Archive

Category Archives for "Networking"

Why Cisco’s new intent-based networking could be a big deal

Scentsy, a $500 million manufacturer and seller of wickless candles, got an early look at what Cisco and some analysts are saying could be the next big thing in the network industry: Intent-based networking.“I think this could be a pretty big shift in terms of the paradigm of network management,” says Kevin Tompkins, network architect at the company. “We’re getting away from managing individual devices and into having a central, globally managed policy, all controlled from one place that pervades through the network.”+MORE AT NETWORK WORLD: Cisco brings intent based networking to the end-to-end network +To read this article in full or to leave a comment, please click here

Why Cisco’s new intent-based networking could be a big deal

Scentsy, a $500 million manufacturer and seller of wickless candles, got an early look at what Cisco and some analysts are saying could be the next big thing in the network industry: Intent-based networking.“I think this could be a pretty big shift in terms of the paradigm of network management,” says Kevin Tompkins, network architect at the company. “We’re getting away from managing individual devices and into having a central, globally managed policy, all controlled from one place that pervades through the network.”+MORE AT NETWORK WORLD: Cisco brings intent based networking to the end-to-end network +To read this article in full or to leave a comment, please click here

Cisco Advanced Malware Protection (AMP) Threat Grid Sandboxing

Cisco AMP so called as Advance Malware Protection is a term used for Malware file detection technology. AMP will provides you threat intelligence and analytics, point-in-time detection, continuous analysis, and retrospective security of malware files
 
AMP- Advance Malware Protection can be used at various levels of the network. It can be used as Threat Grid, Endpoints, Network. These all products actually make up an architecture and is not just a different products in the cisco portfolio.

In my earlier post i wrote about the Cisco AMP product for endpoints only. If you want to look that article, please go through the below link 
Cisco AMP for Endpoints

We have following various AMP features at Cloud, Endpoint, Networks, web and email. In this article i am only covering the AMP for Threat Grid.

  • AMP Threat Grid
  • AMP for Endpoints
  • AMP for Networks
  • AMP for Web
  • AMP for Email

AMP Threat Grid
AMP threat Grid can be used for appliances or in the cloud. Huge organisations with compliance and policy restrictions can analyze malware with the help of AMP Threat Grid locally by submitting samples to the appliance. It helps you effectively defend against both targeted attacks and threats from advanced malware Continue reading

60% off iClever Travel Power Strip with Surge Protector and 4 USB Ports – Deal Alert

iClever's BoostStrip IC-BS01 travel power strip turns one solitary outlet in the airport, hotel, train or plane into 2 surge protected AC outlets and 4 USB ports. Equipped with iClever’s SmartID technology, this power strip offers a max 24W/4.8A USB output while it recognizes your device and safely optimizes max output. The typical list price of the BoostStrip is $49.99, but right now it's currently discounted 60% to just $19.99 on Amazon, where it's averaging 4.5 stars from over 100 reviewers. See this deal on Amazon. To read this article in full or to leave a comment, please click here

Banks and Fed sites score as least trustworthy in OTA 2017 security and privacy audit

We frequently hear that we can’t have privacy and security; sadly, that is often still the case as an audit of over 1,000 top websites analyzed for security and privacy practices showed an alarming trend for the third year in a row. The Online Trust Alliance said, “Sites either qualify for the Honor Roll or fail the Audit. In other words, sites increasingly either take privacy and security seriously and do well in the Audit, or lag the industry significantly in one or more critical areas.”There is good news and bad news coming out of the audit (pdf). The good news is that 52 percent of websites, the highest percent in nine years of the annual analysis, qualified for the OTA’s Honor Roll. The flipside is that 46 percent of the websites failed the audit; of those, bank did the worst.To read this article in full or to leave a comment, please click here

Banks and Fed sites score as least trustworthy in OTA 2017 security and privacy audit

We frequently hear that we can’t have privacy and security; sadly, that is often still the case as an audit of over 1,000 top websites analyzed for security and privacy practices showed an alarming trend for the third year in a row. The Online Trust Alliance said, “Sites either qualify for the Honor Roll or fail the Audit. In other words, sites increasingly either take privacy and security seriously and do well in the Audit, or lag the industry significantly in one or more critical areas.”There is good news and bad news coming out of the audit (pdf). The good news is that 52 percent of websites, the highest percent in nine years of the annual analysis, qualified for the OTA’s Honor Roll. The flipside is that 46 percent of the websites failed the audit; of those, bank did the worst.To read this article in full or to leave a comment, please click here

23% off Panasonic ErgoFit In-Ear Comfort Fit Earbuds – Deal Alert

If you believe the reviewers on Amazon, you may not find a better sounding pair of earbuds at this price point, which at the current 23% discount is just $7.68. The ErgoFit earbuds from Panasonic are designed to fit comfortably and securely in your ear, isolating outside noise while delivering great sound with a wider frequency range than most comparable buds. The earbuds come in various colors and features a generous 3.6 ft. cord that easily fits through or around your clothes, coats and bags. The ErgoFit earbuds average 4.5 stars from over 48,000 people on Amazon (read reviews) which lends some credibility to Panasonic's claim that the earbuds deliver dynamic, crystal clear sound while successfully blocking ambient noise. Its typical list price has been reduced 23% to just $7.68.To read this article in full or to leave a comment, please click here

OwnBackup wants to broaden the backup footprint

OwnBackup is a cloud-to-cloud backup and restore vendor that aims to provide secure, automated, daily backups of SaaS and PaaS data. Founded by well-regarded recovery, data protection and security experts, OwnBackup is a Salesforce partner and ranks highly on the Salesforce AppExchange.As well as the usual backup and recovery options, OwnBackup has a broader take on what backup really means and offers data comparison and restoration tools to offer more granular control in the broader backup and recovery space.To read this article in full or to leave a comment, please click here

When the Internet (Officially) Became the Public Square

Sometimes, well-intended efforts to prevent unacceptable behavior run into the reality of what it means to have an open and free society. That is what happened at the Supreme Court on Monday.

