor’s Point of View
In this short video, our CCIE Security instructor, Rohit Pardasani, explains what topics he typically covers in a bootcamp and what the environment is like.
What to Continue reading
Cyber-bullying is a growing phenomenon amongst preteens. Studies have established that nearly 43% of children are victims of cyberbullying and girls are twice as likely to be targeted. Students who experienced cyber attacks suffer drops in school grades and have more suicidal thoughts than those who had never dealt with such forms of peer aggression. A link between cyber harassment victimization and noncompletion of school has been demonstrated resulting in increased risk of poor education and substance abuse in adulthood.
Sadly, the majority of the victims do not report the incidents to adults or authorities due to fear of negative effects and social scandal. The tacit support given to the bullying perpetrators through silence contributes to the escalation of victimization. Banning technology is not the answer. Cyberbullying prevention in schools is crucial to defend students from this new face of violence.
The Internet Society Palestine Chapter is conducting a campaign to raise awareness about the dangers of electronic blackmail and cyber harassment. The project, funded by the Internet Society Beyond the Net, has already reached more than 2250 schoolgirls in 25 Palestinian schools in phase I of the project.
Ahmad Alsadeh, assistant professor at Birzeit University and Continue reading