Archive

Category Archives for "Networking"

48% off Inateck 2.5 Inch USB 3.0 Hard Drive Enclosure External Case – Deal Alert

This 3 port USB 3.0 hub converts any 9.5mm & 7mm 2.5-Inch SATA HDD/SSD into an external hard drive for ultimate mobility and convenience. Setup is tool free and easy to install and disassemble.  A built-in foam pad protects the hard disk. This device features automatic sleep and spin-down, and goes into sleep mode automatically after 10 minutes in idle state. Currently receiving 4.5 out of 5 stars on Amazon (read reviews), it's discounted by 48% down to just $21.99,  See it on Amazon.To read this article in full or to leave a comment, please click here

66% off Anker SoundCore Bluetooth Speaker with 24-Hour Playtime & Built-in Mic – Deal Alert

Anker's highly rated SoundCore Bluetooth speaker's typical list price of $79.99 has been discounted 66% today to just $26.99 on Amazon, where it averages 4.6 out of 5 stars from over 7,500 reviewers (76% rate the full 5 stars: read reviews here). It features rich sound, a generous 24 hours of play time (500 continuous songs without needing a charge), Bluetooth 4.0 66-foot wireless range and a worry-free 18 month warranty. This deal is good for today only (7/13), so see it now on Amazon.To read this article in full or to leave a comment, please click here

BGP Configurations on HP Routers

Today I am going to talk about the BGP configurations on the HP routers. I already posted the articles on the BGP configurations earlier where i defined the basic configurations on the Cisco and Juniper routers. Apart from these configurations I already put the basic information of the BGP as well. Below are some of the articles for which you can refer to study yourself step by step.

BGP Basics
BGP basics on Juniper Routers
BGP configurations on Cisco routers

Today I am going to have the basic configurations on HP routers with the topology. Below is the basic topology and the basic BGP configuration as below. The Topology and the IP addresses used here are only for the demo purposes and has no relevance with any of the live or enterprise networks.

Below is the demo topology showing the use of the HP routers where BGP is configured in the MPLS environment. This is just a example to showcase the topology. I will come up with the configurations on HP routers in the MPLS environment in later stage. As of now first we need to talk about the basic BGP on the HP routers and step by step we Continue reading

Microsoft introduces Azure Stack, its answer to OpenStack

Microsoft has taken the wraps off Azure Stack, its take on hybrid cloud infrastructure and response to the popular OpenStack open-source cloud computing package. Azure Stack will begin shipping in September.Azure Stack was originally designed as a software-only product, much like OpenStack. But Microsoft has decided to add integrated hardware turnkey solutions from its certified partners such as Dell EMC, HPE, Lenovo, Cisco and Huawei.Microsoft first announced Azure Stack at the Ignite Conference in 2015 and formally introduced it at the Inspire conference in Washington, D.C.Azure Stack is basically the same APIs, tools and processes that power Azure, but it’s intended to be hosted on-premises in private cloud scenarios. By offering the same platform and tools both on-premises and in Azure, the company promises consistency and ease of deployment, whether it’s hosted locally or in the cloud.To read this article in full or to leave a comment, please click here

TCPDump Quick Reference

TCPDump is a tool for sniffing packets on a network. This is not a comprehensive tutorial, only a quick reference source. Consult the man pages and/or documentation for indepth explanation of commands. Capturing Traffic All Traffic for an interface -i <interface-name> specifies an...

Viptela Cloud onRamp optimizes cloud access

Over the past few years, SD-WANs have become the Kardashians of the tech industry. That is, it’s hard to go anywhere or talk to anyone without the topic of SD-WANs coming up. Unlike the Kardashians, SD-WANs deserve this level of attention, since the technology is useful by lowering the cost of running a WAN and improves application performance. However, for all the hype and chatter about the topic, its primary focus has been to improve connectivity to branch offices.It’s been well documented on this site and others that the cloud is not only mainstream but also the preferred strategy for many organizations, so a WAN must not only address connectivity to branch offices but also cloud services.To read this article in full or to leave a comment, please click here

Quantum fiber network to launch in August

The most secure form of network ever created has been successfully real-world-tested in China, said a publication there yesterday.Quantum entanglement—the tech that drives quantum networks—is a part of quantum-key distribution (QKD). Roughly, it gains its supposedly unhackable nature because the subatomic particles that make up the data impact each other all at the same time, regardless of where they are in the transmission.That means that because all of the cryptographic keys are intertwined, it’s possible to see at any time if bits have been corrupted. That includes being stolen or erased. Any disruption becomes transparent and throws an error. One can’t hack the system, experts say.To read this article in full or to leave a comment, please click here

Quantum fiber network to launch in August

The most secure form of network ever created has been successfully real-world-tested in China, said a publication there yesterday.Quantum entanglement—the tech that drives quantum networks—is a part of quantum-key distribution (QKD). Roughly, it gains its supposedly unhackable nature because the subatomic particles that make up the data impact each other all at the same time, regardless of where they are in the transmission.That means that because all of the cryptographic keys are intertwined, it’s possible to see at any time if bits have been corrupted. That includes being stolen or erased. Any disruption becomes transparent and throws an error. One can’t hack the system, experts say.To read this article in full or to leave a comment, please click here

Getting started with Cloudflare Apps

We recently launched our new Cloudflare Apps platform, and love to see the community it is building. In an effort to help people who run web services such as websites, APIs and more, we would like to help make your web services faster, safer and more reliable using our new Apps Platform by leveraging our 115 points of presence around the world. (Skip ahead to the fun part if you already know how Cloudflare Apps works)

How Cloudflare apps work

Here is a quick diagram of how Cloudflare apps work:

The “Origin” is the server that is providing your services, such as your website or API. The “Edge” represents a point of presence that is closest to your visitors. Cloudflare uses a routing method known as Anycast to ensure the end user, pictured on the far right, is routed through the best network path to our points of presence closest to them around the world.

Historically, to make changes or additions to your site at the edge changes to a site, you needed to be a Cloudflare employee. Now with apps, anyone can quickly make changes to the pages rendered to their users via Javascript and CSS. Today, you Continue reading