Archive

Category Archives for "Networking"

The Questions We Ask of Networks

The Questions We Ask of Networks Two weeks ago, a blog entitled Towards Machine Learning in Networking: Benefits Begin Now discussed machine learning in networking, and was based on a podcast given on the same topic. It was fun to have some discussion about what the next steps are, and how close we may be to networks that “machine learn” (ML)... Read more →

15% off Xbox One S 1TB Console, Halo Wars 2 Bundle – Deal Alert

Real-time strategy makes an explosive return to the Halo universe with Halo Wars 2: Ultimate Edition, included as a full game download for Xbox One and Windows 10. This bundle also comes with the Halo Wars 2: Season Pass, featuring six months of additional content, plus Halo Wars: Definitive Edition, an enhanced version of the real-time strategy classic-all as full game downloads for Xbox One and Windows 10 PC. Watch 4K Blu-ray movies and stream Netflix in 4K Ultra HD. Experience richer, more luminous colors in games and video with HDR. And play a growing library of Xbox 360 games with advanced features like Game DVR and in-home streaming to Windows 10. The bundle's price has been discounted, for now, to $299 on Amazon. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

9 lies programmers tell themselves

Programmers have pride with good reason. No one else has the power to reach into a database and change reality. The more the world relies on computers to define how the world works, the more powerful coders become.Alas, pride goeth before the fall. The power we share is very real, but it’s far from absolute and it’s often hollow. In fact, it may always be hollow because there is no perfect piece of code. Sometimes we cross our fingers and set limits because computers make mistakes. Computers too can be fallible, which we all know from too much firsthand experience.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what’s hot in programming and what’s going cold. | Keep up with hot topics in programming with InfoWorld’s App Dev Report newsletter. ] Of course, many problems stem from assumptions we programmers make that simply aren’t correct. They’re usually sort of true some of the time, but that’s not the same as being true all of the time. As Mark Twain supposedly said, “It ain’t what you don’t know that gets you into Continue reading

6 soft skills employers should be looking for in tech talent

Forget experience and hard skills -- tomorrow's best talent will need soft skills, and it's fact that sourcing and recruiting pros need to be prepared to address."From our own LinkedIn research last May, we know that, of 291 hiring managers we surveyed, their employers struggle to find candidates with the right soft skills for 59 percent of their open jobs, and 58 percent said the lack of soft skills among candidates was 'limiting their company's productivity,'" says Jennifer Shappley, senior director of talent acquisition at LinkedIn at a presentation at SourceCon, held earlier this month in Anaheim, Calif.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

BrandPost: The Smart Business Case for Open-Network Automation

Lines of business demand agility, and IT teams that utilize legacy infrastructure and operations face hard limits on how agile they can be. Automating and integrating networking tasks streamlines operations and makes the network much easier to manage, minimizing downtime caused by human error while increasing organizational agility and efficiency. But implementing network-wide automation that also integrates with cross-domain technologies presents three primary challenges.Challenge 1: Vendor Lock-in. Vendor-specific network automation solutions may not completely address your organization’s unique automation needs and they lock you into the vendor's strategy and goals rather than your own. The result is often a flawed approach that doesn’t align and support your organization’s business and technical objectives.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 6 reasons why Slack is the next Netscape

Netscape provides an excellent illustration as to how tech darlings come and go.Netscape created and sold Navigator, the browser that essentially invented the World Wide Web. Prior to Netscape, the internet was mostly benefiting geeks and nerds. Netscape changed the world by transforming the internet into the mass-market, browser-powered online world we know and love today.Netscape’s original business model was to sell licenses for its Navigator browser. It was just over a year old when it had its IPO on Aug. 9, 1995. And in its first day of trading, the stock went from $28 to as high as $74.75, giving the company a value in the billions.To read this article in full or to leave a comment, please click here

Hyperconverged storage: Are your network and team up to the task?

There is reality in the hype that moving to a converged storage environment can produce major cost savings while paving the path to advanced virtualization technologies. Part of the appeal comes from the ability to use commodity servers and storage to build a shared storage pool vs. relying on a dedicated appliance that typically comes at a pretty substantial premium. Increased flexibility is another reason for moving in this direction. IT teams gain greater options in how they configure server and storage nodes to meet workload and application demands. Adjusting configurations is straightforward, so adding more disks to nodes is a pretty easy task. To read this article in full or to leave a comment, please click here

Hyperconverged storage: Are your network and team up to the task?

