Archive

Category Archives for "Networking"

Securing the smart home

Editor’s Note: First in a series of articles on the best ways to deploy and secure smart home technologyLast fall, we saw the rise of the weaponized smart device as the Mirai botnet compromised webcams and other Internet-connected things. Then in February, VIZIO agreed to pay a $2.2 million fine to the FTC for collecting the viewing histories of 11 million smart TV users without their knowledge or consent.To read this article in full or to leave a comment, please click here(Insider Story)

10 hidden features in the new Windows 10 Creators Update

Microsoft’s big Windows 10 refresh, the Creators Update, is slated for release on April 11, bringing new features, enhancements and applications. The ones that have been getting the most attention revolve around the user interface (tweaks to the Start Menu), new capabilities for Cortana, and 3D design (the Paint 3D app).To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 4.3.17

New products of the weekImage by MicroStrategyOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.JumpStartImage by cloudjumperTo read this article in full or to leave a comment, please click here

WikiLeaks’ Assange gets relief from left victory in Ecuador

The win in Ecuador’s presidential elections of leftist government candidate Lenin Moreno will likely have provided relief to WikiLeaks' founder Julian Assange, who had been threatened with eviction from the country’s embassy in London by the opposition candidate.The election in the South American country had aroused interest in part because the conservative opposition candidate, Guillermo Lasso, had said that if elected he would evict Assange within 30 days of assuming  power, because it was costing the country too much to keep him at the embassy.The embassy is being constantly monitored by U.K. police ever since Assange slipped into it in 2012 and was granted asylum by the Ecuador government. Police say they will arrest Assange if he comes out of the embassy to meet an extradition request from Sweden in connection with an investigation into a sexual assault. Assange supporters are concerned that he may be moved from Sweden to the U.S. to face charges in connection with several leaks of confidential U.S. government information.To read this article in full or to leave a comment, please click here

WikiLeaks’ Assange gets relief from left victory in Ecuador

The win in Ecuador’s presidential elections of leftist government candidate Lenin Moreno will likely have provided relief to WikiLeaks' founder Julian Assange, who had been threatened with eviction from the country’s embassy in London by the opposition candidate.The election in the South American country had aroused interest in part because the conservative opposition candidate, Guillermo Lasso, had said that if elected he would evict Assange within 30 days of assuming  power, because it was costing the country too much to keep him at the embassy.The embassy is being constantly monitored by U.K. police ever since Assange slipped into it in 2012 and was granted asylum by the Ecuador government. Police say they will arrest Assange if he comes out of the embassy to meet an extradition request from Sweden in connection with an investigation into a sexual assault. Assange supporters are concerned that he may be moved from Sweden to the U.S. to face charges in connection with several leaks of confidential U.S. government information.To read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: Button in the rear, true tone in front, inside Jony Ive’s head

Yeah, yeah, Samsung introduced the edge-to-edge and physical-home-buttonless Galaxy S8 Android smartphone this week. Now back to iPhone 8 (or iPhone X) rumors and design concepts...BUTTON ON THE BACK A site called iDrop News (we have "obtained exclusive information from a source with intimate knowledge of Apple’s manufacturing facility") got iPhone 8 buzzers buzzing by posting concept designs of the next flagship Apple smartphone ("the iPhone Edition") with the Touch ID fingerprint sensor on the back of the device, beneath the Apple logo. The idea seems to be that the bezel-less front won't allow for the fingerprint scanner there.To read this article in full or to leave a comment, please click here

Government domain seizure notice on Kodi TV was April Fools’ prank

On Friday March 31 and part of April 1, visitors to kodi.tv saw a US government domain seizure notice as grabbed by the Wayback Machine. It featured logos of the Department of Justice, National Intellectual Property Rights and Homeland Security Investigations above the following message: This domain name has been seized by ICE - Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court under the authority of 18 U.S.C 981 and 2323.Willful copyright infringement is a federal crime that carries penalties for first time offenders of up to five years in federal prison, a $250,000 fine forfeiture and restitution (17 U.S.C 506, 18 U.S.C 2319). Intentionally and knowingly trafficking in counterfeit goods is a federal crime that carries penalties for first time offenders of up to ten years in federal prison, a $2,000,000 fine, forfeiture and restitution (18 U.S.C 2320)To read this article in full or to leave a comment, please click here

Government domain seizure notice on Kodi TV was April Fools’ prank

On Friday March 31 and part of April 1, visitors to kodi.tv saw a US government domain seizure notice as grabbed by the Wayback Machine. It featured logos of the Department of Justice, National Intellectual Property Rights and Homeland Security Investigations above the following message: This domain name has been seized by ICE - Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court under the authority of 18 U.S.C 981 and 2323.Willful copyright infringement is a federal crime that carries penalties for first time offenders of up to five years in federal prison, a $250,000 fine forfeiture and restitution (17 U.S.C 506, 18 U.S.C 2319). Intentionally and knowingly trafficking in counterfeit goods is a federal crime that carries penalties for first time offenders of up to ten years in federal prison, a $2,000,000 fine, forfeiture and restitution (18 U.S.C 2320)To read this article in full or to leave a comment, please click here

Automate When You Can, Program When You Must

I’ve had a general thought I’ve wanted to write about for quite some time now and after just seeing Matt Oswalt’s latest post Learn Programming or Perish(?), the thought finally makes it to paper so to speak in this post. The thought I want to expand on is something I say quite a bit as I talk about network automation. It is automate when you can, program when you must.

