Archive

Category Archives for "Networking"

Cisco, Arista settle lawsuit, refocus battle on network, data center, switching arenas

After nearly four years of slashing at each other in court with legal swords Cisco and Arista have agreed to disagree, mostly.To settle the litigation mêlée, Arista has agreed to pay Cisco $400 million, which will result in the dismissal of all pending district court and International Trade Commission litigation between the two companies.  [ Related: How to plan a software-defined data-center network ] For Arista the agreement should finally end any customer fear, uncertainty and doubt caused by the lawsuit.  In fact Zacks Equity Research wrote the settlement is likely to immensely benefit Arista.To read this article in full, please click here

Cisco, Arista settle lawsuit, refocus battle on network, data center, switching arenas

After nearly four years of slashing at each other in court with legal swords Cisco and Arista have agreed to disagree, mostly.To settle the litigation mêlée, Arista has agreed to pay Cisco $400 million, which will result in the dismissal of all pending district court and International Trade Commission litigation between the two companies.  [ Related: How to plan a software-defined data-center network ] For Arista the agreement should finally end any customer fear, uncertainty and doubt caused by the lawsuit.  In fact Zacks Equity Research wrote the settlement is likely to immensely benefit Arista.To read this article in full, please click here

Cisco, Arista settle lawsuit, refocus battle on network, data center, switching arenas

After nearly four years of slashing at each other in court with legal swords Cisco and Arista have agreed to disagree, mostly.To settle the litigation mêlée, Arista has agreed to pay Cisco $400 million, which will result in the dismissal of all pending district court and International Trade Commission litigation between the two companies.  [ Related: How to plan a software-defined data-center network ] For Arista the agreement should finally end any customer fear, uncertainty and doubt caused by the lawsuit.  In fact Zacks Equity Research wrote the settlement is likely to immensely benefit Arista.To read this article in full, please click here

Mist, VMware VeloCloud Partner On WLAN And WAN Visibility

WLAN vendor Mist has announced a partnership with VMware’s VeloCloud SD-WAN solution, in which Mist can interoperate with VeloCloud to improve visibility into, and troubleshooting of, wireless and WAN performance. Mist provides a cloud-based wireless controller and administrative interface for its APs. This cloud controller can make API calls to VeloCloud’s controller to ingest WAN […]

BrandPost: Ciena Completes Acquisition of Packet Design

Ciena Rick Hamilton, Senior Vice President, Global Software and Services Ciena has officially completed the acquisition of Packet Design. Rick Hamilton, SVP of Global Software and Services at Ciena, details how the integration of these new capabilities into our Blue Planet portfolio will help our customers in their path to the Adaptive Network.Today I had the privilege of welcoming the Packet Design team into the Ciena family, following our May 31 announcement to acquire the company. On July 2, we officially completed the acquisition, bringing the Packet Design network performance management software and critical IP expertise into Ciena’s industry-leading Blue Planet software portfolio.To read this article in full, please click here

EIGRP in the Service Provider Networks

EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post.       EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my […]

The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

EIGRP in the Service Provider Networks

EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post.       EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my …

The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

EIGRP in the Service Provider Networks

EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post.       EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my …

The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Enterprises should be able to sell their excess internet capacity

Peer-to-peer exchanges of excess bandwidth could one day be commonplace, says a firm that is attempting to monetize redundant internet capacity. It wants to create a marketplace for selling internet data throughput that has been already bought by organizations, but which is often dormant during out-of-work hours — the bandwidth is customarily just lying around then, not being used.Dove Network wants to “do to the telecom industry what Airbnb did to the hotel industry,” co-founder Douglas Schwartz told me via email.The idea is that those with excess data capacity, such as a well-provisioned office or data center, which may not be using all of its throughput capacity all of the time — such as during the weekend — allocates that spare bandwidth to Dove’s network. Passing-by data-users, such as Internet of Things-based sensors or an individual going about business, would then grab the data it, he, or she needs; payment is then handled seamlessly through blockchain smart contracts.To read this article in full, please click here

Enterprises should be able to sell their excess internet capacity

Peer-to-peer exchanges of excess bandwidth could one day be commonplace, says a firm that is attempting to monetize redundant internet capacity. It wants to create a marketplace for selling internet data throughput that has been already bought by organizations, but which is often dormant during out-of-work hours — the bandwidth is customarily just lying around then, not being used.Dove Network wants to “do to the telecom industry what Airbnb did to the hotel industry,” co-founder Douglas Schwartz told me via email.The idea is that those with excess data capacity, such as a well-provisioned office or data center, which may not be using all of its throughput capacity all of the time — such as during the weekend — allocates that spare bandwidth to Dove’s network. Passing-by data-users, such as Internet of Things-based sensors or an individual going about business, would then grab the data it, he, or she needs; payment is then handled seamlessly through blockchain smart contracts.To read this article in full, please click here

Tech Companies Endorse MANRS Routing Security Actions

A coalition of more than 40 companies focused on protecting online users has endorsed a global community initiative, coordinated by the Internet Society, to improve the security of the Internet’s routing system.

The Cybersecurity Tech Accord, whose members include Facebook, Microsoft, Oracle, and Hewlett Packard Enterprise, will support the Mutually Agreed Norms for Routing Security (MANRS) initiative.

The goal of MANRS is to ensure a secure and resilient Internet by protecting its routing infrastructure. In 2017 alone, more than 14,000 routing outages or attacks – such as hijacking, leaks, or spoofing – resulted in stolen data, lost revenue, and reputational damage.

“The new endorsement is a good first step,” said Salam Yamout, Internet Society Lead for the MANRS initiative.

“It is not enough to talk about routing security; it is time for action,” Yamout added. “Because the Internet’s routing system was built on the principles of collaboration and shared responsibility, this endorsement from the Cybersecurity Tech Accord and our new partnership is a major step forward. It clearly reflects the will of industry to be proactive in implementing safe routing practices.”

MANRS focuses on four defensive actions that can reduce the most common routing threats: