Archive

Category Archives for "Networking"

IDG Contributor Network: Information security priorities for Trump’s administration

Cybersecurity needs to be a top priority for the administration of Donald Trump. The first task should be shoring up government IT systems. As recent attacks have shown, adversaries aren’t afraid to go after political organizations. There’s no reason to suspect they won’t continue to target political entities such as the Democratic National Committee or step up attacks on government agencies.Emphasize that information security applies to all agencies Ideally, a cabinet meeting for all new secretaries should be held within three months of the inauguration to underscore that information security is essential for all agencies to complete their missions. Even secretaries whose agencies are not typically associated with either information security or IT need to be included.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why the IETF will be key for standardizing 5G

Most people in the mobile industry are aware that the Third-Generation Partnership Project (3GPP)—and Global System for Mobile communication (GSM) before it—has traditionally been the lead standards organization in specifying mobile network functionality. 3GPP logically partitions the mobile network architecture into Radio Access Network (RAN), and Core Network (CN) components.+ Also on Network World: What we talk about when we talk about 5G wireless + 3GPP will continue to be important in 5G, especially for the RAN-related functionality such as the OFDM and massive MIMO specifications for the radio interfaces. However, knowledgeable observers will also be aware of the fact that a significant number of key 5G protocols will be specified in the Internet Engineering Task Force (IETF). Actually, this is just a continuation and acceleration of trends started way back in 3G.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Has IT become too complex to manage?

In the late 1990s, I was responsible for technical operations for a large healthcare organization. We supported more than 5,000 users across 50 locations and supported three distinct lines of business. We were a very progressive organization at the leading edge of technology innovation in healthcare. It was not a simple operation. Well, at least not for 1997. When I compare that environment to what IT leaders face today, however, a shudder of relief washes over me. There is no point in whitewashing this: Managing the function of IT in my day was child’s play compared to the incredible diversity of challenges facing the modern IT leader. Is it so complex, in fact, that it cannot truly be managed?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Has IT become too complex to manage?

In the late 1990s, I was responsible for technical operations for a large healthcare organization. We supported more than 5,000 users across 50 locations and supported three distinct lines of business. We were a very progressive organization at the leading edge of technology innovation in healthcare. It was not a simple operation. Well, at least not for 1997. When I compare that environment to what IT leaders face today, however, a shudder of relief washes over me. There is no point in whitewashing this: Managing the function of IT in my day was child’s play compared to the incredible diversity of challenges facing the modern IT leader. Is it so complex, in fact, that it cannot truly be managed?To read this article in full or to leave a comment, please click here

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.An attacker was able to break into the Ground Self-Defense Force's computer systems, sources at the Japanese Ministry of Defense told Kyodo News on Sunday. The ministry and the Self-Defense Forces discovered the attack in September, said the report, which was also relayed by The Japan Times.Kyodo's sources said the hack was believed to be the work of a nation state, and that information may have been leaked in the attack.To read this article in full or to leave a comment, please click here

Japanese government denies report that its defense forces were hacked

Japanese government officials have denied reports that a secure network used by the country's defense forces was attacked earlier this year.An attacker was able to break into the Ground Self-Defense Force's computer systems, sources at the Japanese Ministry of Defense told Kyodo News on Sunday. The ministry and the Self-Defense Forces discovered the attack in September, said the report, which was also relayed by The Japan Times.Kyodo's sources said the hack was believed to be the work of a nation state, and that information may have been leaked in the attack.To read this article in full or to leave a comment, please click here

8 most significant tech gadgets of 2016: Winners and losers

Every year, tech companies come up with fantastic ideas for cutting edge, futuristic products. Some of these products turn into huge hits. Others end up bombing. And still others become precursors or inspirations for the next generation of innovations. Here’s our list of eight products that caught our eye this year.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 11.28.16

New products of the weekImage by CAOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.CSTAR for Google ChromeImage by UpGuard To read this article in full or to leave a comment, please click here

New products of the week 11.28.16

New products of the weekImage by CAOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.CSTAR for Google ChromeImage by UpGuard To read this article in full or to leave a comment, please click here

34 – Q-in-VNI and EFP for Hosting Providers

Dear Network and DCI Experts !

While this post is a little bit out of the DCI focus, and assuming many of you already know Q-in-Q, the question is, are you yet familiar with Q-in-VNI? For those who are not, I think this topic is a good opportunity to bring Q-in-VNI deployment with VXLAN EVPN for intra- and inter-VXLAN-based Fabrics and understand its added value and how one or multiple Client VLANs from the double encapsulation can be selected for further actions.

Although it’s not an unavoidable rule per-se, some readers already using Dot1Q tunneling may not necessarily fit into the following use-case. Nonetheless, I think it’s safe to say that most of Q-in-Q deployment have been used by Hosting Provider for co-location requirements for multiple Clients, hence, the choice of the Hosting Provider use-case elaborated in this article.

