Archive

Category Archives for "Networking"

Unifi US-8 PoE Passthrough With The Cisco 3560CX

As part of my “everything should be on a UPS” strategy, I recently replaced a regular 8-port gigabit switch with a Ubiquiti Unifi US-8 Ethernet switch because the US-8 can be powered using POE (Power Over Ethernet) provided by a UPS-protected switch in my basement, so it should stay up in the event of a power outage. This also allowed me to indirectly provide UPS protection for the Ubiquiti wireless AP in that location because the US-8 has a PoE passthrough port with which I could power the AP. Clever, right?

Ubiquiti Unifi Us-8 with POE Passthrough

 

POE Passthrough

To clarify (because a picture is worth many thousands of my words), here’s how things were:

Before the Unifi US-8

And here’s how things are after installing the Ubiquiti Unifi US-8:

After the Unifi US-8 with POE Passthrough

The new setup worked well, but I noticed after a few days that the uptime for the Unifi US-8 kept on resetting; that is, it appeared to be rebooting. The Cisco 3560CX switch which is providing the POE can supply 30W per port, which is plenty enough for the US-8 and the wireless AP to be daisy-chained like this, yet when I looked at the logs on the 3560CX, I found an error:

Oct 23 18:23:12.124 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR:  Continue reading

HPE broadens its processor offerings with AMD, Cavium systems

It’s been said that the industry dislikes too many choices, but HPE is offering more choices for server products with new ARM- and AMD Epyc-based servers. And in both cases, HPE is touting price-performance efficiency.The company today announced new ProLiant DL385 Gen10 servers running AMD’s Epyc processor, the server version of its Zen-based core that has shot the company back into serious competitiveness with Intel.Also on Network World: REVIEW: How rack servers from HPE, Dell and IBM stack up HPE claims that with the Epyc chips, customers can have more virtual machines per server and the ability to process more data in parallel, thanks to the 32 cores with two threads per core in the Epyc processor. The result, it says, is up to 50 percent lower cost per virtual machine than “traditional” servers.To read this article in full, please click here

HPE broadens its processor offerings with AMD, Cavium systems

It’s been said that the industry dislikes too many choices, but HPE is offering more choices for server products with new ARM- and AMD Epyc-based servers. And in both cases, HPE is touting price-performance efficiency.The company today announced new ProLiant DL385 Gen10 servers running AMD’s Epyc processor, the server version of its Zen-based core that has shot the company back into serious competitiveness with Intel.Also on Network World: REVIEW: How rack servers from HPE, Dell and IBM stack up HPE claims that with the Epyc chips, customers can have more virtual machines per server and the ability to process more data in parallel, thanks to the 32 cores with two threads per core in the Epyc processor. The result, it says, is up to 50 percent lower cost per virtual machine than “traditional” servers.To read this article in full, please click here

Certifications: Why I Like Them, How I Use Them and My Plan for Security Learning

The other day Daniel Dib (http://lostintransit.se) asked me an interview question.  The question was about certifications.  What do I think about them…. and are they losing their “value”.

Poor certifications.  People question their value.  Of course “value” typically means for many what can the cert “do” for you once you have it.  People also get so judgemental of others for “collecting” them.  And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”.  Poor poor certifications.  In every area certifications exist they can get a bad rep.  IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge.  ?

Why I Like Them and How I Use Them

In 2012 my view on certs changed.  I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs.   You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading

Certifications: Why I Like Them, How I Use Them and My Plan for Security Learning

The other day Daniel Dib (http://lostintransit.se) asked me an interview question.  The question was about certifications.  What do I think about them…. and are they losing their “value”.

Poor certifications.  People question their value.  Of course “value” typically means for many what can the cert “do” for you once you have it.  People also get so judgemental of others for “collecting” them.  And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”.  Poor poor certifications.  In every area certifications exist they can get a bad rep.  IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge.  ?

