How Does Internet Work - We know what is networking
Last month I celebrated 6 years of writing my blog. This project reached yesterday his most visited day in history with more than 1500 visitors and more than 31K all together in November. Nice to finally see someone actually reading my rumblings. It was and still is hard work of editing old posts making them better and finding new interesting stuff to write about. Blog is about computer network technologies, you know, the stuff that makes thing get to you and appear on your device’s screens so you can stare at it all the time ? Some other interesting trivia:
Once a borrower’s identity is established, it can never be changed.
Customers are still on the hook for nodes running in a cluster.
We’ll be at AWS re:INVENT in Las Vegas all week (Nov 27 – Dec 1, 2017)!
Come say hi to the NSX Team at the VMware booth (#900 right as you walk in the main entrance) in the Expo Hall at the Venetian Hotel. Stop by our booth to…
As always, continue the conversation with us on Twitter @vmwarensx or use the hashtag #RunNSX or #NSXMindset. We hope to see you at the show!
The post Come Visit Us at AWS re:Invent! appeared first on Network Virtualization.
In a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection. The new DNS service is called Quad9 in reference to the IP address 9.9.9.9 offered for the service. The group says the service is aimed at protecting users from accessing malicious websites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. —CircleIDIn a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection. The new DNS service is called Quad9 in reference to the IP address 9.9.9.9 offered for the service. The group says the service is aimed at protecting users from accessing malicious websites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. —CircleID
I’ve been traveling to northern Europe these past few months to meet with various customers, deliver onsite trainings and speak at meetups. I’ve noticed some common themes that crop up no matter with whom I speak. IT professionals are exhausted by the complexity required to manage and maintain their infrastructure. Somehow, networking and server interconnectivity has become this unmanageable complex mess over the past 20 years. And I don’t blame them. As networking has layered on more and more solutions, it becomes hard to separate out the complexity from the deployment.
Normally when I have these conversations, I start at the most basic levels. I focus on two topics that create the most grief for the vast majority of networks:
The reason I start there is because resolving these two issues in the data center would eradicate over 90% of all issues that cause late maintenance windows and urgent midnight troubleshooting calls.
At Cumulus Networks, we resolve these issues by rethinking what it means to configure a network device. The most effective solution to both of these issues is simplification of configuration. Because we focus on integration and solution first, we are able Continue reading
Think of Blockchain as primarily two things. 1) A peer-to-peer technology 2) A way of keeping a public record.
The technological backing of Blockchain is the ability to have many (many) computers host the same information. Snippets of code (known as blocks) are duplicated and maintained in so many different places rendering fraud impossible. The fact that each of these blocks is timestamped and unique makes it increasingly challenging to outsmart. If you’re interested in learning more about the technological specifics there are a number of great resources online including this presentation by Binh Nguyen, IBM’s Blockchain Fabric Chief Architect.
Today, Blockchain is most commonly thought of in connection to Bitcoin as it describes the technology and process that we’ve all come to know as being so secure. Bitcoin’s past affiliations with illegalities of all sorts have given a bad name to Blockchain but there are many benefits to secure transactions all with a public record as our purchases and currency become increasingly digital.
Want to learn more? Check out these sources:
Terminology Tuesday is a new blog series. What would you like Continue reading
Company sees its "agentless approach" as well suited to function-as-a-service platforms.
There will be 1 billion 5G subscribers by the end of 2023, the company estimates.
Another execellent recording by the folks at the Network Collective. Roland Dobbins on the history of Distributed Denial of Service attacks!
The security-as-a-service is based on a zero-trust approach.

In January 2011, what was arguably the first significant disconnection of an entire country from the Internet took place when routes to Egyptian networks disappeared from the Internet’s global routing table, leaving no valid paths by which the rest of the world could exchange Internet traffic with Egypt’s service providers. It was followed in short order by nationwide disruptions in Bahrain, Libya, and Syria. These outages took place during what became known as the Arab Spring, highlighting the role that the Internet had come to play in political protest, and heralding the wider use of national Internet shutdowns as a means of control.
“How hard is it to disconnect a country from the Internet, really?”
After these events, and another significant Internet outage in Syria, this question led a blog post published in November 2012 by former Dyn Chief Scientist Jim Cowie that examined the risk of Internet disconnection for countries around the world, based on the number of Internet connections at their international border. “You can think of this, to [a] first approximation,” Cowie wrote, “as the number of phone calls (or legal writs, or infrastructure attacks) that would have to be performed in order to Continue reading