Archive

Category Archives for "Networking"

Rough Guide to IETF 99: Back to Prague

Time to get ready for IETF 99! Starting a week from today, on Sunday, 16 July, the Internet Engineering Task Force will be in Prague, Czech Republic, where about 1000 engineers will spend a week discussing the latest issues in open standards and protocols. As usual, the agenda is packed, and the Internet Society is providing a ‘Rough Guide’ to the IETF via a series of blog posts all this week on topics of mutual interest:

Mr. Olaf Kolkman

Big buyouts hit the enterprise market, BMC and Bain eye companies

The leveraged buyout of Dell that resulted in its merger with EMC and the computer giant going private was the first of what appears to be many similar moves. Private equity firms are looking to gobble up some of the enterprise giants and in the process, take them private.BMC Software, which develops IT services software and data center automation software, among many other products, is looking to merge with CA, formerly Computer Associates. BMC is owned by Bain Capital and Golden Gate Capital, so any deal to acquire CA would take the company off the public market.To read this article in full or to leave a comment, please click here

Big buyouts hit the enterprise market, BMC and Bain eye companies

The leveraged buyout of Dell that resulted in its merger with EMC and the computer giant going private was the first of what appears to be many similar moves. Private equity firms are looking to gobble up some of the enterprise giants and in the process, take them private.BMC Software, which develops IT services software and data center automation software, among many other products, is looking to merge with CA, formerly Computer Associates. BMC is owned by Bain Capital and Golden Gate Capital, so any deal to acquire CA would take the company off the public market.To read this article in full or to leave a comment, please click here

Why Do You Still Blog?

After recording an excellent session on social media at Cisco Live with The Network Collective (@NetCollectivePC), I started thinking about blogging and where it stands in the grand scheme of information sharing. With the rise of podcasting and video blogging now in full swing, I was even asked by my friend Michael Stump “Do you see blogging as a dying form of content?” For obvious reasons, I said “no”, but I wanted to explain two major reasons why.

Needle In A Haystack

One of the major reasons why I still blog through written form is searchability. When I started blogging almost seven years ago I wanted to create a place where I could put down my thoughts about topics and share them with everyone. More by accident than design, many of those thoughts became popular topics of conversation. Even today, some of my posts are being used to help people figure out problems and address issues that aren’t well documented in other places.

But why? How can posts many years old still be relevant to audiences today? Because of searching. Use of Google, DuckDuckGo, and even Bing allow people to search for specific error messages Continue reading

28% off SanDisk Ultra CZ48 32GB USB 3.0 100MB/s Flash Drive – Deal Alert

The SanDisk Ultra USB 3.0 Flash Drive takes the wait out of moving, sharing or backing up big files. Transfer a full-length movie in seconds with speeds up to 100MB/s. The included SanDisk SecureAccess software provides 128-bit AES encryption and password protection to keep your private files private. SanDisk's Ultra CZ48 flash drive with 32GB capacity is listed on Amazon for 28% off, so you can pick one up for a little over $14.  See this deal on Amazon.To read this article in full or to leave a comment, please click here

Amazon Delivery, Not a Fully Implemented Process

Those of us who work in technology see the need to take expensive, time consuming and/or mundane activities and convert them to streamlined automated processes. Ideally we improve these to the point that they improve accuracy, provide a better experience and can [mostly] be forgotten about. However, not every process fits all of the intended use cases. Maybe a more accurate statement might be that every process isn’t developed to fit every use case. For those of us who are outliers and find ourselves in those process deficiencies, these incomplete processes can create a lot of frustration.

A Little Background

I’ve been an Amazon Prime user for some period of time. I have also been free of a home mailbox for about 18 months and only used a PO Box to receive general mail. As a Prime customer, I regularly place orders with Amazon. Anyone else that has had the experience I’m about to share can probably finish my story.