Why I Like Them and How I Use Them

In 2012 my view on certs changed.  I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs.   You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading

IDG Contributor Network: Cloud, SaaS and SD-WAN drive new licensing technology

In 5 software licensing challenges in the next generation network , I noted the important role that licensing models would have in the transition to the software defined network.  But there’s a deeper linkage between the growing demand for SaaS applications, cloud technology evolution and new software-defined Wide Area Network solutions.  What does that linkage mean for the licensing technologies that will drive monetization for the new software defined network?Let’s start with the Q3 Forrester Wave report “Recurring Customer And Billing Management,” which speaks broadly to the accelerating trend of consumers and businesses using Software as a Service (SaaS) offerings via the cloud versus traditional on-premises software.  The author states that as this takes place, software vendors invariably migrate to subscription, or usage-based monetization models.  The report goes on to reference a Forrester 2017 SaaS adoption report that finds “in 2017, we expect software-as-a-service (SaaS) spend in particular to be more than 1.5 times that of license software.”To read this article in full, please click here

Unlocking the Internet for Education: Policymakers Hold the Key

Education is the basis for individual empowerment, employability, and gender equity. Unfortunately, it is not available to everyone.

In 2015, the international community agreed to the 2030 Agenda for Sustainable Development, which commits countries to addressing these challenges. Such commitments require innovative approaches that go beyond simply building more educational institutions. At the Internet Society we believe the Internet is a key piece of that puzzle, which is why we are pleased to release a new paper, “Internet Access and education: Key considerations for policy makers”, to help navigate some of the opportunities and challenges.

The Internet has great potential to not only expand access to, but also improve the quality of education. It opens doorways to a wealth of information, knowledge, and educational resources to students and teachers. It also promotes opportunities for learning beyond the classroom – a critical feature to promote the lifelong learning that the future demands. A skilled workforce that utilizes ICTs effectively is a key factor in the global digital economy and for harnessing its natural resources for sustainable growth. Education is where it starts.

This Internet Society briefing describes ways in which policymakers can unlock that potential through an enabling framework Continue reading

The Supreme Court Wanders into the Patent Troll Fight

The Supreme Court Wanders into the Patent Troll Fight

Next Monday, the US Supreme Court will hear oral arguments in Oil States Energy Services, LLC vs. Greene’s Energy Group, LLC, which is a case to determine whether the Inter Partes Review (IPR) administrative process at the US Patent and Trademark Office (USPTO) used to determine the validity of patents is constitutional.

The constitutionality of the IPR process is one of the biggest legal issues facing innovative technology companies, as the availability of this process has greatly reduced the anticipated costs, and thereby lessened the threat, of patent troll litigation. As we discuss in this blog post, it is ironic that the outcome of a case that is of such great importance to the technology community today may hinge on what courts in Britain were and were not doing more than 200 years ago.

The Supreme Court Wanders into the Patent Troll FightThomas Rowlandson [Public domain], via Wikimedia Commons

As we have discussed in prior blog posts, the stakes are high: if the Supreme Court finds IPR unconstitutional, then the entire system of administrative review by the USPTO — including IPR and ex parte processes — will be shuttered. This would be a mistake, as administrative recourse at the USPTO is one of the few ways Continue reading

IoT needs to be secured by the network

Everyone who has a stake in the internet of things, from device manufacturers to network service providers to implementers to customers themselves, makes important contributions to the security or lack thereof in enterprise IoT, attendees at Security of Things World were told.“The key to all [IoT devices] is that they are networked,” Jamison Utter, senior business development manager at Palo Alto Networks told a group at the conference. “It’s not just a single thing sitting on the counter like my toaster, it participates with the network because it provides value back to business.”“I think the media focuses a lot on consumer, because people reading their articles and watching the news … think about it, but they’re not thinking about the impact of the factory that built that consumer device, that has 10,000 or 20,000 robots and sensors that are all IoT and made this happen.”To read this article in full, please click here

IoT needs to be secured by the network

Everyone who has a stake in the internet of things, from device manufacturers to network service providers to implementers to customers themselves, makes important contributions to the security or lack thereof in enterprise IoT, attendees at Security of Things World were told.“The key to all [IoT devices] is that they are networked,” Jamison Utter, senior business development manager at Palo Alto Networks told a group at the conference. “It’s not just a single thing sitting on the counter like my toaster, it participates with the network because it provides value back to business.”“I think the media focuses a lot on consumer, because people reading their articles and watching the news … think about it, but they’re not thinking about the impact of the factory that built that consumer device, that has 10,000 or 20,000 robots and sensors that are all IoT and made this happen.”To read this article in full, please click here

Nutanix: We don’t need a traditional channel program | Channelnomics

Interesting piece on Nutanix and resellers: Nutanix’s senior director of EMEA channels Jan Ursi has defended against a claim the firm has no clear channel strategy, suggesting that the hyperconverged vendor does not rely on conventional methods, such as reward programs, in order to foster partner relationships. Some thoughts Building a reseller channel is expensive […]