Souvenir Postcard by unknown

The Supreme Court issued an opinion confirming something we at Cloudflare have long believed -- that the First Amendment protects access to the Internet. Using sweeping language, Justice Kennedy compared internet access to access to a street or park, "essential venues for public gatherings to celebrate some views, to protest others, or simply to learn and inquire,” and concluded that "to foreclose access to social media altogether is to prevent the user from engaging in the legitimate exercise of First Amendment rights."

We share this view of the internet as a forum to discuss and debate ideas, and believe that the Court’s opinion is an important reaffirmation of the free speech principles we support.

The Packingham Case

Like many other First Amendment cases, the law at the heart of the Packingham v. North Carolina case presents complex questions about how to protect the community in ways consistent with the right to free speech.

In 2008, North Carolina passed a law making it a Continue reading

Fog computing may be IoT’s computational model

Fog computing and fog networking could fill the latency and range gap in the internet of things (IoT.) For the last couple of years, researchers have been reporting on developments in fog’s role in completing IoT’s ubiquitous connectivity. It is similar to cloud computing architectures but it brings the cloud to the edge to meet the different demands of IoT.The underlying concept is the cloud for some real-time IoT services could be too slow because the quality of service (QoS) specifications for the IoT application exceeds the cloud’s QoS. The solution is to move the cloud out into the network.RELATED: IoT catches on in New England fishing town Low latency and QoS is important in IoT use cases like self-driving vehicles and controlling robots and other control applications that require minimum latency to synchronize, supervise, control and initiate machine actions. Range is important when connecting devices over long distances where hubs and gateways are not locally available.To read this article in full or to leave a comment, please click here

Switching Basics : Private VLANs

Today I am going to talk about “Private VLANs”. By using Private VLANs you can restrict the specific port from the network and it can only communicate with the uplink port with which it connects.

We have two kind of VLANs; One is Primary VLAN and other is Secondary VLANs. Primary VLANs is a type of VLAN which is used to forward frames downstream to all Secondary VLANs.while Secondary VLANs are further divided in to the 2 types and these types are :

Isolated VLANs : 
As name suggested, it is isolated from all the port except the ports in the Primary VLAN or you can say the isolated VLAN port can only talk with the uplink port and will be isolated from the other ports in the network.

Community VLANs:
As name suggest. if two ports are in the community they can talk to each other and talk to the uplink port as well but not able to talk to the other members of the VLANs. They are restricted to have a communication with the isolated VLANs in the network.

Fig 1.1- Private VLANs

Most common question what i am thinking now;

If two different Ports Continue reading

Uber CEO resigns, leaving company in search of a new strategy

Uber is now a driverless vehicle, after CEO Travis Kalanick stepped down Tuesday.Kalanick had already decided to take an indefinite leave of absence from the company, but now he's leaving for good. The move came at the request of the board of directors, The New York Times reported Wednesday.The company has already lost Kalanick's right-hand man, Senior Vice President of Business Emil Michael, following a number of gaffes including his suggestion that the company target a journalist who had been investigating the company.To read this article in full or to leave a comment, please click here

IPv4 route lookup on Linux

TL;DR: With its implementation of IPv4 routing tables using LPC-tries, Linux offers good lookup performance (50 ns for a full view) and low memory usage (64 MiB for a full view).


During the lifetime of an IPv4 datagram inside the Linux kernel, one important step is the route lookup for the destination address through the fib_lookup() function. From essential information about the datagram (source and destination IP addresses, interfaces, firewall mark, …), this function should quickly provide a decision. Some possible options are:

  • local delivery (RTN_LOCAL),
  • forwarding to a supplied next hop (RTN_UNICAST),
  • silent discard (RTN_BLACKHOLE).

Since 2.6.39, Linux stores routes into a compressed prefix tree (commit 3630b7c050d9). In the past, a route cache was maintained but it has been removed1 in Linux 3.6.

Route lookup in a trie

Looking up a route in a routing table is to find the most specific prefix matching the requested destination. Let’s assume the following routing table:

Lenovo’s ThinkSystem product barrage targets data centers

Lenovo is taking on Dell EMC and HPE with its biggest portfolio refresh since it acquired IBM's x86 server business three years ago, offering a lineup of servers, switches, SAN arrays and converged systems intended to show that it's a serious contender in the data center and software-defined infrastructure market.The product launch, staged in New York Tuesday, was the first major event for Lenovo's Data Center Group, in business since April. Lenovo wants to be a global player not only for the enterprise data center but also in hyperscale computing.Lenovo is tied for third in server market share with Cisco and IBM, well behind HPE and Dell EMC, according to IDC, and has a particularly steep uphill battle ahead in North America.To read this article in full or to leave a comment, please click here