Archive

Category Archives for "Networking"

Show 390: Visualizing Complex SD-WAN With LiveAction (Sponsored)

Today on the Packet Pushers Weekly show, we investigate how to monitor hybrid and SD-WAN.

If your WAN looks like a mix of legacy MPLS, SD-WAN, and uplinks to cloud, this is your show. Our sponsor today is LiveAction, who is going to shine a light on the hybrid and SD-WAN through monitoring and automation.

Our guest is John Smith, Founder, CTO and EVP of LiveAction.

We talk about LiveAction’s software and how it works, why it’s essential to have visibility into your hybrid WAN and SD-WAN, and how LiveAction can provide highly visual and intuitive insights and actionable intelligence for day-to-day operations, troubleshooting, and long-term planning.

Show Links:

LiveAction’s Packet Pushers Resources – LiveAction

LiveAction on Facebook

LiveAction on Twitter

LiveAction on LinkedIn

LiveAction on YouTube

LiveAction on Google+

The post Show 390: Visualizing Complex SD-WAN With LiveAction (Sponsored) appeared first on Packet Pushers.

Dustin’s Internet Community Roadtrip: In the Bay Area, What Redwoods Can Teach Us About the Internet

Dustin Phillips, Co-Executive Director of ICANNWiki, is traveling across the United States in his red Toyota Corolla, making connections with the people who are making their communities – and the Internet – a better place. While making his way to the Bay Area from Portland, Oregon, he took a slight detour.

On my way down to the Bay Area from Portland, I made a trip through the Redwood National and State Parks of Northern California. These Coastal Redwoods have existed for over 20 million years and individual trees can live over 2,000 years. What makes these ancient giants so resilient?

They find strength in community.

Redwoods grow in groves, or “communities,” where the roots only go down 10-13 feet (3-4 m) before spreading outward 60-80 feet (20-27 m). In this phenomenon, survival is dependent on interconnection, meaning the roots intertwine and fuse with each other to provide resiliency against the threats of nature and share the resources necessary to thrive.

This lesson from the redwoods is directly applicable to the Internet. The “network of networks” would be nothing without interconnection or the shared resources of open standards and protocols. Expanding wider, not deeper, is essential to the resilience Continue reading

Is Training The Enemy of Progress?

Peyton Maynard-Koran was the keynote speaker at InteropITX this year. If you want to catch the video, check this out:

Readers of my blog my remember that Peyton and I don’t see eye-to-eye on a few things. Last year I even wrote up some thoughts about vendors and VARs that were a direct counterpoint to many of the things that have been said. It has even gone further with a post from Greg Ferro (@EtherealMind) about the intelligence level of the average enterprise IT customer. I want to take a few moments and explore one piece of this puzzle that keeps being brought up: You.

Protein Robots

You are a critical piece of the IT puzzle. Why? You’re a thinking person. You can intuit facts and extrapolate cause from nothing. You are NI – natural intelligence. There’s an entire industry of programmers chasing what you have. They are trying to build it into everything that blinks or runs code. The first time that any company has a real breakthrough in true artificial intelligence (AI) beyond complicated regression models will be a watershed day for us all.

However, you are also the problem. You have requirements. You need a Continue reading

What to Expect: CCIE Security Written Exam Bootcamp

Whether you’ve just started your CCIE training journey, or are already several months along, an INE bootcamp can help get you to where you need to be before taking the CCIE Written or lab exam. This blogpost is for anyone who may be interested in attending a CCIE Security bootcamp but is hesitant to dive in. Keep reading to find out what a bootcamp is and what you should expect when attending a CCIE Security Bootcamp with INE.

What is a Bootcamp?
Bootcamps are intensive, live classes that typically last from 5-7 days. Bootcamps allow you to dive further into your study path in a small classroom environment with an in-person, expert INE instructor leading the way. Each bootcamp class will cover a specific list of topics tailored to the Cisco track and certification level you are studying. Our instructors will customize the training to focus on certain topics and technologies that best meet the individual requests of the students in your bootcamp.

