Archive

Category Archives for "Networking"

Cisco revs up storage connections for data centers and WANs

Data is piling up, and storage keeps getting faster thanks to flash, so the networks that link it all together need to keep up, too.Both traditional Fibre Channel and more general-use protocols used in storage keep steadily ratcheting up performance. On Wednesday, Cisco Systems is boosting the speed of long-distance storage links for disaster recovery and business continuity. It’s also introducing higher speeds for IP (Internet Protocol) storage networks in data centers and enhancing its software to simplify storage management.Fibre Channel hangs on as the glue that binds together SANs (storage area networks) because it’s dependable and secure, said 451 Research analyst Steven Hill. A majority of large enterprise installations use it even though typically cheaper IP-based systems like iSCSI have been around for years, he said.To read this article in full or to leave a comment, please click here

Review: 6 Python IDEs go to the mat

Of all the metrics you could use to gauge the popularity and success of a language, one surefire factor is the number of development environments available for it. Python’s rise in popularity over the last several years has brought with it a strong wave of IDE support, with tools aimed both at the general programmer and those who use Python for tasks like scientific work and analytical programming. LiClipse provides precise controls over the runtime environment for Python projects. When you create a new project, you can choose which Python interpreter to associate with it, and what PYTHONPATH to use with specific launch configurations. This is useful if you have different revisions of Python installed side-by-side, and you want to ensure that a given project runs with a specific Python version. You don’t even have to use a Python interpreter that has been registered with the system; it can be an executable in a folder somewhere. The JVM-based Jython and the .Net CLR-based IronPython (which is back under active development) are also supported, along with the stock CPython interpreter. (PyPy is not explicitly supported, but should work as a drop-in replacement for CPython per its stated goals.) Continue reading

6 tips to handle a sick day at the office

With the start of cold and flu season, it's inevitable that you'll need to take some sick time. But some days, no matter how bad you feel, you just can't stay home -- deadlines, client meetings, software releases just won't wait. Of course, some folks actually want to work through minor illnesses because of their commitment to their job, or a lack of sick time, or because they feel guilty having co-workers pick up their slack.INSIDER 12 habits of successful tech CEO "There are a surprising number of people who don't want to stay home and nurse a cold or a sore throat. They'd rather work through the sniffles or pounding head, and while that's commendable, it can be difficult to work at your usual level of efficiency -- and that can be worse than being missing in action at the office," says Amanda Mitchell, corporate consultant and founder of executive coaching and management consultancy Our Corporate Life.To read this article in full or to leave a comment, please click here

CISOs, it’s time to bury the hatchet with your CIO

Historically, the head of security (CISO) reporting into the head of IT (CIO) has made a lot of sense.Both departments are – at their core – technical disciplines, and as such there is a need for the two to be in regular contact. They need to overlap on network infrastructure, information security, and IT compliance, not to mention overseeing the release of safe, bug-free code and the delivery of secure products.Yet this relationship is often lambasted by those working in the InfoSec community. Some describe it as ‘adversarial’ – with two very different people trying to achieve different objectives.CIOs will look to bring new business applications online, to maintain service-level agreements, and ensure that IT services are available for all users. Indeed, a CIO’s bonuses are often tied to KPIs around these very principles.To read this article in full or to leave a comment, please click here

The best programs to run Android apps on your Windows PC

From time to time you’ll hear about yet another effort to bring Android to the desktop. Yes, there’s an official effort to do this straight from Google by bringing the Play Store to a select number of Chromebooks.But what if you want this now, or don’t want to buy a new computer to experience what it’d be like to use Android apps on your PC? With a little bit of digital elbow grease, it’s possible. You can run some of your favorite apps and engage in Android gaming by trying out one of the many third-party solutions. I looked at several software choices that offer this, and came away with four solid options that will have you up and running with Android on your Windows PC rather painlessly.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Red Hat and Ericsson sign open source deal

Red Hat is well known as probably the most successful company built entirely on open-source software. Building a business on top of open source is a hard thing, especially so back in the early days of open source when no one had any real idea how the economics of a product that was free would translate into commercial success.But succeed it did, and Red Hat has created a huge business built entirely on offering services on top of open-source products.+ Also on Network World: Red Hat CEO: Open-source innovation is always user-led +To read this article in full or to leave a comment, please click here

