Archive

Category Archives for "Networking"

Large Scale Network Design LiveLesson

Alvaro and I finished recording a new LiveLesson back in December; it should be available for pre-purchase at the end of January. For those folks interested in network design, this is going to be a great video series. We originally started out with the idea of updating Optimal Routing Design, but the project quickly morphed into its “own thing,” which means this video series is actually more of a compliment to ORD, rather than a replacement. Some pieces will be more up-to-date than the book, but there are a number of things covered in the book that are not covered in the video.

Large Scale Network Design LiveLessons takes you through the concepts behind stable, scalable, elegant network design, including modularity, resilience, layering, and security principles. This livelesson will focus on traditional distributed link state, distance vector, and path vector routing protocols, as well as the basic principles of centralized control planes (such as OpenFlow). A special point will be made of sorting out the relationship between policy and reachability, and where they can best be managed in a large scale network.

The post Large Scale Network Design LiveLesson appeared first on 'net work.

When Installs Go Bad…

It’s Thursday, so I think I’ll just leave this here:

...
Info: 0/1/CPU0 (LC) (SDR: Owner)
Proceed with this install operation (y/n)? [y]
RP/0/RSP0/CPU0:Dec 16 08:29:48.835 : instdir[255]:
%INSTALL-INSTMGR-4-INSTALL_OPERATION_WARNING :
A warning occurred during install operation 19. See
'show install log 19 detail' for more information.

Info: Install Method: Parallel Reload
The install operation will continue asynchronously.
RP/0/RSP0/CPU0:us-atl01-z1rt01(admin)#
RP/0/RSP0/CPU0:us-atl01-z1rt01(admin)#
RP/0/RSP0/CPU0:us-atl01-z1rt01(admin)#show install log 19 detail
Fri Dec 16 08:30:10.472 UTC
No log information available

Log Message Not So Helpful

Well, it made me smile, anyway.

If you liked this post, please do click through to the source at When Installs Go Bad… and give me a share/like. Thank you!

IDG Contributor Network: SADA Systems grows its cloud consulting business

Cloud. Despite all the hype about it being super easy, being self service and having a low on-ramp, the reality is service providers often still need to help organizations with the move to the cloud.You can tell an area is getting widespread attention when the large consulting firms start pricking up there ears. And so it is with cloud computing, where we have seen over the past few years the large consulting firms (both the “big four” accounting firms and the more traditional IT consulting firms) building out cloud computing service offerings—either from within or via strategic acquisitions of service providers.+ Also on Network World: Cloud adoption soars, but integration challenges remain + A good example of this came in 2015 when Accenture acquired Cloud Sherpas, a Salesforce and Amazon Web Services (AWS) consulting partner that had grown rapidly over the preceding years via a number of acquisitions and mergers.To read this article in full or to leave a comment, please click here

Secdo automates alert investigation with preemptive incident response  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   “We don’t receive enough alerts in our security operations center,” said no security analyst ever. The fact is, most SOC teams are overwhelmed with security alerts and they must prioritize which ones to investigate. Many alerts are simply ignored for lack of resources, yet quite often after a data breach it turns out there was an alert pointing at the breach early on. In the case of one prominent breach at a major retailer a few years ago, many sources report that a FireEye tool generated an alert confirming that malicious software showed up on a company system. Because so many of those particular alerts were false positives, it was ignored, which subsequently led to one of the largest and most costly retail data breaches in history.To read this article in full or to leave a comment, please click here

Secdo automates alert investigation with preemptive incident response  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   “We don’t receive enough alerts in our security operations center,” said no security analyst ever. The fact is, most SOC teams are overwhelmed with security alerts and they must prioritize which ones to investigate. Many alerts are simply ignored for lack of resources, yet quite often after a data breach it turns out there was an alert pointing at the breach early on. In the case of one prominent breach at a major retailer a few years ago, many sources report that a FireEye tool generated an alert confirming that malicious software showed up on a company system. Because so many of those particular alerts were false positives, it was ignored, which subsequently led to one of the largest and most costly retail data breaches in history.To read this article in full or to leave a comment, please click here

‘Best-kept secret in SD-WAN’ publicly rolls out managed service

A Maryland-based EchoStar subsidiary best known as a provider of network management services announced today that it will offer a managed SD-WAN product as part of its HughesON lineup. Hughes Network Systems’ new Hughes Managed SD-WAN is aimed at distributed businesses that mostly use broadband communications, simplifying the management of those connections and ensuring that demanding applications like video run smoothly. MORE ON NETWORK WORLD: Switches coming out this year will drive open networking forward + Trump turns to H-1B advocates for adviceTo read this article in full or to leave a comment, please click here

‘Best-kept secret in SD-WAN’ publicly rolls out managed service

A Maryland-based EchoStar subsidiary best known as a provider of network management services announced today that it will offer a managed SD-WAN product as part of its HughesON lineup. Hughes Network Systems’ new Hughes Managed SD-WAN is aimed at distributed businesses that mostly use broadband communications, simplifying the management of those connections and ensuring that demanding applications like video run smoothly. MORE ON NETWORK WORLD: Switches coming out this year will drive open networking forward + Trump turns to H-1B advocates for adviceTo read this article in full or to leave a comment, please click here

27% ASUS VivoStick TS10-B017D Intel Atom Z8350 – Deal Alert

The innovative ASUS VivoStick plugs directly into an HDMI port to turn any HDMI monitor into a productive Windows 10 PC or any TV into an enhanced Smart TV. With 802.11ac Wi-Fi, Bluetooth 4.1, VivoRemote mobile app and USB 2.0 & 3.0 ports, VivoStick uniquely combines versatility and portability, and measures only 5.3” x 1.4” x 0.6”. See the discounted VivoStick on Amazon, where its typical list price of $119 has been reduced to $87.To read this article in full or to leave a comment, please click here

BrandPost: DevOps salaries: Puppet’s report reveals salary trends are up

Originally posted on the Puppet blog, and republished here with Puppet's permission.Interested to see how DevOps salary trends are changing? Download Puppet’s DevOps Salary Report, which offers analysis about DevOps salaries from the 4,600-plus people we surveyed for the 2016 State of DevOps Report. By the way, if you haven't read the State of DevOps report yet, it's a compelling dive into how much better DevOps organizations are doing, compared with their peers — and how they achieve such excellent results.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Data protection and security: What’s in store for 2017?

