Archive

Category Archives for "Networking"

Our Right to Protect Our Autonomy and Human Dignity

We are entering a new world in which data may be more important than software.”
– Tim O’Reilly

In this digital era where modern technology has become as ubiquitous as air, a seismic shift in innovation, revenue generation, and lifestyle has transpired, whereby data has become the most valuable commodity. In Australia, many youths struggle to “disconnect” completely from digital devices, with the proliferation of wearable technologies and broadband access facilitating the unavoidable integration of technology into our everyday lives. As a 21st century youth, and part of the demographic who consumes the most Internet and digital media, there exists a stark disparity between the amount of time we spend engaging with digital devices and our actual understanding of Internet governance and/or legislation.

We have become so reliant on the Internet and technology, we rarely question the personal risks we take and potential breaches of law that occur. Our dependence on digital devices and instant gratification prompts us to accept “Terms and Conditions” without ever reading a word and allows cookies to be saved despite having no idea what they are. Alarmingly, in the event our data is exploited or shared without our consent, we are oblivious to the Continue reading

BrandPost: Choosing Cybersecurity Products

Cybercrime damage is projected to reach $6 trillion annually by 2021. That’s creating lots of demand for security protection—estimated at over $1 trillion cumulatively between 2017 and 2021. As a result, an estimated 1,200 vendors are competing to provide enterprise-class cybersecurity products, so how do you go about choosing which solution to use?There’s no doubt, cyberthreats are real—according to the Online Trust Alliance (OTA), the number of cyber incidents targeting businesses almost doubled from 82,000 in 2016 to 159,700 in 2017, and due to non-reporting of many incidents, the actual number for 2017 could well have exceeded 360,000.To read this article in full, please click here

The correct levels of backup save time, bandwidth, space

One of the most basic things to understand in backup and recovery is the concept of backup levels and what they mean.Without a proper understanding of what they are and how they work, companies can adopt bad practices that range from wasted bandwidth and storage to actually missing important data on their backups. Understanding these concepts is also crucial when selecting new data-protection products or services.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Full backupTo read this article in full, please click here

What to expect when the Internet gets a big security upgrade

Ready or not, the upgrade to an important Internet security operation may soon be launched.  Then again, it might not.The Internet Corporation for Assigned Names and Numbers (ICANN) will meet the week of September 17 and will likely decide whether or not to give the go ahead on its multi-year project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol – commonly known as the root zone key signing key (KSK) –  which secures the Internet's foundational servers.RELATED: Firewall face-off for the enterprise Changing these keys and making them stronger is an essential security step, in much the same way that regularly changing passwords is considered a practical habit by any Internet  user, ICANN says. The update will help prevent certain nefarious activities such as attackers taking control of a session and directing users to a site that for example might steal their personal information.To read this article in full, please click here

What to expect when the internet gets a big security upgrade

Ready or not, the upgrade to an important internet security operation may soon be launched. Then again, it might not.The Internet Corporation for Assigned Names and Numbers (ICANN) will meet the week of Sept. 17 and will likely decide whether or not to give the go ahead on its multi-year project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol — commonly known as the root zone key signing key (KSK) — which secures the Internet's foundational servers.[ RELATED: Firewall face-off for the enterprise ] Changing these keys and making them stronger is an essential security step, in much the same way that regularly changing passwords is considered a practical habit by any Internet user, ICANN says. The update will help prevent certain nefarious activities such as attackers taking control of a session and directing users to a site that for example might steal their personal information.To read this article in full, please click here

What to expect when the internet gets a big security upgrade

Ready or not, the upgrade to an important internet security operation may soon be launched. Then again, it might not.The Internet Corporation for Assigned Names and Numbers (ICANN) will meet the week of Sept. 17 and will likely decide whether or not to give the go ahead on its multi-year project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol — commonly known as the root zone key signing key (KSK) — which secures the Internet's foundational servers.[ RELATED: Firewall face-off for the enterprise ] Changing these keys and making them stronger is an essential security step, in much the same way that regularly changing passwords is considered a practical habit by any Internet user, ICANN says. The update will help prevent certain nefarious activities such as attackers taking control of a session and directing users to a site that for example might steal their personal information.To read this article in full, please click here

What to expect when the internet gets a big security upgrade

Ready or not, the upgrade to an important internet security operation may soon be launched. Then again, it might not.The Internet Corporation for Assigned Names and Numbers (ICANN) will meet the week of Sept. 17 and will likely decide whether or not to give the go ahead on its multi-year project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol — commonly known as the root zone key signing key (KSK) — which secures the Internet's foundational servers.[ RELATED: Firewall face-off for the enterprise ] Changing these keys and making them stronger is an essential security step, in much the same way that regularly changing passwords is considered a practical habit by any Internet user, ICANN says. The update will help prevent certain nefarious activities such as attackers taking control of a session and directing users to a site that for example might steal their personal information.To read this article in full, please click here

Network Infrastructure as Code Is Nothing New

Following “if you can’t explain it, you don’t understand it” mantra I decided to use blog posts to organize my ideas while preparing my Networking Infrastructure as Code presentation for the Autumn 2018 Building Network Automation Solutions online course. Constructive feedback is highly appreciated.