The Problem

The problem with this scenario is that each order can only have one delivery address. When the order is placed, there is no way to select the delivery mechanism. So if I list my physical home address, I have Continue reading

Get 72% off NordVPN Virtual Private Network Service For a Limited Time – Deal Alert

NordVPN gives you a private and fast path through the public Internet. All of your data is protected every step of the way using revolutionary 2048-bit SSL encryption even a supercomputer can’t crack. Access Hulu, Netflix, BBC, ITV, Sky, RaiTV and much more from anywhere in the world. Unmetered access for 6 simultaneous devices. You're sure to find dozens of good uses for a VPN. Take advantage of the current 72% off deal that makes all of this available to you for just $3.29/month (access deal here). This is a special deal available for a limited time.To read this article in full or to leave a comment, please click here

Comparison: Cisco Catalyst 9500 Vs Cisco Catalyst 4500 Vs Cisco 3850 Switches

Today I am going to talk about the fixed core chassis Cisco catalyst 9500 which Cisco released a month back. Cisco 9500 is actually enhanced version of Cisco catalyst 4500 chassis and also Cisco 3850 Switch. There are lot of other best features in Cisco 9500 Chassis as some of the features are just amazing in this device.

So we have Cisco 3850, Cisco 4500 Catalyst Switches, Cisco 6500 Catalyst switches, Cisco 6800 Catalyst switches and now Cisco 9000 catalyst switches with 3 flavours ( Cisco 9300 catalyst switches, Cisco 9400 catalyst switches and Cisco 9500 Catalyst switches)

How topology and the demand changes, below is the example topology showing the changes which leads to the next generation fabric network with cloud ready solutions and automation. CLI is gone for the campus fabric, All policy is driven with the SDN controller.

Fig 1.1- Network topology and Next Generations

If we have Cisco 4500 and Cisco 3850 fixed chassis why we required Cisco 9500 chassis ?
I knew this is one of the question which you actually thinking and for this i would like to say that you need to understand the next generation campus requirements where customer wants to be Continue reading

Searching for ground truth in IoT

I’ve been reading and writing daily about the Internet of Things (IoT) for about a month, and I have not found ground truth. I’m not new to the field, but now focused on IoT I am trying to find a relative measure of the importance of IoT developments.One of the definitions of ground truth in the Oxford Dictionary is: “Information obtained by direct observation of a real system, as opposed to a model or simulation; a set of data that is considered to be accurate and reliable, and is used to calibrate a model, algorithm, procedure, etc.” Calibrating the development of the IoT with ground truths that match the 20 billion to 50 billion forecasted devices requires a departure into the leap-of-faith lane. This is not pessimism, but a lack of published information that probably does not exist outside of research papers.   To read this article in full or to leave a comment, please click here

Hit Pause: Take a Moment to Reflect on the Repercussions of the Recent Ransomware Attacks

As these devastating global ransomware attacks illustrate, cybersecurity is not an issue that can be ignored. Any time a device or system is connected to the Internet, it is a potential target. What was once just another lucrative means of extorting money from Internet users, ransomware is emerging as a preferred tool for causing widespread disruption of vital services such as hospitals, banks, shipping, or airports. Attacks are growing more sophisticated and more enduring, with longer term damaging effects and wider impact. Ransomware exploits the slow pace of security patching, systems that are dependent on old software, and poor backup practices.

Christine Runnegar

NSX Experience Day Planning for Operational Transformation: Key Resources

Our Experience Day is a deep dive into operationalizing NSX.  This half-day working session includes breakouts, workbook assignments (summaries, checklists, and Q&A), and deep discussions with peers.  To realize the benefits of network virtualization, organizations will want to assess and execute an operational plan that spans across people, process, and technology.  You and your organization can review the key assets below and make use of the best practices that make the most sense for your particular situation.

If you are interested in joining one of our sessions, please contact your NSX Sales Specialist or account System Engineer.

 

COMMUNITY

NSX Community at VMUG. Dedicated to network and security virtualization, a robust resource for individuals who are motivated to learn more.

For a limited time, join VMUG Advantage to get over $4000 worth of NSX training for only $2,800 (Until Aug 28). Includes NSX Install, Configure Manage On-Demand, VCP-Network Virtualization test prep and voucher, and much more.

 

TRAINING & CERTIFICATION COURSES

VMware NSX Training and Certification. Explore the expert NSX training & certifications from VMware.

 

SERVICES

Professional Services for Transforming Security. Get your team operational by Day 2 and ensure that you achieve measurable results.

Accelerate Advisory Services. Continue reading