Archive

Category Archives for "Networking"

This Holiday Season, Make Sure Your Smart Toy Isn’t a Toy Soldier

In the classic holiday story The Nutcracker, toy soldiers under command of a nutcracker spring to life to fight an army of evil mice. With the growth of smart toys, armies made up of toy “soldiers” could soon become reality. Using the same features that make them “smart,” smart toys can be taken over by outside actors and forced to do their bidding.

But rather than being led by a nutcracker to fight off evil rodents, real armies of toys could be led by criminals to attack you or me.

“Smart toys” (Internet or Bluetooth-enabled toys) are some of the most popular toys this holiday season. Internet or Bluetooth functionality enables smart toys to have amazing features. There are:

  • stuffed animals that play back messages sent from loved one’s smartphones
  • robots that teach children how to code
  • toys integrated with apps that teach reading and spelling skills while still providing physical exercise

Smart toys can do incredible things. Yet, if left unsecured, they not only present real privacy risks to the children and families who use them, but also security risks to everyone who relies on or uses the Internet.

Any Internet-connected device, be it a computer, connected thermostat, or smart toy, is at risk of being Continue reading

Artificial intelligence may not need networks at all

The advancement of edge computing, along with increasingly powerful chips, may make it possible for artificial intelligence (AI) to operate without wide-area networks (WAN).Researchers working on a project at the University of Waterloo say they can make AI adapt as computational power and memory are removed. And indeed if they can do that, it would allow the neural networks to function free of the internet and cloud — the advantages being better privacy, lower data-send costs, portability and the utilization of AI applications in geographically remote areas.The scientists say they can teach AI to learn it doesn’t need lots of resources.To read this article in full, please click here

Artificial intelligence may not need networks at all

The advancement of edge computing, along with increasingly powerful chips, may make it possible for artificial intelligence (AI) to operate without wide-area networks (WAN).Researchers working on a project at the University of Waterloo say they can make AI adapt as computational power and memory are removed. And indeed if they can do that, it would allow the neural networks to function free of the internet and cloud — the advantages being better privacy, lower data-send costs, portability and the utilization of AI applications in geographically remote areas.The scientists say they can teach AI to learn it doesn’t need lots of resources.To read this article in full, please click here

Juniper brings AI bots to intent-based networks

The concept of intent-based networks has received a lot of attention from media and networking professionals since Cisco launched its “Network Intuitive” earlier this year. Cisco has certainly made the term “intent-based” a household term, but that wasn’t the first time I had heard a vendor talk about this vision. Years ago, I was at an event held by Juniper Networks where its founder and CTO at the time, Pradeep Sindhu, talked about the death of Moore’s Law and how that would drive us towards this thing called intent-based networking. To read this article in full, please click here

Juniper brings AI bots to intent-based networks

The concept of intent-based networks has received a lot of attention from media and networking professionals since Cisco launched its “Network Intuitive” earlier this year. Cisco has certainly made the term “intent-based” a household term, but that wasn’t the first time I had heard a vendor talk about this vision. Years ago, I was at an event held by Juniper Networks where its founder and CTO at the time, Pradeep Sindhu, talked about the death of Moore’s Law and how that would drive us towards this thing called intent-based networking. To read this article in full, please click here

History Of Networking – Jeff Tantsura – Segment Routing

In this episode of History of Networking, Jeff Tantsura (Chair of the IETF Routing Area Working Group and Consulting VP of Network Architecture at Futurewei) joins Network Collective to discuss the origins and history of Segment Routing.

Episode Links:


Jeff Tantsura
Guest
Jordan Martin
Host
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Jeff Tantsura – Segment Routing appeared first on Network Collective.