Let’s start with a simple terminology question: what exactly is Infrastructure as Code that everyone is raving about? Here’s what Wikipedia has to say on the topic:

Read more ...

Taking EVPN & open networking to new heights with Broadcom Trident3 and Cumulus Linux

As highlighted in our recent press release, Cumulus Networks and Broadcom are expanding their commitment to open networking by introducing support of Cumulus Linux to the widely successful Broadcom Trident3  The Trident3-based switches will be available with Cumulus Linux in the Fall of 2018.

When Trident3 came to the market it offered a fully programming packet processing silicon as well as improved power efficiency. It’s additional benefit was a broad range of scalability, starting at 200 Gbps of throughput scaling all the way up to 3.2 Tbps on a single chip.

We are thrilled to have the world’s most powerful open network operating system, Cumulus Linux, now running on this innovative Broadcom chip. I see three benefits of utilizing these two solutions in data center networking 1) Simplified EVPN, 2) Scalable VXLAN, and 3) investment protection.

  1. Simplified EVPN operations

    With the Cumulus and Trident3 EVPN implementation, teams can utilize well-understood and simple networking protocols like BGP to effortlessly build a highly scalable, layer-3-routed, underlay fabric for different address families, including IPv4, IPv6 and EVPN routes. EVPN will automatically set up neighbors, discover information, and exchange that information among nodes. With just a few lines of code, you can Continue reading

Worth Reading: Using DNS as a Single Signon

Internet-wide identity management is one of the hot issues currently — dealing with hundreds of separate usernames and passwords is insecure and unfriendly for users. Increasingly, people use their social network accounts to log into websites, which works well, but forces you to allow either Google or Facebook to track all your logins — you don’t have a lot of choice. —Vittorio Bertola @APNIC

BrandPost: Ethernet Adventures: Turning Enterprise Networking Pipedreams into Reality

Ciena Chris Sweetapple, Consultant, Managed Service Providers In the first installment of this 3-part series, we begin the story of one hero’s road to streamlined enterprise networking operations. Ciena’s Chris Sweetapple details Our Hero’s journey as he navigates the convoluted tangle of enterprise networking.Our hero, responsible for running his enterprise network, is hopelessly stuck in an enormous tangle of network complexity. He needs the best connectivity for collaboration, applications and cloud access. But he knows that the networking technology he has today won’t cope with the demands of tomorrow. The business depends on online transactions, connections to multiple data centers and real-time data. Failover, backup, load balancing and stringent security are essential.To read this article in full, please click here

We’ve Added Another CCIE Security v5.0 Technologies Course to Our Library

Log into your Members Account, or check out our online store the view or purchase Rohit Pardasani’s latest CCIE Security v5.0 Technologies video; CCIE Security V5 Technologies: ASA Firewall.

About The Course

This course is a deep dive in ASA and features of ASA firewall, and is a primary study resource for the CCIE Security v5 Lab Exam. Students looking for a thorough and well-structured learning tool will benefit from these videos, which help create a solid foundation of the concepts covered in the CCIE Security v5 Lab Exam.

In this course, we will walk you through the basics of ASA and help you dive into more practical and advanced topics. We will start by helping you understand the security levels in ASA and understand the Adaptive Security Algorithm. Then we will break down the ACL’s and objects and object-groups. We will further look at differences between ASA in router mode vs ASA in transparent mode. We will also focus on deep inspection of packets and later move on to creating virtual firewalls and running ASA in active/standby or active/active mode. Lastly, but not the least, we would focus on clustering.

Prerequisites

Basic understanding of firewalls and basic Continue reading

Low-heat radios could replace cable links in data centers

Future 5G-based wireless networking equipment and data center equipment will combine antennas and the corresponding radio guts into one microprocessor unit, researchers from the Georgia Institute of Technology say.Integrating all of the wireless elements that one needs in a radio will reduce waste heat and allow better modulation, according to the group, which has been working on a one-chip, multiple transmitter and receiver package design. Longer transmission times and better data rates will result, they say.“Within the same channel bandwidth, the proposed transmitter can transmit six- to ten-times higher data rate,” says Hua Wang, an assistant professor in Georgia Tech's School of Electrical and Computer Engineering, in a news article on the university’s website about the idea.To read this article in full, please click here

Low-heat radios could replace cable links in data centers

Future 5G-based wireless networking equipment and data center equipment will combine antennas and the corresponding radio guts into one microprocessor unit, researchers from the Georgia Institute of Technology say.Integrating all of the wireless elements that one needs in a radio will reduce waste heat and allow better modulation, according to the group, which has been working on a one-chip, multiple transmitter and receiver package design. Longer transmission times and better data rates will result, they say.“Within the same channel bandwidth, the proposed transmitter can transmit six- to ten-times higher data rate,” says Hua Wang, an assistant professor in Georgia Tech's School of Electrical and Computer Engineering, in a news article on the university’s website about the idea.To read this article in full, please click here