Archive

Category Archives for "Networking"

IDG Contributor Network: 3 generations of secure SD-WAN services

You simply can’t take advantage of all that SD-WAN has to offer without giving branch offices local Internet access and you can’t give them local Internet access without securing them. SD-WAN for all its strengths does not provide robust edge security. Yes, data is encrypted in transit. And, yes, some SD-WAN appliances come with basic stateful firewalling capabilities. But with attacks coming at layer-7, branches require a next-generation firewall (NGFW) and updated IPS/IDS capabilities to protect locations —  not a basic firewall. For all intents and purposes, branch SD-WAN needs layer-7 security, which is why you see so many SD-WAN vendors striking partnerships with security vendors or some building security into their appliances.To read this article in full, please click here

History Of Networking – Geoff Houston – BGP Security

Recent history tells us that even after decades of pervasive use, BGP is far from a fully secure protocol. In this episode of History of Networking on Network Collective, Geoff Houston joins us to talk about how we got here and why previous attempts at BGP security have fallen by the wayside.

 

Geoff Houston
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Geoff Houston – BGP Security appeared first on Network Collective.

Datanauts 133: Perfecting The Job Hunt

Whether by choice or circumstance, it’s inevitable you’ll find yourself looking for a new job.

On today’s Datanauts episode we break down the job hunt process to help you understand what you want, what you have to offer, and how to make the most of your application.

Our guest is Doug Lane, a tech/ops professional who’s been working in IT for 25 years. He’s also recently gone through the process of finding and getting a new job.  You can follow him on Twitter at @debuggist.

Doug shares his experiences and tips about how he approached the job search. We start by talking about honestly understanding your own strengths and weaknesses, and then thinking about what kind of job it is you really want.

We also discuss how to evaluate job descriptions, and how to nail the application process.

The post Datanauts 133: Perfecting The Job Hunt appeared first on Packet Pushers.

Cavium launches ThunderX2 ARM-based server processors

Cavium this week announced general availability of ThunderX2, its second-generation 64-bit, ARM-based system-on-a-chip (SoC) line of server processors. And it’s coming with some big-name endorsements.The first generation, ThunderX, had a more muted launch two years ago. No one wanted to get on Intel’s bad side, it seemed, and Intel was viewing ARM, not AMD, as its biggest threat. Fast forward two years, and Cavium has endorsements from HPE, Cray, and Atos, as well as HPC users such as Sandia National Labs and the U.K.’s GW4 Isambard project.Cavium announced ThunderX2 almost two years ago. It’s not an upgrade to ThunderX; it’s a whole new chip. It acquired a line of ARM server processors code-named Vulcan from Broadcom after the company was acquired by Avago and decided to shed its data center effort.To read this article in full, please click here

DNA Tests Raise Privacy Questions

The news was amazing: Police in California used DNA evidence collected decades ago to identify the suspected Golden State Killer, a serial killer and rapist active between the mid-‘70s and mid-‘80s.
Investigators from the Sacramento County Sheriff’s Department entered the old DNA into online genealogical database GEDmatch and were able to zero in on suspect Joseph James DeAngelo Jr. by linking the DNA sample to relatives in the database.

A suspected serial killer won’t generate much sympathy from the public, but privacy advocates say the case raises a series of difficult questions about uses of DNA.

The Golden State Killer “was absolutely evil,” said Pam Dixon, executive director of the World Privacy Forum. “We can all definitely agree that serial killers should be taken off the street.”

Still, Dixon and other privacy advocates wonder about the repercussions of the case. “There is no privacy right that I know of in regard to this kind of linking,” she said.

Among the major questions:

  • What court approvals should police get before searching DNA databases?
  • Should police be able to use DNA from distant relatives to track down criminals?
  • And how long should DNA evidence be searchable?

These are difficult questions, but Continue reading

IDG Contributor Network: IoT sensors, advanced ESRI mapping and Alexa warn residents of impending floods

Scott Pruitt, EPA Administrator’s assertion that “global warming might be beneficial” may be reassuring to some, but others living close to the coast prefer the safety of an early warning when they might be flooded from rising sea levels.Predicting floods from storm surges, rain, hurricanes and tides over miles of coastline is hard. How do your monitor water levels over such a broad area? How can floods be predicted with these data streams? How can thousands of people be alerted?  The Virginia Institute of Marine Science (VIMS) is pioneering an innovative approach that combines IoT sensors, advanced mapping and Alexa.To read this article in full, please click here

IDG Contributor Network: 7 common cloud data management pitfalls to avoid

There are many compelling reasons to migrate applications and workloads to the cloud, from scalability to easy maintenance, but moving data is never without risk. When IT systems or applications go down it can prove incredibly costly for businesses. A single hour of downtime costs over $100,000 according to 98% of organizations surveyed by ITIC.Mistakes are easy to make in the rush to compete. There’s a lot that can go wrong, particularly if you don’t plan properly.“Through 2022, at least 95% of cloud security failures will be the customer’s fault,” says Jay Heiser, research vice president at Gartner.To read this article in full, please click here

Why Content Providers don’t like Access Service Providers

Why Content Providers (Over the Top) don’t like Access Service Providers ?   Probably title of this post could be a ‘ Power of Access Providers ‘ or better ,  should be ‘ Why Some Content Providers don’t like Some Access Service Providers’. You will understand the reasons at the end of the post I promise.   […]

The post Why Content Providers don’t like Access Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Why Content Providers don’t like Access Service Providers

Why Content Providers (Over the Top) don’t like Access Service Providers ?   Probably title of this post could be a ‘ Power of Access Providers ‘ or better ,  should be ‘ Why Some Content Providers don’t like Some Access Service Providers’. You will understand the reasons at the end of the post I promise.   …

The post Why Content Providers don’t like Access Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Why Content Providers don’t like Access Service Providers

Why Content Providers (Over the Top) don’t like Access Service Providers ?   Probably title of this post could be a ‘ Power of Access Providers ‘ or better ,  should be ‘ Why Some Content Providers don’t like Some Access Service Providers’. You will understand the reasons at the end of the post I promise.   …

The post Why Content Providers don’t like Access Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Autumn 2018 Network Automation Course Starts on September 18th

When the Spring 2018 Building Network Automation Solutions online course started, we didn’t know whether we’d run another course in 2018, so we offered engineers who wanted to get an early start Believer price.

The wait is over: the autumn 2018 course starts on September 18th. The schedule of the live sessions is already online, and we also have the first guest speakers. We’ll announce them in early June at which time you will no longer be able to get the Enthusiast price, so register ASAP.