For many years now, Hosting Services have physically sheltered thousands of independent clients’ infrastructures within the Provider’s Data Centers. The Hosting Service Provider is responsible for supporting each and every Client’s data network in its shared network infrastructure. This must be achieved without changing any Tenant’s Layer 2 or Layer 3 parameter, and must also be done as quickly as possible. For many years, the co-location Continue reading

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.The message asked that cryptom27 at yandex.com should be contacted for the key to unlock the data.Fare payment machines at stations also displayed that they were “out of service,” and San Francisco's Municipal Railway, widely known as Muni, was allowing free rides on its light-rail vehicles as it was unable to charge customers, according to the Examiner.To read this article in full or to leave a comment, please click here

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.The message asked that cryptom27 at yandex.com should be contacted for the key to unlock the data.Fare payment machines at stations also displayed that they were “out of service,” and San Francisco's Municipal Railway, widely known as Muni, was allowing free rides on its light-rail vehicles as it was unable to charge customers, according to the Examiner.To read this article in full or to leave a comment, please click here

Cyber Monday 2016: Deals abound for new iPhones, HDTVs, iPads, headphones and more

Black Friday this year certainly lived up to the hype. With incredible savings to be had on products as far ranging as HDTVs and iPhones, shoppers this year flooded nationwide retailers while also taking advantage of alluring deals online. In fact, Black Friday this year set new all-time records on a number of fronts. According to Adobe, shoppers this year spent approximately $3.34 billion on any number of deals, representing a nearly 22% increase compared to 2015.If you happened to miss out on Black Friday this year, there's no reason to fret. Cyber Monday is just a few hours a way and consumers looking for incredible deals on the latest and greatest tech gadgets have no shortage of options to choose from.To read this article in full or to leave a comment, please click here

Python Basics – Part 1

Let’s start with Python basics, with the help of program .Theory part in posts is just enough to understand the program.

Python Data Type:

  • Numbers
  • Strings
  • List
  • Tuple
  • Dictionary
  1. Numbers :  
    1.  Int                  1 ,10,-145, 22
    2. Float               1.1,0.9,-29.9
    3. Complex        1.4j, 4e+6j
  1. Strings

Way to remember how slices work in string  is to think of the indices as pointing between characters, with the left edge of the first character numbered 0. Then the right edge of the last character of a string of n characters has index n, for example:

“Crazyouters ”  represented in indices form

0 1 2 3 4 5 6 7 8 9 10 11
C r a z y r o u t e r s
-11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0

Program Code : Str.py

str.PNG

Output

str_out

 

There are special operators in strings

Program Code : str1.py

str1

Output

str1out

 

3. List

The list is a most versatile datatype available in Python which can be written as a list of comma-separated values (items) between square brackets. Important Continue reading

Trump Tower changed to Dump Tower on Google Maps

The world became a slightly better place when Fidel Castro died. Unlike President Obama who said, “History will record and judge the enormous impact of this singular figure on the people and world around him,” President-elect Donald Trump bluntly called Catro a “brutal dictator” whose “legacy is one of firing squads, theft, unimaginable suffering, poverty and the denial of fundamental human rights.”Some unknown person with an internet connection also attempted to be blunt, expressing his or her opinion of Donald Trump via Google Maps; the President-elect’s transition headquarters was renamed to the Dump Tower on Google Maps.To read this article in full or to leave a comment, please click here

Trump Tower changed to Dump Tower on Google Maps

The world became a slightly better place when Fidel Castro died. Unlike President Obama who said, “History will record and judge the enormous impact of this singular figure on the people and world around him,” President-elect Donald Trump bluntly called Catro a “brutal dictator” whose “legacy is one of firing squads, theft, unimaginable suffering, poverty and the denial of fundamental human rights.”Some unknown person with an internet connection also attempted to be blunt, expressing his or her opinion of Donald Trump via Google Maps; the President-elect’s transition headquarters was renamed to the Dump Tower on Google Maps.To read this article in full or to leave a comment, please click here

Python – Must for Network Engineer

Automation is need of Time.We as network engineers have to go with automation to simplify major chunk of the work done by us.We can not escape from automation.I will be having series of Python posts starting from basics.I  will try to put all  learning  in post in most easiest way.

Let’s start with Basics.What is Python ? As per Wiki ,Python is a widely used high-level, general-purpose, interpreted, dynamic programming language.

In layman terms , it’s one of the coding  language much simpler, easy to understand and most importantly reduces number of code lines in C++ to fewer lines.

It was created by Guido van Rossum during 1985-1990.

Installation:

Note:We will be doing coding in Python 3.

Windows:  can be installed from Site :http://www.python.org

Linux: run below mentioned  command

$ sudo apt-get install python 3.5

1


Amazon Cyber Monday 2016 sales: Ready, Set…

Amazon has kicked off Cyber Monday 2016 with a slew of sales this coming week on its own products, such as the Echo and Fire tablets, as well as on items from others, ranging from Exploding Kittens card sets to Nest thermostats.(Black Friday & Cyber Monday watchers such as BFads and Best Black Friday have been a big help in keeping tabs on deals.)To read this article in full or to leave a comment, please click here

Amazon Cyber Monday 2016 sales: Ready, Set…

Amazon has kicked off Cyber Monday 2016 with a slew of sales this coming week on its own products, such as the Echo and Fire tablets, as well as on items from others, ranging from Exploding Kittens card sets to Nest thermostats.(Black Friday & Cyber Monday watchers such as BFads and Best Black Friday have been a big help in keeping tabs on deals.)To read this article in full or to leave a comment, please click here