Archive

Category Archives for "Networking"

Oracle beefs up cloud sales team with 1,000 EMEA openings

Oracle is the latest legacy software vendor looking to reorganise its sales teams to be more focused on cloud services, as it announces 1,000 job openings in EMEA.Oracle is targeting "people from diverse backgrounds and profiles with between two to six years work experience", the official press release states.This follows some positive financial results for Oracle, as it posted a 66 percent year-on-year growth in cloud revenues for Q4 2016. That figure comes in at $1.4 billion and includes PaaS, IaaS and SaaS, which has been boosted by the recent NetSuite acquisition. By comparison AWS posted revenues of $3.66 billion in its latest results back in April.To read this article in full or to leave a comment, please click here

2 reasons to migrate off of Microsoft Exchange Server

A few weeks back, I wrote that “choosing Microsoft Windows for your organization should get you fired.”It’s a statement that, while certainly a bit on the inflammatory side, I completely stand by—mostly due to the known insecure nature of running Windows as a server operating system.What I didn’t do was give specific examples of what to move your existing Windows-based infrastructure to. Sure, the obvious answer for most SysAdmins is simply “migrate the servers over to Linux.” But what about specific server applications that your organization might already rely upon? That’s a whole other can of worms.To read this article in full or to leave a comment, please click here

2 reasons to migrate off of Microsoft Exchange Server

A few weeks back, I wrote that “choosing Microsoft Windows for your organization should get you fired.”It’s a statement that, while certainly a bit on the inflammatory side, I completely stand by—mostly due to the known insecure nature of running Windows as a server operating system.What I didn’t do was give specific examples of what to move your existing Windows-based infrastructure to. Sure, the obvious answer for most SysAdmins is simply “migrate the servers over to Linux.” But what about specific server applications that your organization might already rely upon? That’s a whole other can of worms.To read this article in full or to leave a comment, please click here

Get $100 off Amazon Echo When You Buy 2 Right Now – Deal Alert

Put 2 Echo devices in your cart and Amazon will credit you back $100 right now, effectively pricing each one at $129.99 vs. the typical $179.99 list price. But you'll have to use a special code at checkout, to activate the discount: ECHO2PACK. Amazon Echo is a hands-free speaker you control with your voice. Echo connects to the Alexa Voice Service to play music, provide information, news, sports scores, weather, and more—instantly. All you have to do is ask. Echo has seven microphones and beam forming technology so it can hear you from across the room—even while music is playing. Echo is also an expertly tuned speaker that can fill any room with 360° immersive sound. When you want to use Echo, just say the wake word “Alexa” and Echo responds instantly. If you have more than one Echo or Echo Dot, Alexa responds intelligently from the Echo you're closest to with ESP (Echo Spatial Perception), so it makes a lot of sense to pick up 2 right now with this discount.  See the Amazon Echo on Amazon.To read this article in full or to leave a comment, please click here

Tools for TE with EIGRP

In response to my article about what would cause a directly connected route to be overridden, Matt Love (@showflogi) made a good observation:

What Matt is saying is that longest prefix match (LPM) is a mechanism that can be used to steer traffic around the network in order to meet a technical or business need. This type of traffic steering is called traffic engineering (TE).

LPM refers to how route lookups work on a Layer 3 device: the longest, most-specific match is always chosen. Like I explained in the prior post, if the routing table contains 10.10.10.0/24 and 10.10.10.64/26, the latter route will be used to forward traffic to 10.10.10.100 (as an example) because a /26 is longer (ie, has a longer prefix length) and is therefore more specific. We can use this behavior to direct traffic towards 10.10.10.100 over a specific interface or via a specific path (ie, a path with Continue reading

Nominate a Women Or Girl for an EqualsInTech Award!

Know an amazing woman or girl in tech who’s working for access, skills, or leadership? Why not shine the light on them and nominate them for an EqualsInTech Award!

Equals is an initiative delivered by a committed partnership of ITU, UN Women, GSMA, ITC, and UN University joined by the Internet Society and over 20 corporate leaders, governments, non-profit organizations, communities, and individuals around the world working together to bridge the digital gender divide – by bringing women to tech, and tech to women.

Ms. Joyce Dogniez

Off The Cuff – Engineering In The Enterprise

Is engineering talent disappearing from the enterprise? Our panel thinks so, and has a conversation about the implications for both businesses and individuals. This episode was recorded at Cisco Live 2017 in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Denise Donohue
Guest
Mike Zsiga
Guest
Daniel Dib
Guest
Jeff Fry
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Engineering In The Enterprise appeared first on Network Collective.

Off The Cuff – Engineering In The Enterprise

Is engineering talent disappearing from the enterprise? Our panel thinks so, and has a conversation about the implications for both businesses and individuals. This episode was recorded at Cisco Live 2017 in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Denise Donohue
Guest
Mike Zsiga
Guest
Daniel Dib
Guest
Jeff Fry
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Engineering In The Enterprise appeared first on Network Collective.

Using Geolocation in Firepower Access Control Policies

The use of geolocation is fairly obvious in monitoring networks with Firepower Management Center. What may be less obvious is that Continents and Countries can also be specified as the source or destination of connections in an Access Control Policy. Basically, this geographical information becomes one more match criteria that can be used to identify traffic for a block or allow action.

To get to this capability, open the Access Control Policy that is in use by the Firepower device. Within the policy, open or create an applicable rule. On the network tab (where you configure the source and destination addresses) a Geolocation tab can also be found. Clicking on this tab exposes Continents and Countries. These can be added as sources and/or destinations.

ACPGEO

Note to reader: All Firepower content can be accessed by clicking here (or choosing Firepower from the menu at the top of the page).

As can be seen in the diagram above, I am creating a rule to block traffic to France. Before I save and deploy the policy changes to the device, I will confirm reachability to an IP address that exists in that part of Europe.

Last login: Mon Jul 17 11:48:29 on ttys000
PAULS:~ pauls$  Continue reading

Tools for TE with EIGRP

In response to my article about what would cause a directly connected route to be overridden, Matt Love (@showflogi) made a good observation:

What Matt is saying is that longest prefix match (LPM) is a mechanism that can be used to steer traffic around the network in order to meet a technical or business need. This type of traffic steering is called traffic engineering (TE).