Archive

Category Archives for "Networking"

Getting the most out of your next generation firewall

Are you getting the most out of your next generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena -- it was founded in 2014 -- sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED: What is microsegmentation? How getting granular improves network security Illumio extends its segmentation to the network and cloud Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data.  These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here

Getting the most out of your next-generation firewall

Are you getting the most out of your next-generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena — it was founded in 2014 — sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED: What is microsegmentation? How getting granular improves network security Illumio extends its segmentation to the network and cloud Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data. These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here

Getting the most out of your next-generation firewall

Are you getting the most out of your next-generation firewall? Probably not if you take to heart recent research from SafeBreach.SafeBreach, a relative newcomer to the security arena — it was founded in 2014 — sells premise and service packages that continually run network breach simulations that help customers locate and remediate security problems.RELATED: What is microsegmentation? How getting granular improves network security Illumio extends its segmentation to the network and cloud Specifically the company deploys software probes distributed throughout customers’ networks, and attempts to establish connections among devices and network segments just as a hacker would do in attacking your data. These breach attempts are defined by SafeBreach’s Hacker’s Playbook, a library of known attack methods that uncover network security weaknesses and how these vulnerabilities might be exploited.To read this article in full, please click here

Upcoming ipSpace.net Events

In March 2018, we’ll continue the crazy content producing pace you’ve seen in January and February:
  • We’ll have the first part of NSX, ACI or EVPN webinar on March 1st. This session will cover the basics (don’t expect too many details), a follow-up session on April 24th with Mitja Robas will go into design considerations;
  • The EVPN Technical Deep Dive series with Dinesh Dutt starts on March 6th;
  • Elisa and Paolo will run the final part of Network Visibility with Flow Data on March 8th;
  • Last webinar in March: another installment in the leaf-and-spine saga – Multi-Pod and Multi-Site Fabrics with Lukas Krattiger on March 29th;
March is also the Troopers month. I’ll run a Hands-On Network Automation workshop there and have a motivational presentation during the main conference.
Read more ...

BrandPost: Why Adaptive is the Biggest Story in Networking

Next-gen, intelligent, flexible, automated, agile, optimized, programmable, elastic.Our industry has been using these words for years to describe the end game for networks.  With Ciena’s recent 25-year anniversary, we’ve been spending quite a bit of time looking back at the early days – and it seems like the entire industry has been using these aspirational network descriptions for as long as there have been networks.Maybe 2018 is the year “aspirational” starts to become “actuality.”Like no other time in our industry’s history, a collection of technologies and advancements is bringing the long-desired goal of more automated network closer to reality.To read this article in full, please click here

CI/CD For Networking Part 4

Jenkins is and open source project that helps to build, test and deploy code. Jenkins is a very mature project in the CI/CD space and has the ability to perform many automation tasks with the help of plugins. For this part of series Jenkins will be installed on a Centos 7 minimal hosts ...

Unit Testing Junos with JSNAPy

I’ve been passionate about the idea of proactively testing network infrastructure for some time. I revived and added to these ideas in my last post. In that post’s video, I lay out three types of network testing in my presentation:

  1. Config-Centric - Verify my network is configured correctly
  2. State-Centric - Verify the network has the operational state I expect
  3. Application-Centric - Verify my applications can use the network in the way I expect

In the same way a software developer might write tests in Python or Go that describe and effect desired behavior, the network engineer now has a growing set of tools they can use to make assertions about what “should be” and constantly be made aware of deviations. One of those tools popped up on my radar this week - jsnapy.

JSNAPy

JSNAPy describes itself as the python version of the Junos snapshot administrator. While this isn’t untrue, I think it’s a huge undersell. In my view, the assertions you can make on the data retrieved via these snapshots is where JSNAPy really shines. So in order to conceptually understand JSNAPy, I’d recommend you think of it as as a generic assertion engine for Junos, and the snapshots Continue reading

Unit Testing Junos with JSNAPy

I’ve been passionate about the idea of proactively testing network infrastructure for some time. I revived and added to these ideas in my last post. In that post’s video, I lay out three types of network testing in my presentation: Config-Centric - Verify my network is configured correctly State-Centric - Verify the network has the operational state I expect Application-Centric - Verify my applications can use the network in the way I expect In the same way a software developer might write tests in Python or Go that describe and effect desired behavior, the network engineer now has a growing set of tools they can use to make assertions about what “should be” and constantly be made aware of deviations.

Unit Testing Junos with JSNAPy

I’ve been passionate about the idea of proactively testing network infrastructure for some time. I revived and added to these ideas in my last post. In that post’s video, I lay out three types of network testing in my presentation: Config-Centric - Verify my network is configured correctly State-Centric - Verify the network has the operational state I expect Application-Centric - Verify my applications can use the network in the way I expect In the same way a software developer might write tests in Python or Go that describe and effect desired behavior, the network engineer now has a growing set of tools they can use to make assertions about what “should be” and constantly be made aware of deviations.