What to expect: Instructor’s Point of View
In this short video, our CCIE Security instructor, Rohit Pardasani, explains what topics he typically covers in a bootcamp and what the environment is like.

 

 

 
What to Continue reading

Digital Self-Defense for Palestinian Schoolgirls

Cyber-bullying is a growing phenomenon amongst preteens. Studies have established that nearly 43% of children are victims of cyberbullying and girls are twice as likely to be targeted. Students who experienced cyber attacks suffer drops in school grades and have more suicidal thoughts than those who had never dealt with such forms of peer aggression. A link between cyber harassment victimization and noncompletion of school has been demonstrated resulting in increased risk of poor education and substance abuse in adulthood.

Sadly, the majority of the victims do not report the incidents to adults or authorities due to fear of negative effects and social scandal. The tacit support given to the bullying perpetrators through silence contributes to the escalation of victimization. Banning technology is not the answer. Cyberbullying prevention in schools is crucial to defend students from this new face of violence.

The Internet Society Palestine Chapter is conducting a campaign to raise awareness about the dangers of electronic blackmail and cyber harassment. The project, funded by the Internet Society Beyond the Net, has already reached more than 2250 schoolgirls in 25 Palestinian schools in phase I of the project.

 

Ahmad Alsadeh, assistant professor at Birzeit University and Continue reading

Why NVMe over Fabric matters

In my earlier blog post on SSD storage news from HPE, Hitachi and IBM, I touched on the significance of NVMe over Fabric (NoF). But not wanting to distract from the main storage, I didn’t go into detail. I will do so with this blog post.Hitachi Vantara goes all in on NVMe over Fabric First, though, an update on the news from Hitachi Vantara, which I initially said had not commented yet on NoF. It turns out they are all in.“Hitachi Vantara currently offers, and continues to expand support for, NVMe in our hyperconverged UCP HC line. As NVMe matures over the next year, we see opportunities to introduce NVMe into new software-defined and enterprise storage solutions. More will follow, but it confuses the conversation to pre-announce things that customers cannot implement today,” said Bob Madaio, vice president, Infrastructure Solutions Group at Hitachi Vantara, in an email to me.To read this article in full, please click here

Access management is critical to IoT success

Onboarding devices has always been kind of a pain, but IT has managed to muddle its way through the process.The bring your own device (BYOD) wave hit created some problems. Still, many organizations allowed employees to bring those devices onto the network by shifting the responsibility to the end user. What happens, though, when there are so many new devices that IT can’t keep up? Or when devices are brought in without IT’s knowledge? That’s the trend businesses are about to face as the Internet of Things (IoT) goes mainstream.[ Read also: Network World's Corporate Guide to Addressing IoT Security. ] The IoT era is here, and it’s about to make IT’s life a lot more difficult The IoT era has arrived, and I say this because more and more companies I talk to are connecting non-traditional IT devices, such as lighting systems and point-of-sale devices, to the internet without uttering the phrase “IoT.” It’s no longer this futuristic thing that we ponder and pontificate over.To read this article in full, please click here

Access management is critical to IoT success

Onboarding devices has always been kind of a pain, but IT has managed to muddle its way through the process.The bring your own device (BYOD) wave hit created some problems. Still, many organizations allowed employees to bring those devices onto the network by shifting the responsibility to the end user. What happens, though, when there are so many new devices that IT can’t keep up? Or when devices are brought in without IT’s knowledge? That’s the trend businesses are about to face as the Internet of Things (IoT) goes mainstream.[ Read also: Network World's Corporate Guide to Addressing IoT Security. ] The IoT era is here, and it’s about to make IT’s life a lot more difficult The IoT era has arrived, and I say this because more and more companies I talk to are connecting non-traditional IT devices, such as lighting systems and point-of-sale devices, to the internet without uttering the phrase “IoT.” It’s no longer this futuristic thing that we ponder and pontificate over.To read this article in full, please click here