How to extract content from compressed files on Linux

The easiest way to extract the content of compressed files (and compressed archives) on Linux is to prepare a script that both recognizes files by type and uses the proper commands for extracting their contents. Almost every compressed file will have an easily recognizable file extension — .Z, .gz, .tgz etc. And while the commands aren’t very complex, there sure are a lot of them and many options for each.So, why not attack the problem with a script that saves your precious brain cells for more challenging work? Let's look at an example that you might want to consider.To read this article in full, please click here

Data Is Not The New Oil, It’s Nuclear Power

Big Data. I believe that one phrase could get millions in venture capital funding. I don’t even have to put a product with it. Just say it. And make no mistake about it: the rest of the world thinks so too. Data is “the new oil”. At least, according to some pundits. It’s a great headline making analogy that describes how data is driving business and controlling it can lead to an empire. But, data isn’t really oil. It’s nuclear power.

Black Gold, Texas Tea

Crude oil is a popular resource. Prized for a variety of uses, it is traded and sold as a commodity and refined into plastics, gasoline, and other essential items of modern convenience. Oil creates empires and causes global commerce to hinge on every turn of the market. Living in a state that is a big oil producer, the exploration and refining of oil has a big impact.

However, when compared to Big Data, oil isn’t the right metaphor. Much like oil, data needs to be refined before use. But oil can be refined into many different distinct things. Data can only be turned into information. Oil burns up when consumed. Aside from some smoke and Continue reading

$50 off PlayStation 4 Slim 1TB Console: Star Wars Battlefront II Bundle – Deal Alert

Right now Amazon has the PS4 Slim 1TB console, Star Wars Battlefront II bundle for $50 off its typical list price, so you can buy it now for $249. This bundle will vault you into the greatest galactic battles in the Star Wars universe. Featuring a Jet Black 1TB PS4 and a DUALSHOCK 4 wireless controller, there's no better place to be a hero and dominate the galaxy. Crush the Rebel Alliance, or fight for freedom from the Empire. Dismantle the Resistance, or protect it from the First Order. The choice is yours in an all-new playground of intense galactic struggle. From epic ground assaults to stunning vehicle play and heart-pounding aerial dogfights, dominate every game mode in battles that span across all eras of the Star Wars universe. See this deal on Amazon.To read this article in full, please click here

The Future of Journalism in the Internet age: Watchdogs or Lapdogs?

Media watchdogs, increasingly criticized, threatened and attacked by corporate interests and global governments, are also among the prominent victims of falling public trust in the wake of the proliferation of so-called ‘fake’ news.

Despite some self-inflicted problems, such as those highlighted by the Leveson inquiry in the United Kingdom five years ago, news media and responsible journalism remain of critical importance to democracy.

The Internet Society’s 2017 Global Internet Report reveals how media is intricately entwined with society and it will become more so as more people and services go online. The Internet has grown from 400 million users in 2000 to 3.5 billion users today and as access expands further the media have countless new opportunities to increase their reach and better inform their audiences.

But “going online” also introduces unique challenges for the media. In the next five to seven years, the Internet will continue to fundamentally impact society and the media. According to Reporters without Borders, media freedom violations – impacting particularly anonymity, privacy and free expression – have increased by 14 percent in the past five years, for example.

As the Internet and news media become more converged, it is relatively easy to identify Continue reading

Unique IPv6 Prefix Per Host – How Complex Do You Want IPv6 to Be?

In December 2017 IETF published RFC 8273 created by the v6ops working group (which means there must have been significant consensus within the working group that we need the solution and that it makes at least marginal sense).

The RFC specifies a mechanism by which the first-hop router allocates a unique /64 IPv6 prefix for every host attached to a subnet and uses unicast and multicast RA responses sent to unicast MAC addresses to give every host the impression that it’s the sole host on its own subnet.

The first thought of anyone even vaguely familiar with how complex IPv6 already is should be “WTF???” Unfortunately, there are good reasons we need this monstrosity.

Read more ...

Introduction to Multi-Chassis Link Aggregation

Today I am going to talk about another technology named as Multi-Chassis Link Aggregation which is generally used is many of the vendors like Juniper, Arista Networks and so on. Here in this article I am going to have discussion with respect to Arista Networks.

