Archive

Category Archives for "Networking"

Response: Cisco ASA Firewall breaks after 213 days of uptime

Continuing with my theme of paying premium prices for faulty products, Michael McNamara shares a recent experience:  I just recently had two HA pairs of Cisco ASA firewalls just stop communicating. A reboot of both the primary and secondary firewall in each HA pair resolved the problem. I had never observed such odd behavior from […]

The post Response: Cisco ASA Firewall breaks after 213 days of uptime appeared first on EtherealMind.

You Need Configuration Management. Really. (Thwack)

Oops, lost a network device. I sure hope we have a configuration backup…

On the Solarwinds Thwack Geek Speak blog I looked at how configuration management can help not just with total loss scenarios, but also with audit and compliance issue. Please do take a trip to Thwack and check out my post, “You Need Configuration Management. Really“.

You Need Configuration Management. Really.

 

Please see my Disclosures page for more information about my role as a Solarwinds Ambassador.

If you liked this post, please do click through to the source at You Need Configuration Management. Really. (Thwack) and give me a share/like. Thank you!

Bin Packing Problem of Distributed Traffic Engineering

Bin Packing Problem ? What is Bin Packing ? I will explain in this post Bin Packing Problem in MPLS Traffic Engineering.       Very complex post normally but I will make it simple for you. And trust me, it is important to understand.   Before I start explaining Bin Packing problem, let’s just […]

The post Bin Packing Problem of Distributed Traffic Engineering appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

What is IRU ? Indefeasible Right of Use ?

What is IRU (a.k.a Indefeasible Right of Use)  ?  If you are working in the Operator, Service Provider or Telco/Carrier networks, you probably heard this term. If you haven’t, you need to learn it.   Note: This content is received from my Telecom/Service Provider Course. You can join the course and learn much more about […]

The post What is IRU ? Indefeasible Right of Use ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Introducing Cloudflare Stream: Fixing the Streaming Video Market



Cloudflare turns seven years old today. We launched on September 27, 2010.

It was only a few days after our launch that we got our first request to support video streaming. Yet, until today, we'd avoided it.

Why? Simply put: the video streaming market is screwed up. While there's a lot of money spent on video, there are only really about 1,000 customers that do any meaningful level of streaming.

This is in large part because it's technically far too complicated. If you want to move beyond just uploading your videos to a consumer service like YouTube, then you have to use at least three different services. You need someone to encode your video into a streamable format, you need someone else to act as the content delivery network delivering the bytes, and you need someone else still to provide the player code that runs on the client device. Further, since video encoding standards keep evolving and vary across generations of devices, it becomes challenging to ensure a consistently high quality experience for all visitors.

And if that sounds like a technical mess, the business side is even worse. Encoding companies charge based on CPU usage, which is driven by Continue reading

How Cloudflare Streams

Every day, close to 1 billion people watch video through Cloudflare. That’s 100 petabytes of video every month. Last year, video made up 73% of all internet traffic, which is why earlier today we announced Cloudflare Stream, an end to end video solution designed to bring instant video to any device and network connection. Here’s how Stream works to optimize video upload, encoding and delivery.

Uploads

Using Cloudflare Stream starts with a call to the Stream API to /upload a video.

HTTP does not by default provide a reliable upload mechanism for large files, which can make it tricky to upload large media content like high quality video. If there’s any latency in the network connection, a timeout can cancel the entire upload and require the client to start over.

We use an open source upload protocol called Tus which allows for resumable uploads where the upload previously failed. Tus does this by splitting the download into manageable chunks and tracking completed chunks on the server.

