Is outdated IT equipment piling up in your server room? Here are tips for recycling old tech and reducing your data center footprint.
CenturyLink tracks botnets and the C2 servers they communicate with to thwart distributed denial of service attacks.
One in four organizations using public cloud has had their data stolen, according to McAfee’s latest cloud security report.
2018 is a particularly good time to be in the disaggregated networking business. Truth is, it’s never been better – either for the vendors or for the enterprise network managers themselves. The market for network innovation has finally sorted itself out after a long wander through the desert of academic SDN piety, and the hardware that disaggregated Linux-based NOS software runs on is now world class – same ASICs and hardware the legacy guys use, probably even the same power cords if you look close enough.
So where does Trader Joe’s – a highly successful retail food store innovator in the US – possibly come into this equation? Two words: value proposition. While white box NOS vendors like Pica8 did not deliberately set out to emulate the basic business values of Trader Joe’s, it turns out that, well, we basically did. The mapping is eerily similar.
Higher quality at lower cost? Check.
A focus on service and responsiveness? Double check.
Using the same product sources as their larger competitors but without brand-name labels? Triple check.
And, finally, having absolutely everything you need to make a great meal/network without burying you under unnecessary options that make your head spin? Quadruple Continue reading
2018 is a particularly good time to be in the disaggregated networking business. Truth is, it’s never been better – either for the vendors or for the enterprise network managers themselves. The market for network innovation has finally sorted itself out after a long wander through the desert of academic SDN piety, and the hardware that disaggregated Linux-based NOS software runs on is now world class – same ASICs and hardware the legacy guys use, probably even the same power cords if you look close enough.
So where does Trader Joe’s – a highly successful retail food store innovator in the US – possibly come into this equation? Two words: value proposition. While white box NOS vendors like Pica8 did not deliberately set out to emulate the basic business values of Trader Joe’s, it turns out that, well, we basically did. The mapping is eerily similar.
Higher quality at lower cost? Check.
A focus on service and responsiveness? Double check.
Using the same product sources as their larger competitors but without brand-name labels? Triple check.
And, finally, having absolutely everything you need to make a great meal/network without burying you under unnecessary options that make your head spin? Quadruple Continue reading
This post is inspired by a very good blog post from one of my colleague in the US, which I really appreciated as I was a newcomer to the company. It was great to see what it is like working for Cloudflare after one year and to learn from the lessons she had learnt.
I'll try to do the same in three parts. Beginning with how my on-boarding went, my first customer experiences and finally what is my day-to-day life at Cloudflare. These writings only reflect my personal feelings and thoughts. The experience is different for each and every newcomer to Cloudflare.
Before I joined Cloudflare, I was working as a Security Consultant in Paris, France. I never had the opportunity to move abroad to speak English (me.englishLevel = 0
), I never had any reason to live outside of France and was at the same time looking for another Job. Perfect then!
When I saw the job posting, I immediately applied as I knew the company well, the mindset and the products Cloudflare provided. It took me 6 months to get the offer probably because Continue reading
Qualcomm has been caught in the crossfire between the U.S. and China, and it's impacting the company's ability to close on its NXP purchase.
The integration provides Cloud Foundry with access to the world's No. 3 cloud provider and China-based enterprises.
While the overall storage market experiences slow growth, software-defined storage is driving significant shifts in revenue. We selected six companies that are pushing the market forward.
Wouldn’t it be nice if you could trust that your device is secure, so that it isn’t leaking your private data, becoming a bot and attacking other users, or putting you at risk?
We think so too.
By using their buying power to influence the market, combined with forward-looking, smart policies and regulations, governments can help build an Internet of Things (IoT) we can trust. With over ten billion IoT devices, applications, and services already in use, and the number of connected devices forecasted to jump to over thirty-eight billion by 2020, ensuring that governments take the right actions now around IoT security is critical.
Governments have important choices to make now to help ensure that IoT consumers are secure, innovation can flourish, and we can all fully benefit from IoT.
We are pleased to release IoT Security for Policymakers, a discussion paper to help provide a solid foundation for policymakers and regulators as they address IoT security. In the paper, we highlight key issues and challenges of IoT security, along with guiding principles and recommendations. While many of IoT’s challenges are technical, some of the most pressing are social, economic, or legal. There are countless consumers with little Continue reading
Today on the Priority Queue, some practical Python for network engineers.
My guest is Billy Downing, and we walk through an example of how to use Python to deploy BFD, or Bidirectional Forwarding Detection.
We start by describing BFD and how it works, and then explore how to use Python to make it go in your network.
Billy is a data center engineer who works for the Department of Defense. Check out his blog at NetworkTechStudy.com.
NetworkTechStudy.com – Billy Downing’s blog
Learning Python from a Network Engineer’s Perspective – NetworkTechStudy.com
The post PQ 146: Practical Python For Deploying BFD appeared first on Packet Pushers.