Archive

Category Archives for "Networking"

IP Networking – generational shift in the industry to pure-L3 network stack

© Calico project (http://docs-archive.projectcalico.org/en/1.4.3/addressing.html)
After years and years of innovation, the networking industry is changing. IPv6 is now slowly being adopted - both by interest and need. With all of IPv4 addresses having been exhausted it is now a mandate on the requester to either move to IPv6 or pay a hefty premium for repurchase of v4 addresses. On the other spectrum I believe that Calico and other projects that do pure L3 only networking, is a newer approach to network segregation; not just solving specific problems in the networking infra but a trend that will slowly be adopted widely in the network community. This is mainly also because of IPv6 acting as a booster to moving to a L3 pure play networking solution. This move to L3 only networking can be seen across the infra stack - from physical servers to VMs to containers.

Docker networking eco-system begun with libnetwork and after that has propagated with multitude of solutions by both community and networking vendors. Unlike Flannel (CoreOS) and VXLAN which leverage tunneling and L2 protocols, Calico is a distributed L3 networking solution that works both with Virtual Machines and Continue reading

40% discount for the NEW YEAR on all CCDE Products !

    40% New Year Discount On all CCDE Products Starts December 16 Thru 31 of December 2016 40% OFF On Below Products !  CCDE In-Depth  New CCDE Workbook buy now » Live/Instructor-Led  Online CCDE Training  buy now » Self Paced CCDE Training Lifetime Access buy now »   Note : Discount is valid for both Online Instructor Led […]

The post 40% discount for the NEW YEAR on all CCDE Products ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Obama vows to punish Russia over election-related hacks

U.S. President Barack Obama pledged to punish Russia for hacking of Democratic groups and figures during the election season with actions that’ll occur in secret and others that’ll be made public.“Our goal continues to be to send a clear message to Russia or others not to do this to us because we can do stuff to you,” Obama said in a press conference.The President stopped short of explicitly blaming Russian president Vladimir Putin for directing the alleged hacks, but said that, “not much happens in Russia without Vladimir Putin.”Obama met Putin during a summit in China in September and told him to "cut it out" and or else "there would be some serious consequences if he didn't," he said. After that meeting, the hacking attempts stopped but Wikileaks had already been given copies of stolen documents.To read this article in full or to leave a comment, please click here

Obama vows to punish Russia over election-related hacks

U.S. President Barack Obama pledged to punish Russia for hacking of Democratic groups and figures during the election season with actions that’ll occur in secret and others that’ll be made public. “Our goal continues to be to send a clear message to Russia or others not to do this to us because we can do stuff to you,” Obama said in a press conference. The President stopped short of explicitly blaming Russian president Vladimir Putin for directing the alleged hacks, but said that, “not much happens in Russia without Vladimir Putin.” Obama met Putin during a summit in China in September and told him to "cut it out" and or else "there would be some serious consequences if he didn't," he said. After that meeting, the hacking attempts stopped but Wikileaks had already been given copies of stolen documents.To read this article in full or to leave a comment, please click here

Zinc launches new tools for putting workers on blast

Zinc, a messaging platform for businesses, announced Friday that it is launching a set of new features aimed at helping desk-less workers get the most out of enterprise instant messaging. First off, the company is launching Broadcasts, a way for businesses to send employees rich notifications that block out all of the other messages and force users to close then before they can resume messaging. Administrators will be able to see which employees have seen and dismissed the notification. In addition, the company rolled out support for Organizations, which let administrators subdivide all of the Zinc users in their company into a set of smaller groups.To read this article in full or to leave a comment, please click here

Businesses eye cloud for big data deployments

As 2016 draws to a close, a new study suggests big data is growing in maturity and surging in the cloud.AtScale, which specializes in BI on Hadoop using OLAP-like cubes, recently conducted a survey of more than 2,550 big data professionals at 1,400 companies across 77 countries. The survey was conducted in conjunction with Cloudera, Hortonworks, MapR, Cognizant, Trifacta and Tableau.[ Analytics 50 winners for 2016 ] AtScale's 2016 Big Data Maturity Survey found that nearly 70 percent of respondents have been using big data for more than a year (compared with 59 percent last year). Seventy-six percent of respondents are using Hadoop today, and 73 percent say they are now using Hadoop in production (compared with 65 percent last year). Additionally, 74 percent have more than 10 Hadoop nodes and 20 percent 20 percent have more than 100 nodes.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT-based precision agriculture reduces the guesswork in farming

“Whoever makes two ears of corn, or two blades of grass to grow where only one grew before, deserves better of mankind, and does more essential service to his country than the whole race of politicians put together”.Steven Valenscin, the founder of Growers exemplifies this 400-year-old quote by Jonathan Swift.Steven grew up working on his family farm in Washington State. After serving in the US Navy, He started North Carolina’s first private soil testing laboratory and then combined his passion for soil fertility and farming to found Growers. Steven aims to simplify the complex world of agronomy into precise farm management decisions.To read this article in full or to leave a comment, please click here

New Research Reveals Cybersecurity Skills Shortage Impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little” as I’ve been screaming about this issue for the last 5 years or so.  As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee).So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs?  How is the cybersecurity skills shortage affecting them and the organizations they work for?Earlier this week, ESG and the Information Systems Security Association (ISSA) published the second report in a two-part research report series investigating these issues.  This new report titled, Through the Eyes of Cyber Security Professionals, uncovers a lot more about just how deep the cybersecurity skills shortage cuts.  For example:To read this article in full or to leave a comment, please click here

New research reveals cybersecurity skills shortage impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little,” as I’ve been screaming about this issue for the last five years or so. As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee). So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs? How is the cybersecurity skills shortage affecting them and the organizations they work for? Earlier this week, ESG and the Information Systems Security Association (ISSA) published the second report in a two-part research report series investigating these issues. This new report, titled "Through the Eyes of Cyber Security Professionals," uncovers a lot more about just how deep the cybersecurity skills shortage cuts. For example:To read this article in full or to leave a comment, please click here

New Research Reveals Cybersecurity Skills Shortage Impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little” as I’ve been screaming about this issue for the last 5 years or so.  As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee).So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs?  How is the cybersecurity skills shortage affecting them and the organizations they work for?Earlier this week, ESG and the Information Systems Security Association (ISSA) published the second report in a two-part research report series investigating these issues.  This new report titled, Through the Eyes of Cyber Security Professionals, uncovers a lot more about just how deep the cybersecurity skills shortage cuts.  For example:To read this article in full or to leave a comment, please click here

Corero says its always-on DDoS defense system automatically safeguards service providers  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   The massive DDoS attack that was aimed in stages at DNS provider Dyn in October 2016 did more than grab headlines. It also served as a wake-up call to companies that provide the global Internet infrastructure, as well as downstream operators and service providers. Many experts fear this attack could prove to be a tipping point in the battle to maintain stability and availability across the Internet. Research shows the attack originated from an Internet of Things (IoT) botnet that involved an estimated 100,000 devices. Dyn experienced packet flow bursts 40 to 50 times higher than normal, and unverified reports put the magnitude of the attack in the 1.2Tbps range. The attack used multiple vectors and required a variety of techniques to fight off.To read this article in full or to leave a comment, please click here