Archive

Category Archives for "Networking"

One Weird Trick

I’m often asked what the trick is to become a smarter person—there are many answers, of course, which I mention in this video. But there is “one weird trick” many people don’t think about, which I focus on here.

IDG Contributor Network: Interconnection is bringing the future faster than ever

The science behind a lot of today’s newest trends is actually pretty old.John McCarthy is considered the father of AI after he coined the phrase in 1955 and then held the first academic conference on the topic the next year.The term “virtual reality” was first used in the mid-1980s, but the attempts to use electronics to develop simulated environments also reach back to the 1950s.Then, there’s the Internet of Things (IoT). It’s a hot topic now, but it’s been nearly 20 years since the phrase was introduced in 1999. And the first connected “thing” (a toaster created by John Romkey and Simon Hackett) actually debuted even earlier, in 1990.To read this article in full, please click here

IDG Contributor Network: Interconnection is bringing the future faster than ever

The science behind a lot of today’s newest trends is actually pretty old.John McCarthy is considered the father of AI after he coined the phrase in 1955 and then held the first academic conference on the topic the next year.The term “virtual reality” was first used in the mid-1980s, but the attempts to use electronics to develop simulated environments also reach back to the 1950s.Then, there’s the Internet of Things (IoT). It’s a hot topic now, but it’s been nearly 20 years since the phrase was introduced in 1999. And the first connected “thing” (a toaster created by John Romkey and Simon Hackett) actually debuted even earlier, in 1990.To read this article in full, please click here

CCIE Collaboration Blueprint Change Announced

Effective January 23, 2018 Cisco will be incorporating a new version of its CCIE Collaboration exam blueprint into both the written and lab exams. Those who are scheduled to take the CCIE Collaboration exam prior to this date will not be affected by the blueprint change.

For those who are scheduled to take the CCIE Collaboration exam on or after July 23, 2018 here are the major changes you can expect to see:

  • New segmentation of topics among exam domains
  • Removal and addition of some key topics in both the written and lab exams
  • The lab exam format will be 100% virtual with no physical technologies use

Domain Level Changes:

The v2.0 CCIE Collaboration exam will be split into 8 domains unifying the written and lab exam topics. What this means is that instead of having 9 domains in the written exam and 7 in the lab exam, candidates will be tested on topics in only 8 domains total across both exams. In version 2.0 of the CCIE Collaboration exam, instructions will explicitly state which domains pertain to which exam, and the relative weight of each domain.

 
Topics Added in v2.0:

  • Collaboration APIs
  • Cisco Expressway dial Continue reading
  • The Cyber Incident Tsunami – Time to Get Ready

    In advance of Data Privacy & Protection Day, the Online Trust Alliance, an Internet Society initiative, just released the Cyber Incident & Breach Trends Report (press release here), a look back at the cyber incident trends in 2017 and what can be done to address them. This report marks the tenth year OTA has provided guidance in this area, and while the specifics have certainly changed over time, the core principles have not.

    Originally we just looked at the number of reported breaches, but last year we broadened the definition to “cyber incidents,” which includes ransomware infections, business email compromise (BEC), distributed denial-of-service (DDoS) attacks and infiltrations caused by connected devices. This broader definition paints a more realistic picture of the threats and associated impact facing organizations today.

    This year we found that the number of cyber incidents nearly doubled to 159,700 globally, and given that most incidents are not reported, this number could easily exceed 350,000. This is more than 30 times the number of breaches alone, so provides a very different perspective on the threat landscape. As in previous years we also assessed the “avoidability” of breaches by analyzing their cause and found that 93% were avoidable, Continue reading

    Cisco HyperFlex prepares businesses for a hybrid, multi-cloud world

    It’s been a busy hyperconverged infrastructure (HCI) week for Cisco. Yesterday it announced its intent to acquire secure HCI vendor, Skyport Systems. Today it announced HyperFlex 3.0, which is the biggest update Cisco has had to the product since it introduced the product years ago. Cisco’s driving vision is a business that can run any workload on any cloud that can easily scale up as required. This latest release is entirely dedicated to fulfilling that vision.The cloud is the future, and the majority of businesses will adopt hybrid clouds. In announcing HyperFlex 3.0, Cisco cited an IDC data point that states that 87 percent of businesses are using or plan to use a hybrid environment, and 94 percent plan to use multiple clouds — meaning that hybrid, multi-clouds will be the norm.To read this article in full, please click here

    Cisco HyperFlex prepares businesses for a hybrid, multi-cloud world

    It’s been a busy hyperconverged infrastructure (HCI) week for Cisco. Yesterday it announced its intent to acquire secure HCI vendor, Skyport Systems. Today it announced HyperFlex 3.0, which is the biggest update Cisco has had to the product since it introduced the product years ago. Cisco’s driving vision is a business that can run any workload on any cloud that can easily scale up as required. This latest release is entirely dedicated to fulfilling that vision.The cloud is the future, and the majority of businesses will adopt hybrid clouds. In announcing HyperFlex 3.0, Cisco cited an IDC data point that states that 87 percent of businesses are using or plan to use a hybrid environment, and 94 percent plan to use multiple clouds — meaning that hybrid, multi-clouds will be the norm.To read this article in full, please click here

    IDG Contributor Network: Amadeus and intent-based analytics

    In one of my favorite movies of all time, Amadeus, there is a scene in which a conversation takes place between Mozart and the Holy Roman Emperor, Joseph II, just after the first performance of the opera The Marriage of Figaro. During exchange, the Emperor “explained” to Mozart, in a condescending way, that while the opera was excellent, it had “too many notes.” He went on to suggest “Just cut a few and it will be perfect.” Nonplussed, Mozart calmly replied “Which few did you have in mind your majesty?” A pregnant pause ensues, and the Emperor is only saved by a distraction which allows the change of subject. This “change request” – while it appeared on the surface trivial to the Emperor – turned out to be quite a challenge, as it required the complete knowledge of the score (state/intent) and required composition skills (design/action). So, what does this have to do with networking?To read this article in full, please click here

    IDG Contributor Network: Amadeus and intent-based analytics

    In one of my favorite movies of all time, Amadeus, there is a scene in which a conversation takes place between Mozart and the Holy Roman Emperor, Joseph II, just after the first performance of the opera The Marriage of Figaro. During exchange, the Emperor “explained” to Mozart, in a condescending way, that while the opera was excellent, it had “too many notes.” He went on to suggest “Just cut a few and it will be perfect.” Nonplussed, Mozart calmly replied “Which few did you have in mind your majesty?” A pregnant pause ensues, and the Emperor is only saved by a distraction which allows the change of subject. This “change request” – while it appeared on the surface trivial to the Emperor – turned out to be quite a challenge, as it required the complete knowledge of the score (state/intent) and required composition skills (design/action). So, what does this have to do with networking?To read this article in full, please click here

    The moving target of IoT security

    As the explosive growth of IoT tech continues; businesses, vendors and consumers all have to confront the issue that the world is more connected than ever before, with potentially gigantic consequences.The central problem with IoT security is that there is no central problem – IoT is a more complicated stack than traditional IT infrastructure and is much more likely to be made up of hardware and software from different sources.+ALSO ON NETWORK WORLD: Review: VMware’s vSAN 6.6 + Configuration errors in Intel workstations being labeled a security holeTo read this article in full, please click here