Archive

Category Archives for "Networking"

Cops to increasingly use digital footprints from IoT devices for investigations

If Mark Stokes, Scotland Yard’s head of digital, cyber and communications forensics unit, is correct, then IoT devices will play an increasingly important role in crime scene investigations. “The crime scene of tomorrow is going to be the internet of things,” Stokes told the Times.The police are being trained to look for “digital footprints” – IoT gadgets that “track or record activities” which might prove or disprove alibis and witness statements as well as record what occurred during a murder victim’s final moments.Cops will be relying on evidence from smart devices which spy on you – such as internet connected refrigerators, light bulbs, washing machines, vacuum cleaners, coffee makers and voice-controlled robotic assistants.To read this article in full or to leave a comment, please click here

Hands on: Dell twists the XPS 13 into a 2-in-1

Dell has just improved its already brilliant XPS 13 -- it will now be available as a 2-in-1, which means the device has the versatility to be a laptop or a tablet. I had the chance to play around with the device prior to CES. It has a clever design and wowed me with its sleek design and edge-to-edge screen, but it won't come cheap. The starting price of the XPS 13 2-in-1 is US$999, and it'll start shipping this month. That's about $200 more than the starting price of the XPS laptop. You are paying more for the versatility of the XPS 13 2-in-1. On the outside, the XPS 13 2-in-1 looks like the XPS 13 laptop, but Dell has changed the hinge connecting the keyboard base and screen. The screen can be rotated 360 degrees to turn the device into a tablet.To read this article in full or to leave a comment, please click here

Face-off: Oracle vs. HPE for data warehousing

IT buyers seeking a data warehouse often compare Oracle's Exadata system with Hewlett Packard Enterprise's Vertica system, according to IT Central Station, an online community where IT managers review enterprise products. And both systems have their fans.To read this article in full or to leave a comment, please click here(Insider Story)

How to hang on to Windows 7 for the long run

If Windows 7 represents peak Windows for you, you’re not alone. Twice as many people use Win7 as use Win10, even after 18 months of Microsoft pressure to get you to give up Win7 and jump to the shiny new version as your operating system of choice.Your reasons for staying with Win7 may range from mere convenience to mental inertia to an abject fear of the Win10 info borg. Whatever your reasons for remaining with Win7, there are steps you can take right now to ensure Win7 keeps working -- at least until Microsoft pulls the plug on security patches, on Jan. 14, 2020. (Yep, that’s a Patch Tuesday.)[ Give yourself a technology career advantage with InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan.15, 2017: Use code 8TIISZ4Z. | The essentials for Windows 10 installation: Download the Windows 10 Installation Superguide today. | Stay up on key Microsoft technologies with the Windows Report newsletter. ] The key, as you might expect, is to stow away a solid “ground zero” full backup. From that point, you should patch judiciously, use incremental backups scrupulously, and tend to the maintenance jobs Continue reading

How to handle business continuity in a crisis

Keeping the lights onImage by ThinkstockMost businesses are critically reliant upon their IT systems. If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a software virus, the results can inflict significant financial harm. In the worst case, the business will be unable to continue functioning.To read this article in full or to leave a comment, please click here

How to handle business continuity in a crisis

Keeping the lights onImage by ThinkstockMost businesses are critically reliant upon their IT systems. If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a software virus, the results can inflict significant financial harm. In the worst case, the business will be unable to continue functioning.To read this article in full or to leave a comment, please click here

Why employees don’t use collaboration tools

Slack exploded onto the scene three years ago, and since then just about everyone from industry giants like Facebook to small groups of open source developers have been getting in on the team collaboration software act.Today the pace of collaboration software development and innovation is frenetic, and according to research by G2 Crowd, a peer-to-peer business review platform, the boom in corporate adoption shows no sign of slowing down in the near future. It found that more than half of all companies have already implemented team collaboration solutions of one kind or another, and 31 percent plan to adopt one in the next two years.To read this article in full or to leave a comment, please click here

Yang Explorer in a Docker container

I would like to see a day come true where all major vendors’ boxes (even small & cheap ones) will be 100% covered by YANG models. Can’t say I believe that it is possible for IETF to standard all the things in vendors domain, but we will manage as long as vendors will stick to standard

My Personal Look Back on 2016

I haven’t ever written a “year in review” type of post before. Sure, I do a post to summarize how the blog has done over the year but I’ve never done a personal look back. Last night–New Years Eve–I was thinking about everything that I was involved in during 2016 and I realized “I should write this down! I was involved in or a participant of some amazing things last year!”

So here we go. In an effort to show a more personal side and not just my geeky side, here is my personal 2016 year in review.

Got Married

In February, my then-girlfriend and I got married! I know everyone says their wedding was the best, but ours totally was! Trust me! ? In all honesty, it was one of the funnest days of my life. Full credit to my wife for planning what was essentially an awesome party with our families and closest friends. Oh, and the venue and staff were absolutely amazing as well which sealed the deal as the greatest wedding ever ?.

Launched a Second Blog

Samples from ispywifi.ca
Samples from ispywifi.ca

For a while now I’ve been in the habit of snapping photos of wireless access points Continue reading

Bringing 2017 To Everyone

calendar

It’s time once again for my traditional New Year’s Day navel gazing. As per tradition with my blog, I’m not going to make prognostications about networking or IT in general. Either I’m going to wind up totally wrong or be totally right and no one will care. I rather enjoy the ride as we go along, so trying to guess what happens is kind of pointless.

