Archive

Category Archives for "Networking"

Cisco brings intent-based networking to the end-to-end network

Today at a media and analyst event in San Francisco, Cisco announced it plans to deliver on “intent based” networking, which has the potential to be the biggest change ever in the way networks are managed.Intent-based systems operate in a manner where the administrators tell the network what it wants done and the how is determined by the network and then the specific tasks are automated to make this happen. For example, if a business wants to secure all traffic from accounting, that command is issued and the systems would take care of all the technical details.   Network changes are automated and continuous, so if a worker moves, all the policies and network settings follow him or her.To read this article in full or to leave a comment, please click here

Cisco brings intent-based networking to the end-to-end network

Becoming a digital business is of paramount importance to IT and business leaders today. Becoming digital means being able to move with speed and adapt to market trends faster than the competition. This might sound simple – just work faster, but in practicality becoming a fast-moving organization is very difficult as legacy IT processes can limit an organization's ability to operate quickly. Many parts of IT have evolved to increase business agility such as application development, which has embraced DevOps. However, the network has largely stood still.There has been some great innovation in the area of software defined networking (SDN) that has made network operations more efficient but this hasn’t fundamentally changed the way networks operate. Today most organizations are managing their networks using traditional processes that are largely reactive in nature and manually intensive. As we move into a world where literally everything will be connected, network operations will get crushed under the weight of having to perform more tasks faster to keep up with the needs of the business.To read this article in full or to leave a comment, please click here

On the ‘web: A new way to deal with DDoS

Most large scale providers manage Distributed Denial of Service (DDoS) attacks by spreading the attack over as many servers as possible, and simply “eating” the traffic. This traffic spreading routine is normally accomplished using Border Gateway Protocol (BGP) communities and selective advertisement of reachable destinations, combined with the use of anycast to regionalize and manage load sharing on inbound network paths. But what about the smaller operator, who may only have two or three entry points, and does not have a large number of servers, or a large aggregate edge bandwidth, to react to DDoS attacks?

I write for ECI about once a month; this month I explain DOTS over there. What to know what DOTS is? Then you need to click on the link above and read the story. ?

The post On the ‘web: A new way to deal with DDoS appeared first on rule 11 reader.

How to keep Linux from hanging up on you

When you run a command in the background on a Linux system and then log out, the process you were running will stop abruptly. If you elect to run the command with a no-hangup command, on the other hand, it will continue running and will store its output in a file.Here's how this works. The nohup command instructs your process to ignore the SIGHUP signal that would normally shut it down. That allows you to leave time-consuming processes to complete on their own without you having to remain logged in. By default, the output of the command you are running will be left in a file named nohup.out so that you can find your data the next time you log in.To read this article in full or to leave a comment, please click here

How to keep Linux from hanging up on you

When you run a command in the background on a Linux system and then log out, the process you were running will stop abruptly. If you elect to run the command with a no-hangup command, on the other hand, it will continue running and will store its output in a file.Here's how this works. The nohup command instructs your process to ignore the SIGHUP signal that would normally shut it down. That allows you to leave time-consuming processes to complete on their own without you having to remain logged in. By default, the output of the command you are running will be left in a file named nohup.out so that you can find your data the next time you log in.To read this article in full or to leave a comment, please click here

How Red Bull Racing uses IoT to win

“Fast” seems like a simple concept, on the surface. Go fast enough and you can win races, even highly competitive ones like Formula 1 auto racing. But it takes a complex, sophisticated IT setup to get to the necessary level of fast, according to the CIO of Red Bull Racing, Matt Cadieux.In particular, the extensive IoT deployment that the team uses to squeeze the maximum  performance out of its cars is key to success, Cadieux saidThe carNaturally enough, it all starts with the car. F1 cars are essentially very light-weight, low-flying aircraft, mating an engine capable of around 600 horsepower with a fiberglass body and spindly chassis weighing in at about 1,500 pounds. They can get from zero to 100mph in an incendiary four seconds, corner like waterbugs, and keep drivers relatively safe even from collisions at the blistering speeds that F1 races can reach.To read this article in full or to leave a comment, please click here

Scaling Cloud Networking Up and Out

The broad adoption of Arista’s 100G spines and the enthusiastic acceptance of Arista’s R series exemplifies the demands of cloud networking. Leveraging the programmable, state-based EOS software foundation and 12 different merchant silicon chipsets, Arista has transformed the datacenter market over the past decade. Today we are introducing the next frontier in router migration for the decade ahead. Arista has been in the forefront of industry firsts with state driven programmable EOS and CloudVision, based on network wide cloud-class control and management.

198 million American voter records found unprotected on the internet

You’d think if someone had amassed personal information on nearly every registered US voter, and stored that information on an Amazon S3 storage bucket, that it would at least be protected with a password. But thanks to a misconfigured server, personal data of 198 million Americans voters could be downloaded by anyone who happened across it. It is believed to be the largest leak of voter records to have ever occurred anywhere in the world.That giant oops caused by Deep Root Analytics, a data analytics firm contracted to compile the information for the Republican National Committee, contained names, birthdates, home and mailing addresses, phone numbers, party affiliations, suspected ethnicities and religions, as well as analytics on who people would likely vote for and their stance on hot-button issues such as gun control and abortion.To read this article in full or to leave a comment, please click here

198 million American voter records found unprotected on the internet

You’d think if someone had amassed personal information on nearly every registered US voter, and stored that information on an Amazon S3 storage bucket, that it would at least be protected with a password. But thanks to a misconfigured server, personal data of 198 million Americans voters could be downloaded by anyone who happened across it. It is believed to be the largest leak of voter records to have ever occurred anywhere in the world.That giant oops caused by Deep Root Analytics, a data analytics firm contracted to compile the information for the Republican National Committee, contained names, birthdates, home and mailing addresses, phone numbers, party affiliations, suspected ethnicities and religions, as well as analytics on who people would likely vote for and their stance on hot-button issues such as gun control and abortion.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Internet of Things helps fuel growth of data lakes

Data lakes, storage repositories that hold extremely large amounts of raw data in its native format until the data is needed by users, are becoming increasingly popular within enterprises.Helping to fuel interest in data lakes are the digital transformation efforts underway at many enterprises, spurred by the emergence of the Internet of Things (IoT). The connected objects in the IoT will generate huge volumes of data.As more products, assets, vehicles and other “things” are instrumented and data ingested, it’s important that IoT data sets be aggregated in a single place, where they can be easily analyzed and correlated with other relevant data sets using big data processing capabilities. Doing so is critical to generating the most leverage and insight from IoT data.To read this article in full or to leave a comment, please click here

43% off OxyLED Mini Stick-on 6-LED Wireless Motion Sensing Night Light – Deal Alert

This tiny motion-sensing strip contains 6 bright LEDs, and sticks anywhere. Just the trick for illuminating an entryway door-lock, a kitchen cabinet, drawers, closet or the glove box in your car. Simply turns on when somebody is there, and turns off when no motion is sensed. And the part that sticks is actually a magnetic base, so you can pop the light off and take it with you as a torch if needed. Currently priced at 43% off, so right now you're paying just $16.99 for a two-pack. See this deal on Amazon.To read this article in full or to leave a comment, please click here