Encodes

Video files are containers that hold the video file, the audio track, and some metadata. The video file is compressed by a codec. The codec is a compression algorithm for encoding video Continue reading

Nextcloud’s file storage solution gets a security boost

Nextcloud today released a preview of Nextcloud 13, its online file storage solution for enterprise and individual users.What makes this release so interesting? End-to-end file encryption.When we’re talking about the needs of big businesses, keeping files secure is absolutely critical. There has been no shortage of data breaches and hacks in recent months – reliable encryption and security is absolutely vital to reducing those problems. + Also on Network World: 4 ways to simplify data management + From Jos Poortvliet, member of the Nextcloud, team:To read this article in full or to leave a comment, please click here

Nextcloud’s file storage solution gets a security boost

Nextcloud today released a preview of Nextcloud 13, its online file storage solution for enterprise and individual users.What makes this release so interesting? End-to-end file encryption.When we’re talking about the needs of big businesses, keeping files secure is absolutely critical. There has been no shortage of data breaches and hacks in recent months – reliable encryption and security is absolutely vital to reducing those problems. + Also on Network World: 4 ways to simplify data management + From Jos Poortvliet, member of the Nextcloud, team:To read this article in full or to leave a comment, please click here

4 job skills that can boost networking salaries

The coming year looks promising for IT pros on the hunt for new positions. Employers are forging ahead with hiring plans, and it remains a job-seeker’s market. IT salaries are set to increase in 2018, particularly for talent that possesses hard-to-find skills.In the networking arena, certain skills will be especially lucrative – Cisco network administration, Linux/UNIX administration, VoIP administration, and Windows, according to Robert Half Technology.Job candidates with these four in-demand talents may see an additional 5% to 10% bump in starting salary, according to the recruiting and staffing specialist’s 2018 Salary Guide.To read this article in full or to leave a comment, please click here

4 job skills that can boost networking salaries

The coming year looks promising for IT pros on the hunt for new positions. Employers are forging ahead with hiring plans, and it remains a job-seeker’s market. IT salaries are set to increase in 2018, particularly for talent that possesses hard-to-find skills.In the networking arena, certain skills will be especially lucrative – Cisco network administration, Linux/UNIX administration, VoIP administration, and Windows, according to Robert Half Technology.Job candidates with these four in-demand talents may see an additional 5% to 10% bump in starting salary, according to the recruiting and staffing specialist’s 2018 Salary Guide.To read this article in full or to leave a comment, please click here

CCIE Recertification Continuing Education Program

The Cisco Continuing Education Program is a brilliant initiative from Cisco. It is not widely known about but Cisco recently announced a new program to help you re-certify your CCIE without taking the written exam.   Continuing Education Program – How does it work? The concept is very simple, you have to obtain 100 credits […]

The post CCIE Recertification Continuing Education Program appeared first on Network Automation.

2G is still the most common Mobile network technology

2G is still the most common deployed mobile access technology. It is hard to believe but as per my discussions with probably more than twenty Mobile Operators, 2G , especially GSM is the most common mobile access technology.   Almost all those twenty Mobile operators deployed 3G and LTE and some of them deployed LTE Advanced as well, […]

The post 2G is still the most common Mobile network technology appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Collect SSH Keys with Ansible

Here’s a common scenario I’m encountering on Ansible-related forums:

Q: I cannot connect to network devices with my Ansible network modules. I keep getting these weird error messages…

Me: Are you sure you have the device SSH keys in known_hosts file?

Q: How did you know?

Read more ...

Netcat Quick Reference

Netcat is a utility for checking open ports. It has more flexibility than using the telnet command and can be used with scripts more easily. This is not a comprehensive tutorial, only a quick reference source. Consult the man pages and/or documentation for indepth explanation of commands. I...

Post Equifax, We Need to Reconsider How to Identify People 

Victims of identity theft will tell you the experience is like having your personal life broken into, tossed around, and thrown out onto the street. It is a violation that is indescribable. Then, you could discover that strangers are impersonating you, carrying out crimes under your name, and destroying your reputation. Unraveling the mess that follows is a long, painful and never-ending process – all this because someone else was careless or willfully negligent with your data.

Even if your data was not exposed in the Equifax breach, you should be both concerned and angry. This is a potentially catastrophic breach: roughly 143 million individuals (approximately 45% of the US population) now face the prospect of identity theft.

As a society, we need to seriously rethink why and how we identify people. How did the social security number become the default identifier, especially for non-governmental functions such as credit reporting? When the Social Security Administration first issued SSNs in 1936, their “sole purpose” was to track the earning history of workers for benefits. In fact, Kaya Yurieff points out that until 1972, the bottom of the card read: “FOR SOCIAL SECURITY PURPOSES — NOT FOR IDENTIFICATION.”

Social security numbers Continue reading