Every second, new updates occur in the world of technology. Information is easier to access, online searches load faster, and mobile and web payments are now simplified and common. Consumers and companies want the ability to do everything online—store documents, make payments, brainstorm ideas for expansion and growth—using remote servers and cloud-storing software.On the flip side, this demand for instant access and connectivity means ample opportunities for hackers to score. In response, technology developers are working at record speeds to keep data secure.+ Also on Network World: 2017 breach predictions: The big one is inevitable + But it isn’t an easy task. Consumers want the feeling of added security, but they don't want to deal with extra steps to protect themselves. Case in point, you have passwords for apps and logins to bank accounts, credit cards, Starbucks, and more on your phone. Now, with Apple's Touch ID, you can set up access with a single login method—your fingerprint. Is that more or less secure? Or is it simply preferred because of its ease of use? All a hacker needs to do is replicate your fingerprint and they have instant access.To read this article in full or to Continue reading

IDG Contributor Network: Data protection and security: What’s in store for 2017?

Every second, new updates occur in the world of technology. Information is easier to access, online searches load faster, and mobile and web payments are now simplified and common. Consumers and companies want the ability to do everything online—store documents, make payments, brainstorm ideas for expansion and growth—using remote servers and cloud-storing software.On the flip side, this demand for instant access and connectivity means ample opportunities for hackers to score. In response, technology developers are working at record speeds to keep data secure.+ Also on Network World: 2017 breach predictions: The big one is inevitable + But it isn’t an easy task. Consumers want the feeling of added security, but they don't want to deal with extra steps to protect themselves. Case in point, you have passwords for apps and logins to bank accounts, credit cards, Starbucks, and more on your phone. Now, with Apple's Touch ID, you can set up access with a single login method—your fingerprint. Is that more or less secure? Or is it simply preferred because of its ease of use? All a hacker needs to do is replicate your fingerprint and they have instant access.To read this article in full or to Continue reading

IDG Contributor Network: Salesforce’s Patrick Flynn: IT key to improving data center sustainability

One of the fundamental tenets of efficient IT and its achievement is inclusion of a variety of stakeholders within IT and the data center. But it also involves engaging and understanding finance, risk and sustainability.Patrick Flynn, director of sustainability at Salesforce, is a known figure at conferences, committees and working groups. His TED Talk, Mankind’s BIGGEST Story, is a compelling reflection on infrastructure and the internet in the larger context of history and purpose. Flynn is also a key proponent of the Future of Internet Power initiative.To read this article in full or to leave a comment, please click here

Attackers start wiping data from CouchDB and Hadoop databases

It was only a matter of time until ransomware groups that wiped data from thousands of MongoDB databases and Elasticsearch clusters started targeting other data storage technologies. Researchers are now observing similar destructive attacks hitting openly accessible Hadoop and CouchDB deployments.Security researchers Victor Gevers and Niall Merrigan, who monitored the MongoDB and Elasticsearch attacks so far, have also started keeping track of the new Hadoop and CouchDB victims. The two have put together spreadsheets on Google Docs where they document the different attack signatures and messages left behind after data gets wiped from databases.To read this article in full or to leave a comment, please click here

Attackers start wiping data from CouchDB and Hadoop databases

It was only a matter of time until ransomware groups that wiped data from thousands of MongoDB databases and Elasticsearch clusters started targeting other data storage technologies. Researchers are now observing similar destructive attacks hitting openly accessible Hadoop and CouchDB deployments.Security researchers Victor Gevers and Niall Merrigan, who monitored the MongoDB and Elasticsearch attacks so far, have also started keeping track of the new Hadoop and CouchDB victims. The two have put together spreadsheets on Google Docs where they document the different attack signatures and messages left behind after data gets wiped from databases.To read this article in full or to leave a comment, please click here

Dictionary: Despondent

Despondent: a deep dejection arising from the conviction of the uselessness of further effort.

A perfect word of current state of Enterprise IT.


Definition of despondent : feeling or showing extreme discouragement, dejection, or depression

despondent : in low spirits from loss of hope or courage

The post Dictionary: Despondent appeared first on EtherealMind.

4 Critical Internet Questions The G20 Leaders Will Debate in 2017

Last week was the “Key Issues for Digital Transformation in the G20” event, a joint conference between the OECD and the German government setting the stage for the G20 meeting later this year in Hamburg, Germany. As an international forum gathering the world’s twenty major economies this is as much a political event as a thermometer on the major concerns that will drive international ICT policy in the near future.

Constance Bommelaer de Leusse

More proof the cloud is winning big

One way to track the growth of cloud computing is to follow the investments in the infrastructure and equipment that make it run. That’s why IDC’s Worldwide Quarterly Cloud IT Infrastructure Tracker is so revealing.The cloud is growing faster According to the IDC report, total spending on IT infrastructure products—including server, enterprise storage and Ethernet switches—for use in cloud environments will grow a healthy 18 percent this year to top $44 billion. Meanwhile, IDC said, investment in old-school non-cloud architecture equipment will actually decline by more than 3 percent in 2017.To read this article in full or to leave a comment, please click here