Archive

Category Archives for "Networking"

Response: AT&T Joins The Linux Foundation as a Platinum Member

Once upon a time its was all vendors in the Linux Foundation.

The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration, today announced that AT&T has become a Platinum member.

This follows news of the company’s contribution of several million lines of ECOMP code to The Linux Foundation, as well as the new Open Network Automation Platform (ONAP) Project based on production-ready code from AT&T and OPEN-O contributors.

Are we really seeing a resurgence of customers doing it for themselves ? In particular, customers that are far larger than the traditional IT vendors are staking out positions in the open source community.

Link: AT&T Joins The Linux Foundation as a Platinum Member | The Linux Foundation – https://www.linuxfoundation.org/announcements/att-joins-linux-foundation-as-a-platinum-member

The post Response: AT&T Joins The Linux Foundation as a Platinum Member appeared first on EtherealMind.

Reaction: The Future is…

This week, I ran across two posts that follow down a path I’ve gone down before—but it is well worth bringing this point up again. Once more into the breach. Tom, over at the Networking Nerd, has this to say on the topic of the future of network engineering—

The syntaxes that power these new APIs aren’t the copyrighted CLIs that networking professionals spend their waking hours memorizing in excruciating detail. JUNOS and Cisco’s “standard” CLI are as much relics of the past as CatOS. At least, that’s the refrain that comes from both sides of the discussion. The traditional networking professionals hold tight to the access methods they have experience with and can tune like a fine instrument. More progressive networkers argue that standardizing around programming languages is the way to go. Why learn a propriety access method when Python can do it for you?

The point Tom makes is this: programming is not the future of network engineering. But, but… there is so much pressure, and so many people saying “if you do not know how to program, you are going to be out of a job in five years.” I think there are negative and positive Continue reading

Windows Insider Program surpasses 10 million users

Microsoft announced that the Windows Insider Program—its global community of testers who run interim builds of Windows 10 and serve as beta testers/guinea pigs for what might be an unstable build on their personal machines—has passed the 10 million mark.It's taken a while to get here after a fast start. The program launched in September 2014 with the modest hopes of getting 400,000 enthusiasts on board. Instead, it hit 1 million after a few weeks. Back in August 2015, the number stood at 6 million people, and less than a month later Microsoft said it was up to 7 million.RELATED: 11 hidden tips and tweaks for Windows 10 Then things got quiet. Clearly an 18-month lag between the 7 million and 10 million mark means things plateaued, and perhaps Microsoft didn't want to admit it. To read this article in full or to leave a comment, please click here

LastPass is scrambling to fix another serious vulnerability

For the second time in two weeks developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or infect computers with malware.Like the LastPass flaws patched last week, the new issue was discovered and reported to LastPass by Tavis Ormandy, a researcher with Google's Project Zero team. The researcher revealed the vulnerability's existence in a message on Twitter, but didn't publish any technical details about it that could allow attackers to exploit it.To read this article in full or to leave a comment, please click here

LastPass is scrambling to fix another serious vulnerability

For the second time in two weeks developers of the popular LastPass password manager are working to fix a serious vulnerability that could allow malicious websites to steal user passwords or infect computers with malware.Like the LastPass flaws patched last week, the new issue was discovered and reported to LastPass by Tavis Ormandy, a researcher with Google's Project Zero team. The researcher revealed the vulnerability's existence in a message on Twitter, but didn't publish any technical details about it that could allow attackers to exploit it.To read this article in full or to leave a comment, please click here

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.During the second half of 2016, the increase in smartphone infections was 83% following on the heels of a 96% increase during the first half of the year, according to Nokia’s latest Mobile Threat Intelligence Report gathered from devices on which Nokia NetGuard Endpoint Security is deployed in Europe, North America, Asia Pacific and the Middle East.+More on Network World:  Cisco Talos warns of Apple iOS and MacOS X.509 certificate flaw+To read this article in full or to leave a comment, please click here

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.During the second half of 2016, the increase in smartphone infections was 83% following on the heels of a 96% increase during the first half of the year, according to Nokia’s latest Mobile Threat Intelligence Report gathered from devices on which Nokia NetGuard Endpoint Security is deployed in Europe, North America, Asia Pacific and the Middle East.+More on Network World:  Cisco Talos warns of Apple iOS and MacOS X.509 certificate flaw+To read this article in full or to leave a comment, please click here

