Archive

Category Archives for "Networking"

It’s Not The Size of Your Conference Community

CLUS2016Tweetup

Where do you get the most enjoyment from your conference attendance? Do you like going to sessions and learning about new things? Do you enjoy more of the social aspect of meeting friends and networking with your peers? Maybe it’s something else entirely?

It’s The Big Show

When you look at shows like Cisco Live, VMworld, or Interop ITX, there’s a lot going on. There are diverse education tracks attended by thousands of people. You could go to Interop and bounce from a big data session into a security session, followed by a cloud panel. You could attend Cisco Live and never talk about networking. You could go to VMworld and only talk about networking. There are lots of opportunities to talk about a variety of things.

But these conferences are huge. Cisco and VMware both take up the entire Mandalay Bay Convention Center in Las Vegas. When in San Francisco, both of these events dwarf the Moscone Center and have to spread out into the surrounding hotels. That means it’s easy to get lost or be overlooked. I’ve been to Cisco Live before and never bumped into people I know from my area that said they Continue reading

Top 5 misconceptions of IoT network and device security

Security in multiplesImage by ShutterstockThe Internet of Things (IoT) describes an interconnected system of standalone devices, which communicate and transfer data within the existing internet infrastructure, providing greater insight and control over elements in our increasingly connected lives. With an estimated 30 billion connected devices to be deployed across the globe by 2020, the promise of a global Internet of Things is fast approaching, posing a whole new level of threats to connected organizations. To a potential attacker, a device presents an interesting target for several reasons. First, many of the devices will have an inherent value by the simple nature of their function. A connected security camera, for example, could provide valuable information about the security posture of a given location when compromised. Hackers are already using IoT devices for their malicious purposes in multiple types of attacks on networks and servers. DSL, DDoS and bot attacks in 2016 have proven that there is no shortage of opportunities that hackers are willing to exploit. Portnox explains these common misconceptions.To read this article in full or to leave a comment, please click here

Top 5 misconceptions of IoT network and device security

Security in multiplesImage by ShutterstockThe Internet of Things (IoT) describes an interconnected system of standalone devices, which communicate and transfer data within the existing internet infrastructure, providing greater insight and control over elements in our increasingly connected lives. With an estimated 30 billion connected devices to be deployed across the globe by 2020, the promise of a global Internet of Things is fast approaching, posing a whole new level of threats to connected organizations. To a potential attacker, a device presents an interesting target for several reasons. First, many of the devices will have an inherent value by the simple nature of their function. A connected security camera, for example, could provide valuable information about the security posture of a given location when compromised. Hackers are already using IoT devices for their malicious purposes in multiple types of attacks on networks and servers. DSL, DDoS and bot attacks in 2016 have proven that there is no shortage of opportunities that hackers are willing to exploit. Portnox explains these common misconceptions.To read this article in full or to leave a comment, please click here

Whose Zoomin who? Polycom is

Shortly after talking the helm as Polycom, CEO Mary McDowell discussed her strategy for the company moving forward. One of the focus areas for it is to broaden its technology partner ecosystem. The company has a great partnership with Microsoft and is the only vendor that has products that interoperate natively with Skype for Business/Office 365. As lucrative as this partnership has been to Polycom, McDowell recognizes that not everyone will be using Microsoft for their collaboration needs. + Also on Network World: Polycom brings a wide variety of video solutions to Microsoft Unified Communications + Also, Polycom will be directing more resources into endpoint innovation. The infrastructure business at Polycom has been in decline for years because customers are choosing to leverage the power and ubiquity of the cloud. Polycom has been a technology leader since its inception, but the transition of video from being on premises to the cloud has shrunk the companies addressable market. Hence the change in strategy.To read this article in full or to leave a comment, please click here

Whose Zoomin who? Polycom is

Shortly after talking the helm as Polycom, CEO Mary McDowell discussed her strategy for the company moving forward. One of the focus areas for it is to broaden its technology partner ecosystem. The company has a great partnership with Microsoft and is the only vendor that has products that interoperate natively with Skype for Business/Office 365. As lucrative as this partnership has been to Polycom, McDowell recognizes that not everyone will be using Microsoft for their collaboration needs. + Also on Network World: Polycom brings a wide variety of video solutions to Microsoft Unified Communications + Also, Polycom will be directing more resources into endpoint innovation. The infrastructure business at Polycom has been in decline for years because customers are choosing to leverage the power and ubiquity of the cloud. Polycom has been a technology leader since its inception, but the transition of video from being on premises to the cloud has shrunk the companies addressable market. Hence the change in strategy.To read this article in full or to leave a comment, please click here

Dell EMC and The Amazing Internet Of Things

While at Dell EMC World 2017 I had a very interesting chat with Jason Shepherd, Dell EMC’s Director of IoT Strategy & Partnerships. To be clear, I’m not an expert on the Internet of Things (IOT), and our discussion was a useful reminder how much difference perspective makes when evaluating a technology.

 

Dell EMC Logo

 

Internet Of Things: Use Cases

When I think about IOT the first thing that comes to mind — naturally enough — are the items most applicable to me, like a smart thermostat, smart door locks, smart light bulbs, and so forth. I work in an enterprise, so I also think about building management in the enterprise, to include things like smart lighting, HVAC, presence sensors, temperature monitoring and more. Both of these environments are ripe for IOT functionality, and are the ones that most of us are likely to encounter on a daily basis.

However, it’s probably obvious that there are many more use cases for IOT devices, including for example:

  • industrial (monitoring critical equipment like motors, valves, temperatures, flow meters)
  • metropolitan (city-wide automotive/pedestrian traffic monitoring, traffic flows)
  • agricultural (monitoring water levels, animal health, production volumes, environmental)
  • automotive (monitoring the car’s engine, location, mechanical and electronic Continue reading

23% off iRobot Roomba 650 Robotic Vacuum Cleaner – Deal Alert

If you want a thorough, everyday clean, maybe you should consider using robots. The Roomba 650 Vacuuming Robot provides a thorough clean at the push of a button. The patented, 3-Stage Cleaning System easily picks up dust, pet hair and large debris like cereal and works on all floor types, adjusting itself and re-charging itself as needed to make sure the job is done correctly every time you need it -- preset Roomba to clean when it’s convenient for you. Roomba is just 3.6 inch tall, and is specifically designed to fit under most furniture, beds and kickboards. The 650 model is a #1 best seller on Amazon, where its typical list price of $374 is reduced right now to $286.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Start Using OpenConfig with NAPALM on Software Gone Wild

OpenConfig sounds like a great idea, but unfortunately only a few vendors support it, and it doesn’t run on all their platforms, and you need the latest-and-greatest software release. Not exactly a set of conditions that would encourage widespread adoption.

Things might change with the OpenConfig data models supported in NAPALM. Imagine you could parse router configurations or show printouts into OpenConfig data structures, or use OpenConfig to configure Cisco IOS routers running a decade old software.

Read more ...

Progressive Dutch Municipality Protects Citizen Data and Meets Compliance with VMware NSX

Progressive Dutch Municipality Protects Citizen Data Summary: Municipality of Zoetermeer implements Zero-Trust model with VMware NSX-enabled micro-segmentation for advanced security inside data centers. Zoetermeer follows the Dutch BIG (Baseline Information Security Dutch Municipalities) regulations Zoetermeer is a modern, fast-growing municipality in the province of South Holland. It provides local services such as water supply, sewage and garbage disposal to around 125,000... Read more →