Instead, I’m going to look at what I want to accomplish in the coming year. It gives me a chance to analyze what I’m doing and what I want to be working on. And it’s a whole lot easier than predicting that SDN is going to take everyone’s job or OpenFlow being dead again.

Write Like the Wind

My biggest goal for 2016 was to write more. And that I did. I worked in writing any time I could. I wrote about ONUG, SD-WAN, and other fun topics. I even wrote a small book! Finding time to work all the extra typing in to my Bruce Wayne job at Tech Field Day was a bit challenging here and there. And more than once I was publishing a blog post at the deadline. But all Continue reading

Summary of Pol Pot: Anatomy of a Nightmare

Overview

I’ve decided to start a reading project on genocides and violent totalitarian dictators. Most education about these topics in the US is focused around Nazi Germany, or occasionally the Soviet Union under Stalin. While I’d like to come back to those events if I can endure the topic that long, I’m starting with non-Western events.

First up is Pol Pot and the Khmer Rouge, partly because I grew up in the 1980s around a lot of first or second-generation Cambodian and Vietnamese immigrants, but never knew much about the politics behind their flight from Southeast Asia. It’s a particularly strange case of different cultural, political, and historic influences converging in a disastrous way. The term “genocide” has been controversial with reference to the Khmer Rouge regime: while they systematically murdered or starved somewhere between 1.7 and 2.3 million people, for the most part the killings didn’t target a specific racial, ethnic, or religious group. While there were certainly elements of this – as I’ll discuss – Pol Pot’s regime was more about brutal slavery and vicious punishment of any deviance, regardless of the person.

This post is based on the book Pol Pot: Anatomy of a Nightmare Continue reading

How and why the leap second affected Cloudflare DNS

At midnight UTC on New Year’s Day, deep inside Cloudflare’s custom RRDNS software, a number went negative when it should always have been, at worst, zero. A little later this negative value caused RRDNS to panic. This panic was caught using the recover feature of the Go language. The net effect was that some DNS resolutions to some Cloudflare managed web properties failed.

The problem only affected customers who use CNAME DNS records with Cloudflare, and only affected a small number of machines across Cloudflare's 102 PoPs. At peak approximately 0.2% of DNS queries to Cloudflare were affected and less than 1% of all HTTP requests to Cloudflare encountered an error.

This problem was quickly identified. The most affected machines were patched in 90 minutes and the fix was rolled out worldwide by 0645 UTC. We are sorry that our customers were affected, but we thought it was worth writing up the root cause for others to understand.

A little bit about Cloudflare DNS

Cloudflare customers use our DNS service to serve the authoritative answers for DNS queries for their domains. They need to tell us the IP address of their origin web servers so we can contact the Continue reading

Orhan Ergun Youtube Channel

Orhan Ergun Youtube Channel I have been sharing technology based videos on my youtube channel for some time. I will hopefuly share more often public videos out there ! I just don’t want to share technical videos, but my training updates, bootcamp announcements, success stories and the things which make me happy or mad ! […]

The post Orhan Ergun Youtube Channel appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Is Cisco CCDE Exam Vendor Neutral ?

Is Cisco CCDE Exam really vendor neutral?.Recently one of my CCDE Bootcamp students asked me this question. He heard that DMVPN might come in the exam. In the beginning of my each CCDE class, I introduce the topics which will most likely asked in the CCDE Practical exam. Cisco claims that CCDE Practical exam is […]

The post Is Cisco CCDE Exam Vendor Neutral ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

LSA issue @ January 1, 2017 at 02:13PM

Hey there, engineers! Its January 1st 2017 and we are happy to welcome you and wish you all the best.But is it 2017 indeed? How would one tell if his clock is good, if its in sync with the world clock? Yeah, you got it, in the era of the leap second and New Year

EP10: From Dubai to Silicon Valley, interview with LinkedIn’s lead architect Shawn Zandi

Shawn Zandi is a principal network architect with LinkedIn, where he builds large scale data center, backbone and networks. Over the past two decades, Shawn has worked as network and security architect for consulting firms from Dubai to Silicon Valley. Shawn holds many publications, patents and certifications including 3x CCIE in routing and switching, Security and Service provider as well as CCDE, while through the years of practice has become a vendor-neutral consultant. He currently lives in San Francisco, in Sunny California. In addition to his commitment to LinkedIn, Shawn is a technical advisor to networking startups in the Bay Area.

Quote: RFC1925 – The Twelve Networking Truths Rule (11)

Every old idea will be proposed again with a different name and a different presentation, regardless of whether it works.
Resources or Topics Mentioned:
Tech Lesson of the Day: Applying Machine Learning and Big Data to Networking

Continue reading

My Personal Look Back on 2016

I haven't ever written a “year in review” type of post before. Sure, I do a post to summarize how the blog has done over the year but I've never done a personal look back. Last night-New Years Eve-I was thinking about everything that I was involved in during 2016 and I realized “I should write this down! I was involved in or a participant of some amazing things last year!”

So here we go. In an effort to show a more personal side and not just my geeky side, here is my personal 2016 year in review.