There is reality in the hype that moving to a converged storage environment can produce major cost savings while paving the path to advanced virtualization technologies. Part of the appeal comes from the ability to use commodity servers and storage to build a shared storage pool vs. relying on a dedicated appliance that typically comes at a pretty substantial premium. Increased flexibility is another reason for moving in this direction. IT teams gain greater options in how they configure server and storage nodes to meet workload and application demands. Adjusting configurations is straightforward, so adding more disks to nodes is a pretty easy task. To read this article in full or to leave a comment, please click here

New products of the week 3.27.17

New products of the weekImage by Array NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetCrunch Tools 2.0Image by adremTo read this article in full or to leave a comment, please click here

UK official wants police access to WhatsApp messages

A senior U.K. official is asking that law enforcement should be given access to encrypted messages on WhatsApp and similar services, a demand that is likely to fuel an ongoing debate over whether companies should create backdoors into their encryption technologies for investigators.Khalid Masood, the terrorist who killed four people outside Parliament on Wednesday, had sent a message on WhatsApp a little before the attack, according to reports.“We need to make sure that organizations like WhatsApp, and there are plenty of others like that, don't provide a secret place for terrorists to communicate with each other,” Home Secretary Amber Rudd said on BBC One's Andrew Marr Show on Sunday.To read this article in full or to leave a comment, please click here

UK official wants police access to WhatsApp messages

A senior U.K. official is asking that law enforcement should be given access to encrypted messages on WhatsApp and similar services, a demand that is likely to fuel an ongoing debate over whether companies should create backdoors into their encryption technologies for investigators.Khalid Masood, the terrorist who killed four people outside Parliament on Wednesday, had sent a message on WhatsApp a little before the attack, according to reports.“We need to make sure that organizations like WhatsApp, and there are plenty of others like that, don't provide a secret place for terrorists to communicate with each other,” Home Secretary Amber Rudd said on BBC One's Andrew Marr Show on Sunday.To read this article in full or to leave a comment, please click here

Configuring Microsoft NPS for Aerohive 802.1X Authentication

This post is a starting point for anyone who wants to use 802.1X authentication with Aerohive APs and Microsoft NPS. I will provide configuration screen shots for both of Aerohive’s management platforms and for NPS running on Microsoft Windows 2008 Server. It is not intended to be an exhaustive guide, but should be a decent starting point. Every implementation will be different in some respect, and some of these steps may not be the exact manner in which you configure Microsoft NPS. The steps for Aerohive may also be different depending on what you are trying to accomplish. I’ll make sure to note my particular scenario when appropriate.

Versions Used:

HiveManager Classic/HM6/HMOL – 6.8r7a

HiveManager NG – 11.19.99.0 (March 2017)

Microsoft Windows 2008 Server

Assumptions:

  1. Basic understanding of navigation within the HiveManager Classic and/or NG interface.
  2. No RADIUS objects or user profiles for 802.1X authentication have been configured within HiveManager Classic or NG. If you have already configured some of them, just skip the steps that cover the creation of those objects.
  3. Microsoft NPS is installed and a server certificate for the NPS machine has been issued and installed.

Scenario

Company XYZ wants to authenticate Continue reading

Learn Programming or Perish(?)

I was honored to return to Packet Pushers for a discussion on programming skillsets in the networking industry. I verbalized some thoughts there, but even 60 minutes isn’t enough for a conversation like this.

To be clear, this post is written primarily to my followers in the networking industry, since that’s largely where this conversation is taking place.

Scripting is NOT Programming

I want to put something to rest right now, and that is the conflation of scripting and software development. You may be hesitant to pick up any skills in this area because you feel like you have to boil the ocean in order to be effective, which is not true.

As I briefly mention in the podcast, I spent the first 4 years or so of my career making networking my day job. Because of that, I picked up a lot of useful knowledge in this area. However, as I started to explore software, I realized that networking wasn’t something I wanted to do as a day job anymore, but I still greatly value the networking skillset I retain from this experience.

Making this leap over 2 years ago revealed a multitude of subskills, fundamental knowledge, and daily Continue reading

Learn Programming or Perish(?)

I was honored to return to Packet Pushers for a discussion on programming skillsets in the networking industry. I verbalized some thoughts there, but even 60 minutes isn’t enough for a conversation like this.

To be clear, this post is written primarily to my followers in the networking industry, since that’s largely where this conversation is taking place.

Scripting is NOT Programming

I want to put something to rest right now, and that is the conflation of scripting and software development. You may be hesitant to pick up any skills in this area because you feel like you have to boil the ocean in order to be effective, which is not true.

As I briefly mention in the podcast, I spent the first 4 years or so of my career making networking my day job. Because of that, I picked up a lot of useful knowledge in this area. However, as I started to explore software, I realized that networking wasn’t something I wanted to do as a day job anymore, but I still greatly value the networking skillset I retain from this experience.

Making this leap over 2 years ago revealed a multitude of subskills, fundamental knowledge, and daily Continue reading

Learn Programming or Perish(?)

I was honored to return to Packet Pushers for a discussion on programming skillsets in the networking industry. I verbalized some thoughts there, but even 60 minutes isn’t enough for a conversation like this. To be clear, this post is written primarily to my followers in the networking industry, since that’s largely where this conversation is taking place. Scripting is NOT Programming I want to put something to rest right now, and that is the conflation of scripting and software development.