Archive

Category Archives for "Networking"

All you need to know about Unix environment variables

Simply put, environment variables are variables that are set up in your shell when you log in. They are called “environment variables” because most of them affect the way your Unix shell works for you. One points to your home directory and another to your history file. One identifies your mail file while another controls the colors that you see when you ask for a file listing. Still another sets up your default search path.If you haven’t examined your environment variables in a while, you might be surprised by how many of them are configured. An easy way to see how many have been established in your account is to run this command: $ env | wc -l 25 The env command (or printenv) will list all of the enviroment variables and their values. Here’s a sampling:To read this article in full or to leave a comment, please click here

4 tips for managing big data from IoT in your network

Big Data and the Internet of Things. The two seem to go hand in hand, even if there are some important differences between them. As IoT becomes a greater reality, it’s important that your network devops team is ready for its huge impact on your systems and networks. In this post, we’ll cover the basics, like the difference between big data and the Internet of Things, and then we’ll go into more detail about how to ensure your network is managing big data from IoT effectively.

The Internet of Things: a hot topic

The Internet of Things has been a hot topic in recent years. Little wonder, since its potential is increasing daily. From Bluetooth accessible devices such as smart appliances and smart homes, to wearable technology, to smart cars, to energy plants and wind turbines, smart technology is growing fast. Along with this technology is the need to support these devices both in network and storage. By 2025 McKinsey expects IoT will generate $11.1 Trillion annually. Companies are rushing to find ways to capitalize on IoT and the big data it will generate.

Differences between the Internet of Things and big data

Big Data is an interesting concept Continue reading

Why 802.11ax is the next big thing in Wi-Fi

I know, I know, I’ve heard it before. A new technology comes along, and it promises to be the next big thing. Consumers and businesses buy it, and what happens? It fails to live up to the hype. In my opinion, almost every iPhone release over the past five years has been that way. Sure there were some cool new features, but overall it’s not something I’d say was game changing. One technology that does promise to live up to the hype is 802.11ax, the next standard for wireless LANs. I say that because this next generation of Wi-Fi was engineered for the world we live in where everything is connected and there’s an assumption that upload and download traffic will be equivalent. Previous generations of Wi-Fi assumed more casual use and that there would be far more downloading of information than uploading. To read this article in full or to leave a comment, please click here

Why 802.11ax is the next big thing in Wi-Fi

I know, I know, I’ve heard it before. A new technology comes along, and it promises to be the next big thing. Consumers and businesses buy it, and what happens? It fails to live up to the hype. In my opinion, almost every iPhone release over the past five years has been that way. Sure there were some cool new features, but overall it’s not something I’d say was game changing. One technology that does promise to live up to the hype is 802.11ax, the next standard for wireless LANs. I say that because this next generation of Wi-Fi was engineered for the world we live in where everything is connected and there’s an assumption that upload and download traffic will be equivalent. Previous generations of Wi-Fi assumed more casual use and that there would be far more downloading of information than uploading. To read this article in full or to leave a comment, please click here

Why 802.11ax is the next big thing in Wi-Fi

I know, I know, I’ve heard it before. A new technology comes along, and it promises to be the next big thing. Consumers and businesses buy it, and what happens? It fails to live up to the hype. In my opinion, almost every iPhone release over the past five years has been that way. Sure there were some cool new features, but overall it’s not something I’d say was game changing. One technology that does promise to live up to the hype is 802.11ax, the next standard for wireless LANs. I say that because this next generation of Wi-Fi was engineered for the world we live in where everything is connected and there’s an assumption that upload and download traffic will be equivalent. Previous generations of Wi-Fi assumed more casual use and that there would be far more downloading of information than uploading. To read this article in full, please click here

24% off Taotronics Universal Smartphone Bike Mount – Deal Alert

The Taotronics phone mount is easy to install and features a fully adjustable viewing angle, non-slip rubber grips and a one-button phone release mechanism. It averages 4.5 out of 5 stars on Amazon (read reviews), where its list price of $16.99 has been discounted 24% to $12.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

45% off Vastar 4-in-1 USB Charging Cable Adapter With Micro, Mini USB and Lightning – Deal Alert

This charging cable from Vastar features micro and mini USB, 30-pin and lightning connectors, making it compatible with a very wide range of newer and older smartphones, tablets, USB devices and more. Equipped with a connector for iPhone 6/6 plus, 5/5s, iPad4, iPad Air, iPad mini, USB type C for Nexus 6P, Nexus 5X, Oneplus 2, 2015 MacBook with 12" Retina Display, 2015 Google Chromebook Pixel. Micro USB connector charge for most android phones, Bluetooth headset, external batteries; Mini USB connector for some additional mobile phone models, MP3, digital cameras or other devices. The list price on this cable has been reduced 45% to just $5.99. See it on Amazon.To read this article in full or to leave a comment, please click here

Is Inter-AS MPLS VPNs commonly deployed ?