After reading Matt’s post, I’ll re-phrase to automate when you can, script when you must specifically targeting network engineers (note: even though this is what I mean, the word script makes it a bit clearer). This is a twist on the network industry’s old saying of switch when you can, route when you must.

Automate When You Can

Automate when you can is saying use some form of tooling when you can to do network automation. Why re-invent the wheel when you don’t have to? I’m a little biased these days, but this means using some form of extensible tooling, preferably open source, that does automation. Some of my favorites right now are Red Hat’s Ansible and Extreme’s StackStorm. However, this could just as well be other open Continue reading

Automate When You Can, Program When You Must

I’ve had a general thought I’ve wanted to write about for quite some time now and after just seeing Matt Oswalt’s latest post Learn Programming or Perish(?), the thought finally makes it to paper so to speak in this post. The thought I want to expand on is something I say quite a bit as I talk about network automation. It is automate when you can, program when you must.

After reading Matt’s post, I’ll re-phrase to automate when you can, script when you must specifically targeting network engineers (note: even though this is what I mean, the word script makes it a bit clearer). This is a twist on the network industry’s old saying of switch when you can, route when you must.

Automate When You Can

Automate when you can is saying use some form of tooling when you can to do network automation. Why re-invent the wheel when you don’t have to? I’m a little biased these days, but this means using some form of extensible tooling, preferably open source, that does automation. Some of my favorites right now are Red Hat’s Ansible and Extreme’s StackStorm. However, this could just as well be other open Continue reading

News at Last: It’s Extreme

We have news at last: Extreme Networks is acquiring Brocade’s Data Center Networking business. This includes the SLX, VDX and MLXe routing and switching product lines, Network Visibility and Analytics products, and most importantly, my team: StackStorm.

Extreme Networks has been around a long time – they were founded in 1996, the same year as Foundry, which was acquired by Brocade in 2008, and became my business unit. They’ve had ups and downs over the years, but business is going well right now. Their share price is up, and they have been on an acquisition spree recently, acquiring Zebra Wireless, and 3 weeks ago announcing their intention to acquire Avaya Networking.

This gives them all the pieces to provide end-to-end IP networking solutions, and gives them scale to compete.

The deal is expected to close 60 days after Broadcom completes its acquisition of Brocade, which is scheduled to happen by July 30. Until then we will continue to operate as separate businesses. We don’t know exactly what it will mean for my team, but given that network automation was explicitly mentioned in investor call, we should find a good home.

The legal nature of the company means that it Continue reading

News at Last: It’s Extreme

We have news at last: Extreme Networks is acquiring Brocade’s Data Center Networking business. This includes the SLX, VDX and MLXe routing and switching product lines, Network Visibility and Analytics products, and most importantly, my team: StackStorm.

Extreme Networks has been around a long time - they were founded in 1996, the same year as Foundry, which was acquired by Brocade in 2008, and became my business unit. They’ve had ups and downs over the years, but business is going well right now. Their share price is up, and they have been on an acquisition spree recently, acquiring Zebra Wireless, and 3 weeks ago announcing their intention to acquire Avaya Networking.

This gives them all the pieces to provide end-to-end IP networking solutions, and gives them scale to compete.

The deal is expected to close 60 days after Broadcom completes its acquisition of Brocade, which is scheduled to happen by July 30. Until then we will continue to operate as separate businesses. We don’t know exactly what it will mean for my team, but given that network automation was explicitly mentioned in investor call, we should find a good home.

The legal nature of the company means that it Continue reading

April Fools from the tech industry

There’s nothing like a giant, powerful technology company really letting its collective hair down with a goofy April Fools’ announcement. Do you think that we’re fooled, giant, powerful technology companies? We see you there, lurking behind your jolly masks. Anyway, here’s the 2017 installment of this collective exercise in well-choreographed image management. Enjoy.The iFixit micro toolkit The specialist tools that iFixit uses for its widely watched teardowns of most major smartphone and tablet releases are neat, without question – so here’s a teeny little set of them, meant for use by hamsters. No, really. Watch the video.To read this article in full or to leave a comment, please click here

Google April Fool’s jokes for 2017 – graded for additional humor

Tech companies like to get into April Fool’s day – those whimsical titans of capitalism – and nobody gets into it in a bigger way than Google, which rolls out a solid handful of gags every year, some of which are even interactive.This year is no exception, as the search titan deploys its finest humor modules to delight us for a day before going back to trying to manage all the information on earth in a totally non-creepy way.ALSO ON NETWORK WORLD:  White House to issue commemorative solar eclipse safety glassesTo read this article in full or to leave a comment, please click here

5 ways you can lower data center TCO

To build an affordably scalable data center network, we believe that disaggregation with Cumulus Linux is the ideal networking solution (for obvious reasons). If you haven’t made the jump to open networking, we recommend you read our total cost of ownership (TCO) report, which covers how our customers saved up to 60% by making the switch. For the rest of you that have already come to the light (we prefer calling it the green), we’ve put together a few tips for optimizing your data center network for increased efficiency and lower data center TCO.

  1. Optimize your cables and optics
    The cost of optics varies greatly. If you’re running high-cost optics, we recommend doing your research and seeing if there is a lower-cost option that will suit your needs. As switches become denser, the optics and cables can actually cost more than the switches themselves — especially with proprietary, locked-in options from traditional vendors. Most traditional vendors source their optics from third-party manufacturers and then add a premium. When open optics are sourced directly from ODMs, you can reduce the cost of cables and optics by 50% to 70%.
  2. Automate like a boss
    Most organizations are doing some form of Continue reading