Archive

Category Archives for "Networking"

What Is Network Collective?

In short, Network Collective is a bi-weekly video roundtable where data networking engineers talk about industry trends, challenging projects, and what it takes to do network engineering day-to-day.  For a more thorough description of what were up to, please take a minute to watch the video above.

If you want to know exactly who is behind Network Collective, you can find that information on our Who Is Network Collective? page.And if you’re interested in being a guest on Network Collective, please tell us a little bit about who you are by filling out the form here.

The post What Is Network Collective? appeared first on Network Collective.

Mobile networks still stink, with more workers coming

A new survey sponsored by NetMotion Software and WBR Digital shows that mobile network connectivity problems are the top reason for mobile-related trouble ticket submissions at enterprise companies. But that might not matter in terms of growth – as the same survey indicated that more than half the companies (56%) expected their mobile workforce to increase this year.Despite Wi-Fi networks and mobile WAN (3G, 4G, etc.) being available for the better part of a decade or more, as well as mobile devices that have been in the hands of workers for almost the same amount of time, frustrations still exist when it comes to mobile networks. “Intermittent network connectivity or poor application stability can leave an employee cut off from essential information they need to do their jobs, leading to a frustrated worker and an unsatisfactory customer engagement,” the executive summary notes.To read this article in full or to leave a comment, please click here

Extreme-ly Interesting Times In Networking

If you’re a fan of Extreme Networks, the last few months have been pretty exciting for you. Just yesterday, it was announced that Extreme is buying the data center networking business of Brocade for $55 million once the Broadcom acquisition happens. Combined with the $100 million acquisition of Avaya’s campus networking portfolio on March 7th and the purchase of Zebra Wireless (nee Motorola) last September, Extreme is pushing itself into the market as a major player. How is that going to impact the landscape?

Building A Better Business

Extreme has been a player in the wireless space for a while. Their acquisition of Enterasys helped vault them into the mix with other big wireless players. Now, the rounding out of the portfolio helps them complete across the board. They aren’t just limited to playing with stadium wifi and campus technologies now. The campus networking story that was brought in through Avaya was a must to help them compete with Aruba, A Hewlett Packard Enterprise Company. Aruba owns the assets of HPE’s campus networking business and has been leveraging them effectively.

The data center play was an interesting one to say the least. I’ve mused recently that Brocade’s data center business Continue reading

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported but still widely used.The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites. In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.To read this article in full or to leave a comment, please click here

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported but still widely used.The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites. In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.To read this article in full or to leave a comment, please click here

Network Device Authentication with Ansible 2.3

Ansible 2.3 Networking Update

In a recent post, Coming Soon: Networking Features in Ansible 2.3, one of the key features to be introduced is a new connection framework. This new connection framework supports persistent SSH connections for modules that communicate with network devices via two methods:

1) the tried and true CLI method
2) the newly included NETCONF method

With the new connection framework, the network modules are currently undergoing a transformation with regards to how credentials are supplied. In Ansible versions 2.0 to 2.2, network modules support providing connection credentials as top-level arguments in the module.

If you want to build a task using the ios_command Ansible module the credentials used to authenticate to the device could be provided as top level arguments. The following example demonstrates the simplest form of passing credentials to modules in order to authenticate to the remote device:


ios_command:
  commands: show version
  host: “{{ inventory_hostname }}”
  username: cisco
  password: cisco
  

In some cases, such as with configuration modules, additional authentication details are required. In order to enter configuration mode, the Playbook tasks must first enter “enable” mode and, in some cases, supply an enable-mode password. Notice the additional two arguments (authorize and auth_pass) added to Continue reading

50 weirdest things left behind in Ubers (including rubber mallets and Harry Potter glasses)

Yes, you can save quite a bit of money taking an Uber instead of a cab in most cases, but not if you leave your smartphone, purse, guitar or engagement ring behind. Kind of gives a new meaning to the term "Sharing Economy".Uber, which does have a good system for helping you recover forgotten items, has just published a list of the most commonly forgotten items left in its cars as well as a list of the "most unique" items left behind. It also reports that Los Angeles is the most forgetful city in North AmericaMORE: Blame the cellphone — Injuries pile up, from cat bites to shocks to broken bonesTo read this article in full or to leave a comment, please click here

Here’s how Microsoft is helping companies build IoT hardware

One of the biggest challenges with building connected hardware is getting from proof-of-concept (PoC) prototypes to devices that are ready for large-scale production rollout. Microsoft is aiming to help through labs that allow companies to come in and work with experts on building internet-connected hardware.Companies come into one of three Microsoft Internet of Things and Artificial Intelligence (IoT/AI) Insider Labs with the hardware they’ve built so far and a plan for an intense two or three weeks of work. Visitors are paired with mentors who are experts in different areas and given access to machinery that can help them quickly work through different hardware designs.To read this article in full or to leave a comment, please click here

