Archive

Category Archives for "Networking"

Pitfalls of identity access management

TrackingImage by ThinkstockIt is easy to overlook identity access management as static infrastructure in the background, and that's the chief problem: Too few organizations treat IAM as the crucial, secure connective tissue between businesses' multiplying employees, contractors, apps, business partners and service providers. Aaron Perry, president at Focal Point Data Risk, runs through some of IAM’s pitfalls.To read this article in full or to leave a comment, please click here

Pitfalls of identity access management

TrackingImage by ThinkstockIt is easy to overlook identity access management as static infrastructure in the background, and that's the chief problem: Too few organizations treat IAM as the crucial, secure connective tissue between businesses' multiplying employees, contractors, apps, business partners and service providers. Aaron Perry, president at Focal Point Data Risk, runs through some of IAM’s pitfalls.To read this article in full or to leave a comment, please click here

Pitfalls of identity access management

TrackingImage by ThinkstockIt is easy to overlook identity access management as static infrastructure in the background, and that's the chief problem: Too few organizations treat IAM as the crucial, secure connective tissue between businesses' multiplying employees, contractors, apps, business partners and service providers. Aaron Perry, president at Focal Point Data Risk, runs through some of IAM’s pitfalls.To read this article in full or to leave a comment, please click here

10 Unix commands every Mac and Linux user should know

GUIs are great—we wouldn’t want to live without them. But if you’re a Mac or Linux user and you want to get the most out of your operating system (and your keystrokes), you owe it to yourself to get acquainted with the Unix command line. Point-and-click is wonderful whenever you need to do something once or twice. But if you need to repeat that task many times, the command line is your savior.The command line is a window into the full, awesome power of your computer. If you long to break free of the constraints of the GUI or think that programming or administering remote machines is in your future, then learning the Unix command line is definitely for you.To read this article in full or to leave a comment, please click here

The pitfalls of cybersecurity shopping: hype and shoddy products

There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats.It isn’t a new strain of ransomware. It’s the cybersecurity industry itself.It's ironic, but the products vendors sell, and the marketing they use, sometimes leave buyers misinformed and less secure, according to several business directors who actually buy the tech.   “There’s definitely a lot of vaporware,” said Damian Finol, an IT security manager at a major internet company. “There are definitely products that have really exaggerated claims about what they actually do.”For some vendors, it's more about the sale than about security, IT executives say. To close a deal, bad vendors tend to overpromise features that they claim will be added down the line but never materialize. That makes a buyer's job harder.To read this article in full or to leave a comment, please click here

Top tips for finding the right cybersecurity products

Having trouble finding the right security products for your business? You’re not the only one.Today’s market is filled with hundreds of vendors and plenty of marketing hype. But figuring out which solutions are worthwhile can be a challenge, especially for businesses with little experience in cybersecurity.  So we asked actual buyers of enterprise security products for tips, and here’s what they said.  Damian Finol, security technical program manager at a major internet firm Businesses have to do their research. That means looking at customer recommendations instead of relying on what vendors say. Testing the security products in house is also highly advised.To read this article in full or to leave a comment, please click here

The pitfalls of cybersecurity shopping: hype and shoddy products

There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats.It isn’t a new strain of ransomware. It’s the cybersecurity industry itself.It's ironic, but the products vendors sell, and the marketing they use, sometimes leave buyers misinformed and less secure, according to several business directors who actually buy the tech.   “There’s definitely a lot of vaporware,” said Damian Finol, an IT security manager at a major internet company. “There are definitely products that have really exaggerated claims about what they actually do.”For some vendors, it's more about the sale than about security, IT executives say. To close a deal, bad vendors tend to overpromise features that they claim will be added down the line but never materialize. That makes a buyer's job harder.To read this article in full or to leave a comment, please click here