As i said, before i will start with the Multi-Chassis Link Aggregation, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Now the question is what is Multi-Chassis Link Aggregation ?
A multi-chassis link aggregation group (MLAG) is a pair of links that terminate on two cooperating switches and appear as an ordinary link aggregation group (LAG). The cooperating switches are MLAG peer switches and communicate through an interface called a peer link. 

While the peer link’s primary purpose is exchanging MLAG control information between peer switches, it also carries data traffic from devices that are attached to only one MLAG peer and Continue reading

Introduction to Multi-chassis EtherChannel(MEC) in Cisco Switches

Today I am going to talk about the technology used in the enterprise or the datacenter environment for various vendors in the market. Starting from the Multi-chassis EtherChannel (MEC), Multi-chassis EtherChannel is generally used in the Cisco technology with the VSS.

Before I start with the Multichassis EtherChannel, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Multi-Chassis EtherChannel
 Multi-chassis EtherChannel (MEC) is a Layer 2 multipathing technology. This form of EtherChannel  allows a connected node to terminate the EtherChannel across the two physical Cisco Catalyst 6500/6800 Series Switches that make up the VSS leading to creating simplified loop-free Layer 2 topology. 

Cisco’s Multi-chassis EtherChannel (MCEC) solution addresses the need for inter-chassis redundancy mechanisms, where a carrier wants to “dual home” a device to two upstream points of attachment (PoAs) for redundancy 

Fig 1.1- Multi-Chassis Ether-Channel with DSLAM in MPLS and VPLS environment

Terminology Tuesday Presents: Data Gravity

Data Gravity is a concept first coined by Dave McCrory to describe the tendency of data to attract more data, applications and services.  As you may have guessed from the name, this principle has many parallels to Newton’s Theory of Universal Gravitation.

 

The basic premise is that a singular piece of data isn’t meaningful but with more data (metadata as it’s generally called) additional context (and therefore more meaning) can be derived.  When all that data is bundled with more applications and services, one can harness a considerable amount of power as evidenced by today’s trends towards data and analytics.

 

For example, let’s take this piece of data: 0.  Although we know what zero means conceptually, we don’t have any way to determine how we should feel about it.  Without any context just knowing the number 0 is essentially worthless.  If, for instance you were to know the additional data of “inventory of toy Elmos” + [insert where you live] you’d know that you need to make an only order and ASAP.

 

Data for larger institutions is just like this, except the concept of “friction” plays a larger role.  Data Friction Continue reading

A Guide to Open Source for IT Practitioners

It’s easy to see that open source is changing the way people think about infrastructure. However, as the saying goes: “The future is here, it’s just not evenly distributed”. As is normal, there will always be pockets of IT where active involvement in open source will just take some more time.

I’ve worked on open source for a few years now, and I have always wanted to publish a post that focuses on a few key ideas that I wish I could tell every new entrant into the world of open source. I feel like going in with the right expectations can really help any efforts here go much more smoothly. So if you’re accustomed to getting most if not all of your technology stack from a vendor, and you’re wondering about the open source craze, and trying to make sense of it all, this is for you. My goal with this post is to empower you to start getting out there and exploring the various communities behind the projects you may already have your eyes on.

Open Source is “Free as in Puppy”

Before some practical tips, I want to spend some time on expectations. This is crucially important Continue reading

A Guide to Open Source for IT Practitioners

It’s easy to see that open source is changing the way people think about infrastructure. However, as the saying goes: “The future is here, it’s just not evenly distributed”. As is normal, there will always be pockets of IT where active involvement in open source will just take some more time.

I’ve worked on open source for a few years now, and I have always wanted to publish a post that focuses on a few key ideas that I wish I could tell every new entrant into the world of open source. I feel like going in with the right expectations can really help any efforts here go much more smoothly. So if you’re accustomed to getting most if not all of your technology stack from a vendor, and you’re wondering about the open source craze, and trying to make sense of it all, this is for you. My goal with this post is to empower you to start getting out there and exploring the various communities behind the projects you may already have your eyes on.

Open Source is “Free as in Puppy”

Before some practical tips, I want to spend some time on expectations. This is crucially important Continue reading