Infrastructure-as-a-Code-Git-Part-1

After our short introduction to IAC we shall start exploring some of the different tool that are mainly used in the IAC concept. If you have missed the previous post you can read it here The first tool I want to introduce is GIT (and I think is the most important one). What is GIT a […]

Raúl Echeberría at Mobile World Congress Ministerial Programme

The Internet Society’s Vice President of Global Engagement Raúl Echeberría will be participating in a panel tomorrow at the Mobile World Congress Ministerial Programme on Policies to Expand Access to Mobile:

“Access to mobile services has become a key prerequisite for advancing societies where connectivity has almost become a human right. As 4G continues to be rolled out in most markets, and with 5G on the horizon, what policy levers can be pulled to extend existing and future mobile broadband services further into rural and other underserved areas?

“Adopting a balanced regulatory framework that is pro-investment and pro-innovation, will help address some of the toughest development challenges for the mobile industry. This interactive session will discuss policymakers’ key objectives for supporting mobile sector growth, and their next steps for attracting investment which deliver benefits not only for the mobile industry, but for the digitalisation of other industries.”

The panel, which takes place on Tuesday, 27 February, from 11:30-13:00 (CET), is moderated by Julian David, CEO of techUK, and includes, among others, Ebele Okobi, Facebook’s Public Policy Director, Africa; Francesca Bria, Chief Technology and Digital Innovation Officer of Barcelona City Council; and Nkateko Cornelius Nyoka, Chief Legal and Regulatory Officer of Vodacom Group Continue reading

Lenovo introduces new water-cooled server technology

Lenovo has introduced a new high-density server “tray” for high-performance computing (HPC) environments with the newest generation of water cooling technology it co-developed with a German HPC firm.Unlike your typical water-cooled system, where the water is chilled almost to a drinkable state, the ThinkSystem SD650 high-density server tray — so called because of its design and shape — is designed to operate using warm water, up to 50°C, or 122°F.Read also: Data center cooling market set to explode in the coming years There is a mindset that CPUs have to be chilled as though they were cold cuts, when Intel says they can handle much higher temperatures. Xeons can handle temps of up to 75°C without becoming unstable or crashing.To read this article in full, please click here

Lenovo introduces new water-cooled server technology

Lenovo has introduced a new high-density server “tray” for high-performance computing (HPC) environments with the newest generation of water cooling technology it co-developed with a German HPC firm.Unlike your typical water-cooled system, where the water is chilled almost to a drinkable state, the ThinkSystem SD650 high-density server tray — so called because of its design and shape — is designed to operate using warm water, up to 50°C, or 122°F.Read also: Data center cooling market set to explode in the coming years There is a mindset that CPUs have to be chilled as though they were cold cuts, when Intel says they can handle much higher temperatures. Xeons can handle temps of up to 75°C without becoming unstable or crashing.To read this article in full, please click here

Reaction: Billing by the Hour

A very common mistake I see among engineers of all stripes is a failure to fully appreciate the value of time—both what it is worth, and how to make your time more valuable.

What I normally see is something like this—I should be making $x/hour, because I have this specific experience, or that specific skill set. This focus on hourly pay, however, is actually counter productive. For instance, I recently ran across an article in a publication for graphic designers and illustrators (a world I have followed since I lived it in many years ago)—

Billing by the hour is the most popular pricing method across the world in most industries. Of course, there are many web designers/developers out there who make a great living by using the hourly billing method, but in my opinion, value-based billing is far better than hourly billing. —Kyle Prinsloo @Web Designer Depot

To begin, what does Kyle mean when he says to “bill by value” rather than billing by the hour? Once, when I went into a lawyers office, I noticed he had a sign on the wall that said, “Lawyers don’t charge by the bullet.” The point the lawyer was making Continue reading

IDG Contributor Network: If applications speak in sessions, shouldn’t your router be session smart?

My new iPhone X actually recognizes me! This is an example of Smart Technology.Most of us are expecting a revolution of products and services that have embedded intelligence or smarts. Medical diagnostic support is being aided by computer intelligence with the goal to improve the physician’s understanding of the patient to improve the diagnosis, therapies and resulting patient outcomes without adding more burden on the clinician. Look at cars – now, autonomous self-driving vehicles have the potential to alleviate congestion and improve the environment in ways we couldn’t imagine.To perform facial recognition, the iPhone X must understand the language of faces. This includes attributes of faces, such as shape of eyes, noses, cheekbones, and jaw. It’s safe to say that any smart system needs to understand the language of its purpose. Self-driving cars must understand the language of driving which includes maps, roads, signs, speed limits, weather, and traffic signals. Smart medical diagnostics need to understand the language of medicine, including possible diagnosis and probabilities.To read this article in full, please click here