Top tips for finding the right cybersecurity products

Having trouble finding the right security products for your business? You’re not the only one.Today’s market is filled with hundreds of vendors and plenty of marketing hype. But figuring out which solutions are worthwhile can be a challenge, especially for businesses with little experience in cybersecurity.  So we asked actual buyers of enterprise security products for tips, and here’s what they said.  Damian Finol, security technical program manager at a major internet firm Businesses have to do their research. That means looking at customer recommendations instead of relying on what vendors say. Testing the security products in house is also highly advised.To read this article in full or to leave a comment, please click here

25 geek-inspired gifts for Mother’s Day

To mom, with loveImage by Ultimate Ears, Looking Glass Design, ThinkGeek, Vik Muniz and MoMA StoreIf you're looking for Mother’s Day gift ideas that are less about gadgets and more about stellar product design, this is the collection for you. The tech quotient is low, but the design bar is high. The creators are artists, craftspeople and industrial designers – and their inspiration comes from science, technology, engineering and math.To read this article in full or to leave a comment, please click here

Learning Python: Week2 (Printing, Numbers, and Lists) -Part 5

As discussed in post  ( https://crazyrouters.wordpress.com/2017/02/25/learning-python-kirk-byers-python-course/  ) , i will be sharing the my learning on weekly basis as course continues. This will not only motivate me but also help others who are in phase of learning python 3. This post will focus on Exercise 4. ################# Exercise 4 ############# IV. You have the following […]

Promoting Digital Accessibility in Sri Lanka

Starting December 2015, the Internet Society Asia-Pacific (ISOC APAC) Bureau in collaboration with local stakeholders including government, industry and the civil society, has led a series of endeavours to help further digital accessibility in Pakistan.

Building on the success of our work in Pakistan, and in an effort to replicate the learnings in other parts of the Asia-Pacific, we recently held a workshop on digital accessibility in Colombo, Sri Lanka, hosted by the ISOC Sri Lanka chapter.

Mr. Naveed Haq

Trade commission finds Arista infringed on two original Cisco patents

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Trade commission finds Arista infringed on two original Cisco patents

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

CCIE Renewed Again – Exam 400-101 v5.1

It came around again: CCIE renewal. Last time I renewed, I wasn’t sure if I should do it again. But I gave in, passed the CCIE R&S Written Exam, and moved one step closer to Emeritus. Turns out it wasn’t that bad, and I should not have put it off for so long.

Renewal Cycle

Cisco certifications below Expert level have a 3-year renewal cycle. You can renew your CCNA or CCNP certifications at any time by sitting an exam at the same level. Your 3-year cycle restarts from the day you pass that exam.

CCIE is a little different. A CCIE certification remains valid for two years from your lab date. You can sit any CCIE-level written exam to renew your CCIE certification. At that point your validity date gets extended for another two years – note that it is another two years based upon your lab date, not the date you passed your most recent re-cert exam.

If you don’t pass a written exam during the two-year period, your status goes to “Suspended.” You then have another 12 months to pass the exam, or you completely lose your CCIE status.

My renewal date was last Continue reading

Cisco Live US 2017 – Saturday Adventure

For the last couple years, on the Saturday before Cisco Live US kicks off, we like to go and do something in the host city.  Nothing big.  Nothing fancy.  Just something we aren’t going to be able to do once the conference gets going.  In San Diego, we went to the zoo.  Last year, we went to the National Atomic Testing Museum.  This year, we’re going to the National Museum of Organized Crime and Law Enforcement…aka, the Mob Museum.

It’s Vegas.  This placed used to be full of mobsters doing some unsavory things.  I like to think it’s a bit more legit these days, but it’ll be fun to see how the mob and the law danced around back in the day.  It’s in the old historic post office and courthouse a couple block off Fremont Street and is complete with full courtroom and the wall where the Saint Valentine’s Day Massacre occurred. I should be a good time assuming we make it past the police lineup.

All are invited.  If you want to join us, drop me a message on Twitter.  We’ll probably meet for lunch then head over there in the early afternoon.  Or head over there for lunch. Continue reading