Archive

Category Archives for "Networking"

Eero updates its wireless mesh offering for whole-home Wi-Fi

We’re big fans of the folks at eero, which makes wireless mesh network gear for use in the home. The company today announced software updates for its users that aim to improve LAN speed between its eero units and integrate with Amazon Echo devices. The software update is called TrueMesh and will be pushed out to all existing eero customers. Using anonymous data it compiled from customers over the past nine months, the company says it figured out how to make improvements to its mesh algorithm.To read this article in full or to leave a comment, please click here

Cumulus Linux Network Command Line Utility

Here at Cumulus Networks, we believe that network engineers are the real heart of an organization. They’re the ones managing switches, running the data center, and generally keeping an organization moving efficiently and securely.

We also believe web-scale networking and the associated benefits should be accessible to everyone and the best way to make that happen is to leverage the power of disaggregation and native Linux. Although web-scale networking is very flexible, agile and offers many benefits, there can be a learning curve as Linux uses separate, independently developed applications which each have their own syntax to configure the switch.

So how do we bridge these two beliefs? Allow us to introduce Cumulus Linux Network Command Line Utility (NCLU). Scheduled for our early December 3.2 release, NCLU empowers and quickens the learning curve so all network engineers can benefit from web-scale networking while integrating with and still supporting the traditional Linux methods. In short, NCLU makes Cumulus Linux easily accessible to everyone.

What is Cumulus Linux Network Command Line Utility?

NCLU is a command line utility for Cumulus Linux that rides in the Linux user space as seen below. It provides consistent access to networking commands directly via bash, Continue reading

Why your new data center doesn’t work; the sorry state of commissioning

For enterprise IT organizations embarking on a data center capital project, the stakes are undeniably high. Building a new data center is a massive investment, but it also enables or hampers an organization’s IT strategy and capability—affecting an organization’s business performance for years to come. As more organizations rely on colocation data center providers, ensuring the design and construction of these projects meet your business requirements is critical as well.+ Also on Network World: Envisioning a 65-story data center + With multiple vendors, subcontractors and typically more than 50 different disciplines involved in any data center project—structural, electrical, HVAC, plumbing, fuel pumps, networking and more—it would be remarkable if there were no errors introduced or corners cut during the construction process.To read this article in full or to leave a comment, please click here

SharePoint 2013 cheat sheet

Although many organizations are making their way to SharePoint 2016, a large number are still using SharePoint 2013 as their major corporate collaboration tool. This story is for you.Uploading and interacting with documentsIntegrating SharePoint content with OutlookFive advanced SharePoint 2013 tipsTo read this article in full or to leave a comment, please click here(Insider Story)

10 resume do’s and don’ts for developers

Landing that dream developer job is hard work, but it all starts with the resume. Your code may be tight and you may have a wide range of deep experience, but if you shortchange the time spent on your resume, you may not get recognized in the job marketplace for your true worth. You might even sabotage your chance of being invited for interviews.To read this article in full or to leave a comment, please click here(Insider Story)

Fight the talent shortage with citizen developers

If you want to become a developer, it turns out you might not need a background in computer science as more companies are looking to "citizen developers," says Karen Devine, vice president of marketing at QuickBase, a company that develops business apps."Not only do citizen developers exist, they are becoming more and more prevalent. In fact, according to our latest State of Citizen Development report, only 15 percent of citizen developers have basic coding knowledge, yet 76 percent consider app development part of their daily job tasks," says Devine.To read this article in full or to leave a comment, please click here

7 cybersecurity best practices that regulated industries deal with

Knowing the regsImage by ThinkstockWhether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity. Michael Hall, CISO, DriveSavers, provides a few best practices for businesses operating in or with regulated industries.To read this article in full or to leave a comment, please click here

7 cybersecurity best practices that regulated industries deal with

Knowing the regsImage by ThinkstockWhether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity. Michael Hall, CISO, DriveSavers, provides a few best practices for businesses operating in or with regulated industries.To read this article in full or to leave a comment, please click here

Report: Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a new report by Zscaler."I would consider the entire video camera category as particularly dangerous," said Deepen Desai, director of security research at Zscaler.Take, for example, the Flir FX wireless HD monitoring camera.Researchers found that the camera communicated with the parent company in plain text and without authentication tokens.To read this article in full or to leave a comment, please click here

Report: Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a new report by Zscaler."I would consider the entire video camera category as particularly dangerous," said Deepen Desai, director of security research at Zscaler.Take, for example, the Flir FX wireless HD monitoring camera.Researchers found that the camera communicated with the parent company in plain text and without authentication tokens.To read this article in full or to leave a comment, please click here

ISPs ordered to block LinkedIn in Russia

LinkedIn's network just got a little smaller: Russia's communications regulator ordered ISPs to block access to the business networking company on Thursday.Roskomnadzor made the order after a Moscow appeal court last week upheld an earlier ruling that LinkedIn breached Russian privacy laws.Tagansky district court ruled against LinkedIn on Aug. 4, following a complaint from the Russian federal service for the supervision of communications, information technology and mass media that its activities breached a law requiring businesses handling Russians' personal data to process that data in Russia.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords Roskomnadzor said it filed suit after LinkedIn failed to respond to two requests for information about its plans for relocating the data to Russia.To read this article in full or to leave a comment, please click here

ISPs ordered to block LinkedIn in Russia

LinkedIn's network just got a little smaller: Russia's communications regulator ordered ISPs to block access to the business networking company on Thursday.Roskomnadzor made the order after a Moscow appeal court last week upheld an earlier ruling that LinkedIn breached Russian privacy laws.Tagansky district court ruled against LinkedIn on Aug. 4, following a complaint from the Russian federal service for the supervision of communications, information technology and mass media that its activities breached a law requiring businesses handling Russians' personal data to process that data in Russia.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords Roskomnadzor said it filed suit after LinkedIn failed to respond to two requests for information about its plans for relocating the data to Russia.To read this article in full or to leave a comment, please click here

Can VMware NSX and Cisco ACI Interoperate over VXLAN?

I got a long list of VXLAN-related questions from one of my subscribers. It started with an easy one:

Does Cisco ACI use VXLAN inside the fabric or is something else used instead of VXLAN?

ACI uses VXLAN but not in a way that would be (AFAIK) interoperable with any non-Cisco product. While they do use some proprietary tagging bits, the real challenge is the control plane.

Read more ...