IoT botnets powered by Mirai continue to grow

Level 3 Threat Research has noted an uptick in activity by new IoT botnets that are backed by the Mirai malware, with some attacks enlisting 100,000 individual hijacked devices.A significant number of these zombie devices are enslaved by more than one botnet, according to the research described in the Level 3 Beyond Bandwidth blog, and some of these botnets use overlapping infrastructure.Source code for Mirai was released Sept. 30, “which has inspired a significant number of new bad actors, all working to exploit similar pools of vulnerable devices,” the Level 3 researchers write.To read this article in full or to leave a comment, please click here

IoT botnets powered by Mirai continue to grow

Level 3 Threat Research has noted an uptick in activity by new IoT botnets that are backed by the Mirai malware, with some attacks enlisting 100,000 individual hijacked devices.A significant number of these zombie devices are enslaved by more than one botnet, according to the research described in the Level 3 Beyond Bandwidth blog, and some of these botnets use overlapping infrastructure.Source code for Mirai was released Sept. 30, “which has inspired a significant number of new bad actors, all working to exploit similar pools of vulnerable devices,” the Level 3 researchers write.To read this article in full or to leave a comment, please click here

Murphy’s Law: The security version

Since the first of the month, I’ve heard colleagues and others report each of the 10 security variants to Murphy’s Law listed below. Murphy is not only alive but has been reincarnated. It’s worth reminding the gentle reader of various famous last words:1. All documents will be out of date or simply missing Documents will not be maintained. Documents will have pages missing. And authors shall be unavailable for any reason (deployed to Mt. Everest is preferred). No documents shall be in an understandable language, be edited, collated, or have referring URLs that do not 404, 401 or 5XX. Any good documentation shall be the only copy on a laptop that was stolen whilst unencrypted. To read this article in full or to leave a comment, please click here

6 industries that will be affected by virtual reality

VR going mainstream2016 has been a defining moment for virtual and augmented reality. From Pokemon GO to Facebook’s newly announced standalone VR headset, the virtual reality market has taken off and we’ve just scratched the surface in terms of innovation. Previously, virtual reality seemed to be a technology that was reserved only for tech enthusiasts and extreme gamers. However, we are now starting to see its mainstream application. As virtual reality becomes more common in business and personal settings, less expensive equipment is becoming available, providing an opportunity for organizations to adopt the technology at a wider scale.To read this article in full or to leave a comment, please click here

Samsung faces lawsuit from Note7 owners who couldn’t use their phones

Samsung’s problems with lawsuits from alleged victims of overheating batteries in the Galaxy Note7 smartphone could get compounded by consumers suing for compensation of carrier charges.The three plaintiffs in a proposed class action lawsuit in a New Jersey federal court are not suing for compensation for personal or property damage from the at times overheating and even exploding Note7 smartphones.Instead, they are asking the South Korean phone maker to compensate users for the time it took Samsung to replace and eventually discontinue the Note7s, which resulted in users having to pay for device and plan charges to cellular operators “for phones they could not safely use.”To read this article in full or to leave a comment, please click here

Do Enterprises Need VRFs?

One of my readers sent me a long of questions titled “Do enterprise customers REALLY need VRFs?

The only answer I could give is “it depends” (it’s like asking “Do animals need wings?”), and here’s my attempt at building a decision tree:

You can use the decision tree to figure out whether you need VRFs in your data center or in your enterprise WAN.

Read more ...

Ecuador says it cut WikiLeaks founder’s internet access to prevent U.S. election interference

Ecuador's embassy in the U.K. says it alone was responsible for cutting WikiLeak's founder Julian Assange's internet connection, stating that the country doesn't want to interfere with the U.S. elections."The government of Ecuador respects the principle of non-intervention in the affairs of other countries," it said in a Tuesday statement. "It does not interfere in external electoral processes or support a particular candidate."As result, the government has temporarily cut access to some private communications at the embassy, where Assange has resided for four years.To read this article in full or to leave a comment, please click here

Ecuador says it cut WikiLeaks founder’s internet access to prevent U.S. election interference

