After describing the basics of internal data center switch architectures, JR Rivers focused on the crux of the problem the vendors copiously exploit to create a confusopoly: is it better to use big- or small-buffer switches?
You’ll need at least free ipSpace.net subscription to watch the video.
It uses the same device agents for its intent-based networking.
Because we all like a little bit of fun, I created an automatic Product Pitch Generator for network vendors. More accurately, a conversation about buzzwords occurred in the context of Networking Field Day 17 where it was jokingly suggested that we needed to take some of the amazing words we were hearing and make a generator. Here’s the best part (if you look at it this way); we ended up with two generators!
Big props to Jordan Martin who hacked together some Python, and created his Network Product Buzzword Generator which I think is hilarious (go try it out!). Meanwhile, I was hacking together some Go and came up with this mess of a Product Pitch Generator:
Hit Refresh to get a new Pitch!
And finally, if you’re watching the NFD17 livestream, why not ML-wash yourself and play NFD17 Buzzword Bingo?
Have fun!
If you liked this post, please do click through to the source at Automatic Product Pitch Generator and give me a share/like. Thank you!
It's based on Ribbon Communications' SBC software.
Last year, I was invited to contribute a paper to a special edition of the Health and Technology Journal published by Springer/Nature. The special issue addressed privacy and security, with a particular focus on healthcare and medical data. I’m happy to announce that now, for four weeks only, the publishers have made the whole issue available free.
From our accompanying blog post last July:
“The paper, “Trust and ethical data handling in the healthcare context” examines the issues associated with healthcare data in terms of ethics, privacy, and trust, and makes recommendations about what we, as individuals, should ask for and expect from the organisations we entrust with our most sensitive personal data.”
Although we can find several comprehensive and mature data protection frameworks around the world, current legal safeguards to not seem to prevent data controllers from indulging in:
In my paper, I argue that a narrow focus on regulatory compliance can lead to a “checklist” mentality, obscure the real reasons why organisations should treat data with care and respect, and lead to poor outcomes for both the organisation and the individual. I Continue reading
In part 1 of our series on the basics of Linux, we learned how to download Linux, whether you should use the CLI or the GUI, how to get a SSH client, how to login to Linux, and how to get help.
In part 2 of our series, we learned how to know what type of Linux you are using and how to navigate the Linux file system.
In this final post in the series, you’ll learn about Linux files, Linux permissions, Linux package management, and how to install applications in Linux.
Let’s say that a user named “david” was denied access to the file /var/log/syslog. The reason for that is likely the user “david” doesn’t have permission to access to the file.
You can see this if you execute ls -l /var/log/syslog:
david@debian:~$ ls -l /var/log/syslog
-rw-r----- 1 root adm 9074 May 15 10:17 /var/log/syslog
The file is owned by the user “root” and the group “adm”. The file permissions are “rw” (shorthand for read/write) for the owner and “r” (shorthand for “read”) for the group with no permissions for anyone else. The graphic below shows how file permissions work in Linux.
In the file permissions Continue reading
50 percent of central offices will have CORD by 2023.
Extreme Networks demonstrates network automation via Workflow Composer and StackStorm at Network Field Day 17.
The post BiB 26: Extreme Networks At NFD17 – Composing Workflows For Mean Time To Payrise appeared first on Packet Pushers.
Can he move the company beyond private cloud?
I’m often asked what the trick is to become a smarter person—there are many answers, of course, which I mention in this video. But there is “one weird trick” many people don’t think about, which I focus on here.
Chronicle will use machine learning to help enterprises manage their data.
A new application tracks a number of user and device behaviors to identify attackers.