Free cloud storage buyer beware

There are three things that are certain in life: Death, taxes and volatility in the free cloud storage market. Yes, it turns out free cloud storage comes with a price: putting up with a fickle market. Network World has a running list of the best places in the cloud to find free storage. Many vendors offer their services on a freemium basis, meaning an introductory cloud storage offering, typically of 5 GB is free, with additional storage costing a variety of prices. But businesses don’t typically like to give away their services for free. So, these offers change frequently.To read this article in full or to leave a comment, please click here

This company is turning FAQs into Alexa skills

People looking for an easier path to integrating with Amazon’s Alexa virtual assistant have good news on the horizon. NoHold, a company that builds services for making bots, unveiled a project that seeks to turn a document into an Alexa skill.It’s designed for situations like Airbnb hosts who want to give guests a virtual assistant that can answer questions about the home they’re renting, or companies that want a talking employee handbook. Bot-builders upload a document to NoHold’s Sicura QuickStart service, which then parses the text and turns it into a virtual conversation partner that can answer questions based on the file’s contents. Right now, building Alexa skills is a fairly manual process that requires programming prowess and time to figure out Amazon’s software development tools for its virtual assistant. People who want to change the way that a bot behaves have to go in and tweak code parameters.To read this article in full or to leave a comment, please click here

Americans value online privacy but voters do not care when it counts

The rush by Republicans in Congress to kill still-pending Obama-era rules that would put curbs on the ability of ISPs to collect and sell our personal Internet usage data has been met with howls of protest from privacy advocates and citizens.And the outrage is no wonder, as the idea of our browsing habits and histories being hawked to the highest bidder is an affront to any understanding of personal privacy rights.It’s also an affront to public opinion, as a Pew Research Center Survey last year shows: 93% of adults say that being in control of who can get information about them is important; 74% feel this is “very important,” while 19% say it is “somewhat important.” 90% say that controlling what information is collected about them is important—65% think it is “very important” and 25% say it is “somewhat important.” Despite such overwhelming public sentiment, Republican majorities in both the House and Senate have voted in recent days to scuttle the privacy protections authorized last October by the Federal Communications Commission, protections that were scheduled to take effect later this year. That FCC measure passed on a 3-2 party-line vote, with then-Chairman Tom Wheeler and two Continue reading

Americans value online privacy but voters do not care when it counts

The rush by Republicans in Congress to kill still-pending Obama-era rules that would put curbs on the ability of ISPs to collect and sell our personal Internet usage data has been met with howls of protest from privacy advocates and citizens.And the outrage is no wonder, as the idea of our browsing habits and histories being hawked to the highest bidder is an affront to any understanding of personal privacy rights.It’s also an affront to public opinion, as a Pew Research Center Survey last year shows: 93% of adults say that being in control of who can get information about them is important; 74% feel this is “very important,” while 19% say it is “somewhat important.” 90% say that controlling what information is collected about them is important—65% think it is “very important” and 25% say it is “somewhat important.” Despite such overwhelming public sentiment, Republican majorities in both the House and Senate have voted in recent days to scuttle the privacy protections authorized last October by the Federal Communications Commission, protections that were scheduled to take effect later this year. That FCC measure passed on a 3-2 party-line vote, with then-Chairman Tom Wheeler and two Continue reading

IDG Contributor Network: How digital can help create experiences that are truly personal

Each of us has access to more than 10 million products from anywhere at any given time via smartphones and other devices. And companies don’t miss any opportunities to tell us what we personally are supposed to need and use.Typically, this boils down to this: “Many people who are your age or have similar shopping habits were interested in these products or services.” Sometimes, this approach to personalization is helpful, but most of the time, it falls short because it doesn’t get to the bottom of why something is truly relevant to the individual customer.+ Also on Network World: The big picture of digital transformation + In today’s digital world, companies no longer need to rely on this segment-centric and wisdom-of-the-crowd approach. With the technologies at hand, we have the ability to instead look at how individual customers interact with specific products and services and what features they prefer.To read this article in full or to leave a comment, please click here

The granular control over Layer 2 in today’s smart switches might surprise net veterans

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.In the gap between plug and play unmanaged Ethernet switches and fully managed enterprise switches, vendors added the so called “smart switch,” which offer light management features to unmanaged gigabit Ethernet devices. Today, smart switches targeted at small-to-medium-size business run the gamut in terms of manageability and feature sets. The appeal of basic network management features for a small business stems from the need for performance and security. Plug and play and start right away—that’s what every start up wants—then later on, they need basic configurations and features to accommodate growth as needed.To read this article in full or to leave a comment, please click here

The granular control over Layer 2 in today’s smart switches might surprise net veterans

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.In the gap between plug and play unmanaged Ethernet switches and fully managed enterprise switches, vendors added the so called “smart switch,” which offer light management features to unmanaged gigabit Ethernet devices. Today, smart switches targeted at small-to-medium-size business run the gamut in terms of manageability and feature sets. The appeal of basic network management features for a small business stems from the need for performance and security. Plug and play and start right away—that’s what every start up wants—then later on, they need basic configurations and features to accommodate growth as needed.To read this article in full or to leave a comment, please click here