Is Inter-AS MPLS VPNs commonly deployed ? In real-life deployment which Inter-AS MPLS VPN Option is most common ? What are the use cases of Inter-AS MPLS VPNs ? This is not a theory post , I will share practical information with you.   For those who want to learn the details of Inter-AS MPLS […]

The post Is Inter-AS MPLS VPNs commonly deployed ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

HPE looks to put a supercomputer in space

Hewlett Packard Enterprise is preparing to send a supercomputer to where no supercomputer has gone before — into orbit. HPE and NASA have worked on what HPE calls the Spaceborne Computer for the better part of a year. It uses commercial off-the-shelf computer components, meaning it’s a fairly generic supercomputer. It’s decent — Ars Technica quotes HPE as stating it’s a 1 teraflop computer, but that wouldn’t get it on the Top 500 list by a mile. The Spaceborne Computer is built on HPE's Apollo 40 system, a high-density server racks that houses the compute, storage and networking in one case, much like a hyperconverged system. HPE Apollo is typically used for data analytics and high-performance computing (HPC). To read this article in full or to leave a comment, please click here

HPE looks to put a supercomputer in space

Hewlett Packard Enterprise is preparing to send a supercomputer to where no supercomputer has gone before — into orbit. HPE and NASA have worked on what HPE calls the Spaceborne Computer for the better part of a year. It uses commercial off-the-shelf computer components, meaning it’s a fairly generic supercomputer. It’s decent — Ars Technica quotes HPE as stating it’s a 1 teraflop computer, but that wouldn’t get it on the Top 500 list by a mile. The Spaceborne Computer is built on HPE's Apollo 40 system, a high-density server racks that houses the compute, storage and networking in one case, much like a hyperconverged system. HPE Apollo is typically used for data analytics and high-performance computing (HPC). To read this article in full or to leave a comment, please click here

HPE looks to put a supercomputer in space

Hewlett Packard Enterprise is preparing to send a supercomputer to where no supercomputer has gone before — into orbit. HPE and NASA have worked on what HPE calls the Spaceborne Computer for the better part of a year. It uses commercial off-the-shelf computer components, meaning it’s a fairly generic supercomputer. It’s decent — Ars Technica quotes HPE as stating it’s a 1 teraflop computer, but that wouldn’t get it on the Top 500 list by a mile. The Spaceborne Computer is built on HPE's Apollo 40 system, a high-density server racks that houses the compute, storage and networking in one case, much like a hyperconverged system. HPE Apollo is typically used for data analytics and high-performance computing (HPC). To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can U.S. lawmakers fix IoT security for good?

While the Internet of Things (IoT) has carved out a comfortable place for itself in today’s society and markets, many still fear that the interconnectivity-driven phenomenon is extraordinarily vulnerable to outside attacks. A number of U.S. Senators believe they may have a solution to the problem, and have put forward the Internet of Things Cybersecurity Improvement Act of 2017.What are the exact details of the text of the bill, and how does it intend to secure one of the most diverse and unregulated assets of the economy? What potential pitfalls stand in the bills way, and how much of a chance does it have of becoming law? An analysis of the IoT Act reveals that it’s a healthy step in the right direction, but it may not be enough.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can U.S. lawmakers fix IoT security for good?

While the Internet of Things (IoT) has carved out a comfortable place for itself in today’s society and markets, many still fear that the interconnectivity-driven phenomenon is extraordinarily vulnerable to outside attacks. A number of U.S. Senators believe they may have a solution to the problem, and have put forward the Internet of Things Cybersecurity Improvement Act of 2017.What are the exact details of the text of the bill, and how does it intend to secure one of the most diverse and unregulated assets of the economy? What potential pitfalls stand in the bills way, and how much of a chance does it have of becoming law? An analysis of the IoT Act reveals that it’s a healthy step in the right direction, but it may not be enough.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can U.S. lawmakers fix IoT security for good?

While the Internet of Things (IoT) has carved out a comfortable place for itself in today’s society and markets, many still fear that the interconnectivity-driven phenomenon is extraordinarily vulnerable to outside attacks. A number of U.S. Senators believe they may have a solution to the problem, and have put forward the Internet of Things Cybersecurity Improvement Act of 2017.What are the exact details of the text of the bill, and how does it intend to secure one of the most diverse and unregulated assets of the economy? What potential pitfalls stand in the bills way, and how much of a chance does it have of becoming law? An analysis of the IoT Act reveals that it’s a healthy step in the right direction, but it may not be enough.To read this article in full or to leave a comment, please click here