Ecuador's embassy in the U.K. says it alone was responsible for cutting WikiLeak's founder Julian Assange's internet connection, stating that the country doesn't want to interfere with the U.S. elections."The government of Ecuador respects the principle of non-intervention in the affairs of other countries," it said in a Tuesday statement. "It does not interfere in external electoral processes or support a particular candidate."As result, the government has temporarily cut access to some private communications at the embassy, where Assange has resided for four years.To read this article in full or to leave a comment, please click here

VMworld EMEA 2016 Day 2 Keynote

This is a liveblog of the day 2 general session at VMworld EMEA 2016 in Barcelona, Spain. I wasn’t able to write a liveblog of the day 1 session due to some scheduling/logistical conflicts, but managed to get things arranged for day 2 (well, most of it—I’ll have to cut this short so I can get to a customer meeting).

At 9am, Sanjay Poonen takes the stage to kick off the general session. Poonen walks through a number of examples how “digital transformation” is affecting businesses and organizations across a variety of industry verticals. Poonen positions Workplace One as the “Switzerland” solution that bridges different kinds of applications (Windows client-server apps, web apps, and mobile apps) with different kinds of devices (Apple, Google, Samsung, Microsoft). The key ingredients of Workspace One are VDI, EMM, and identity.

Poonen quickly transitions into a demo of Workspace One on an iPhone, showing off how VMware employees use Workspace One to run apps like Workday, Concur, ADP, Boxer (VMware’s mobile e-mail client), AirWatch Content Locker, and others. The demo then moves into a demonstration of VDI, including 3-D accelerated graphics, on a Samsung Android tablet. Following the demo, Poonen kicks off a customer testimonial Continue reading

A New Automation Chapter Begins

Two years ago, while I worked as a network engineer/consultant, I felt strongly that the industry was ripe for change. In February 2015 I jumped feet-first into the world of network automation by going back to my roots in software development, combining those skills with the lessons I learned from 3 years of network engineering.

I’ve learned a ton in the last 2 years - not just at the day job but by actively participating in the automation and open source communities. I’ve co-authored a network automation book. I’ve released an open source project to facilitate automated and distributed testing of network infrastructure. I’ve spoken publicly about many of these concepts and more.

Despite all this, there’s a lot left to do, and I want to make sure I’m in the best place to help move the industry forward. My goal is and has always been to help the industry at large realize the benefits of automation, and break the preconception that automation is only useful for big web properties like Google and Facebook. Bringing these concepts down to Earth and providing very practical steps to achieve this goal is a huge passion of mine.

Automation isn’t just about running Continue reading

A New Automation Chapter Begins

Two years ago, while I worked as a network engineer/consultant, I felt strongly that the industry was ripe for change. In February 2015 I jumped feet-first into the world of network automation by going back to my roots in software development, combining those skills with the lessons I learned from 3 years of network engineering.

I’ve learned a ton in the last 2 years - not just at the day job but by actively participating in the automation and open source communities. I’ve co-authored a network automation book. I’ve released an open source project to facilitate automated and distributed testing of network infrastructure. I’ve spoken publicly about many of these concepts and more.

Despite all this, there’s a lot left to do, and I want to make sure I’m in the best place to help move the industry forward. My goal is and has always been to help the industry at large realize the benefits of automation, and break the preconception that automation is only useful for big web properties like Google and Facebook. Bringing these concepts down to Earth and providing very practical steps to achieve this goal is a huge passion of mine.

Automation isn’t just about running Continue reading

A New Automation Chapter Begins

Two years ago, while I worked as a network engineer/consultant, I felt strongly that the industry was ripe for change. In February 2015 I jumped feet-first into the world of network automation by going back to my roots in software development, combining those skills with the lessons I learned from 3 years of network engineering. I’ve learned a ton in the last 2 years - not just at the day job but by actively participating in the automation and open source communities.

A New Automation Chapter Begins

Two years ago, while I worked as a network engineer/consultant, I felt strongly that the industry was ripe for change. In February 2015 I jumped feet-first into the world of network automation by going back to my roots in software development, combining those skills with the lessons I learned from 3 years of network engineering. I’ve learned a ton in the last 2 years - not just at the day job but by actively participating in the automation and open source communities.