Comparing Docker compose versions

In this blog, I have captured some of my learnings on Docker compose files and how they differ between versions. Docker compose is a tool used for defining and running multi-container Docker applications. I have used the famous multi-container voting application to illustrate the differences with compose versions. Following are some questions that I have to … Continue reading Comparing Docker compose versions

44% off Smartphone Screen Magnifier with Foldable Stand – Deal Alert

Enlarge your smartphone's display and watch a bigger screen at a longer distance, minimizing eye fatigue. The magnifier with integrated stand is designed to be foldable, lightweight and portable. It currently averages 4.5 out of 5 stars from almost 500 reviewers on Amazon (read reviews), where its list price of $26.99 is currently discounted 44% to just $14.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

How politics is impacting your company’s productivity

It's difficult to escape politics in America -- the Trump administration dominates the network news cycle, social media feeds and nearly every corner of pop culture. And it's starting to affect the workplace, according to a survey of 500 full-time U.S. employees by Wakefield Research in conjunction with BetterWorks, a company that offers performance management software.The results found that 87 percent of employees "read political social media posts at work," while 80 percent said they have discussed politics with professional contacts or colleagues. Meanwhile, nearly half said they had seen a political conversation turn into an argument at work.To read this article in full or to leave a comment, please click here

What is Free Retake? I offer Free CCDE Bootcamp Retake

Many people have been asking about Free Retake. I provide Free Retake for my Instructor Led CCDE Training. But what is it ?   Why it is important ?   Who benefit from it ?   Is there a limit for free retake ?     When you register to my Instructor Led bootcamp, which […]

The post What is Free Retake? I offer Free CCDE Bootcamp Retake appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Study finds devices are not wiped properly

As an individual, you might have an old smartphone or tablet sitting around your house collecting dust. Before recycling it, you hire a company to wipe the drive clean of any personally identifiable information. With the storage on today’s smartphones, there could be credit card information sitting in the background.You feel relieved as you pass off the device to be cleaned. A load off your shoulders, you have taken another item out of your house that was cluttering up the living room. Right? Well the device might be gone, but the data might still live on.The National Association for Information Destruction (NAID) found such in a recent study that revealed 40 percent of the devices the group bought on secondhand markets had PII on them. NAID, which is an international watchdog trade and non-profit trade association for the secure destruction industry, conducting the study in the first quarter of this year.To read this article in full or to leave a comment, please click here

Study finds devices are not wiped properly

As an individual, you might have an old smartphone or tablet sitting around your house collecting dust. Before recycling it, you hire a company to wipe the drive clean of any personally identifiable information. With the storage on today’s smartphones, there could be credit card information sitting in the background.You feel relieved as you pass off the device to be cleaned. A load off your shoulders, you have taken another item out of your house that was cluttering up the living room. Right? Well the device might be gone, but the data might still live on.The National Association for Information Destruction (NAID) found such in a recent study that revealed 40 percent of the devices the group bought on secondhand markets had PII on them. NAID, which is an international watchdog trade and non-profit trade association for the secure destruction industry, conducting the study in the first quarter of this year.To read this article in full or to leave a comment, please click here

People may have been wrongly imprisoned due to faulty ankle bracelet tracking devices

If you were required to wear an ankle bracelet tracking device for electronic monitoring purposes, can you imagine how the conversation with police or probation officers would go if the device falsely notified them that you had tried to tamper with the strap to remove it?It’s doubtful you would be believed if you tried to blame it on glitchy or defective technology. Yet in the U.K., some offenders may have been wrongly sent back to prison after defective ankle bracelets alerted the authorities that they had been tampered with.The U.K. government admitted that ankle bracelets “used to electronically monitor offenders and suspects with a curfew” may have given false tamper reports to authorities and resulted in some people being wrongly imprisoned.To read this article in full or to leave a comment, please click here

People may have been wrongly imprisoned due to faulty ankle bracelet tracking devices

If you were required to wear an ankle bracelet tracking device for electronic monitoring purposes, can you imagine how the conversation with police or probation officers would go down if the device falsely notified them that you had tried to tamper with the strap to remove it, when in fact you had not? It’s doubtful you would be believed if you tried to blame it on glitchy or defective technology. Yet in the UK, some offenders may have been wrongly sent back to prison after defective ankle bracelets alerted the authorities that they had been tampered with.The UK government admitted that ankle bracelets “used to electronically monitor offenders and suspects with a curfew” may have given false tamper reports to authorities and resulted in some people being wrongly imprisoned.To read this article in full or to leave a comment, please click here