Archive

Category Archives for "Networking"

What IT admins love/hate about 8 top network monitoring tools

Network monitoring systems typically look for slow, overloaded, failing or crashed servers, routers, switches and network connections – and alert network administrators to the problem. According to the IT Central Station user community, the most important criteria to consider when choosing network monitoring software are scalability, flexibility and multi-tenancy.To read this article in full or to leave a comment, please click here(Insider Story)

Boost your productivity with these seven apps

When you think mobile apps, the names that come to mind are probably Facebook (including Messenger), YouTube and Google (Search, Play, Maps and Mail), all of which sit atop Nielsen’s list of most popular apps.To read this article in full or to leave a comment, please click here(Insider Story)

Design considerations for network mergers and acquisitions

Network mergers and acquisitions are the processes which can be seen in any type of businesses. As a network designers, our job to identify the business requirements of both existing networks and the merged network and finding best possible technical solutions for the business. There are many different areas which need to be analyzed carefully. Wrong business requirement […]

The post Design considerations for network mergers and acquisitions appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

New products of the week 10.10.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetScaler VPX 100G Key features: NetScaler VPX 100G is the industry’s first fully-featured, virtualized ADC that delivers 100 Gigabits per second performance on commodity hardware. More info.To read this article in full or to leave a comment, please click here

New products of the week 10.10.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetScaler VPX 100G Key features: NetScaler VPX 100G is the industry’s first fully-featured, virtualized ADC that delivers 100 Gigabits per second performance on commodity hardware. More info.To read this article in full or to leave a comment, please click here

Get a Fire HD 6 Tablet Reburbished For Just $45 With Code IDG11, Until Wed Only – Deal Alert

If you've had your eye on Amazon's Fire HD 6 Tablet, but haven't pulled the trigger, you may want to consider buying it refurbished before end of day this Wednesday, because if you use our code IDG11 at checkout you'll activate an additional 20% discount on the already discounted price and pick it up for a mere $45. That's a pretty sweet deal considering it's an $85 tablet brand new. A certified refurbished Fire HD from Amazon is refurbished, tested, and certified to look and work like new, so you get it for a fraction of the price without inheriting someone else's problems. To read this article in full or to leave a comment, please click here

The Impact of ICMP Redirects

One of my readers sent me an interesting question after reading my ICMP Redirects blog post:

In Cisco IOS, when a packet is marked by IOS for ICMP redirect to a better gateway, that packet is being punted to the CPU, right?

It depends on the platform, but it’s going to hurt no matter what.

Read more ...

AT&T, T-Mobile stop replacing Samsung Galaxy Note7s after more fire reports

AT&T and T-Mobile have stopped exchanges of Samsung Galaxy Note7 smartphones that were aimed to solve an issue of overheating batteries in the previous version, following reports that the new phones have also been involved in incidents of overheating and even explosions.Samsung has said it is investigating the issue and will share findings as soon as possible. The South Korean company has temporarily halted production of the Note7 smartphones in the wake of the new crisis, according to reports. Samsung did not immediately comment.To read this article in full or to leave a comment, please click here

Technology Short Take #72

Welcome to Technology Short Take #72. Normally, I try to publish these on Fridays, but some personal travel prevented that this time around so I’m publishing on a Monday instead. Enough of that, though…bring on the content! As usual, here’s my random collection of links, articles, and thoughts about various data center technologies.

Networking

OSPF Multi-Area Adjacency | OSPF Area Placement | RFC 5185

OSPFv2 by default setup only one adjacency over a single link. But this can be an issue some time and as a network designer you should understand the consequences and know the available solutions. Placing a link in wrong OSPF area can create an OSPF sub optimal routing especially in hub and spoke topology. In […]

The post OSPF Multi-Area Adjacency | OSPF Area Placement | RFC 5185 appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IS-IS Design considerations on MPLS backbone

IS-IS Design considerations on MPLS backbone Using IS-IS with MPLS require some important design considerations. IS-IS as a scalable link state routing protocol has been used in the Service Provider networks for decades. In fact, eight of the largest nine Service Providers use IS-IS routing protocol on their network as of today. If LDP is […]

The post IS-IS Design considerations on MPLS backbone appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

3 replacement Galaxy Note 7 phones caught fire in the past week

Replacement Galaxy Note 7 phones may not be any safer than the Note 7 devices which caught fire and caused a recall, based on three replacement Note 7 devices catching fire in the past week.Samsung is reportedly investigating the fire fiascos, claiming that the company takes every Galaxy Note 7 fire report “seriously.” Yet after a company official goofed and mistakenly sent a text message meant for a colleague to one of the melted phone owners, the company’s concern for customers hardly seems sincere.Replacement Galaxy Note 7 catches fire, fills bedroom with smokeMichael Klering of Kentucky had his replacement Galaxy Note 7 for a little more than a week. On Tuesday, October 4, he was “scared to death” when he and his wife awoke to a bedroom full of smoke.To read this article in full or to leave a comment, please click here

3 replacement Galaxy Note 7 phones caught fire in the past week

Replacement Galaxy Note 7 phones may not be any safer than the Note 7 devices which caught fire and caused a recall, based on three replacement Note 7 devices catching fire in the past week.Samsung is reportedly investigating the fire fiascos, claiming that the company takes every Galaxy Note 7 fire report “seriously.” Yet after a company official goofed and mistakenly sent a text message meant for a colleague to one of the melted phone owners, the company’s concern for customers hardly seems sincere.Replacement Galaxy Note 7 catches fire, fills bedroom with smokeMichael Klering of Kentucky had his replacement Galaxy Note 7 for a little more than a week. On Tuesday, October 4, he was “scared to death” when he and his wife awoke to a bedroom full of smoke.To read this article in full or to leave a comment, please click here

What’s in a Raspberry Pi name? How to rename your RPi under Raspbian

A common task after setting up Raspbian-based Raspberry Pi systems is to change the machine’s name (the hostname) because it will, by default, be set to "raspberrypi".While this may not be an issue if you have only one RPi on your network, for anyone developing Internet of Things (IoT) systems where there are multiple RPi’s, it would obviously be desirable to give them more useful hostnames. You can change the hostname temporarily using the hostname command (note that you must use sudo otherwise the command will fail) but, once you reboot, the name will revert to what it was previously set to and what we usually want is to change the hostname permanently. There are a number of ways this can be achieved including using the hostname command in a shell script at startup which could perhaps be useful if you need a dynamically defined hostname but the method most often cited is by editing the hosts file, thusly:To read this article in full or to leave a comment, please click here

Thoughts on Theft

ShareArrows

It’s been a busy week for me. In fact, it’s been a busy few weeks. I’ve had lots of time to enjoy NetApp Insight, Cloud Field Day, and Storage Field Day. I’ve also been doing my best to post interesting thoughts and ideas. Whether it’s taking on the CCIE program or keynote speakers, I feel like I owe a debt to the community and my readers to talk about topics that are important to them, or at least should be. Which is why I’m irritated right now about those ideas being stolen.

Beg, Borrow, and Steal

A large part of my current job is finding people that are writing great things and shining a spotlight on them. I like reading interesting ideas. And I like sharing those ideas with people. But when I share those ideas with people, I make absolutely sure that everyone knows where those ideas came from originally. And if I use those ideas for writing my own content, I make special care to point out where they came from and try to provide the context for the original statement in the first place.

What annoys me to no end is when people take ideas as Continue reading

Using the Raspberry Pi to thwart the creepy clown menace

Like me, I suspect that you have been, in  turns, amused and puzzled by the recent outbreak of creepy clowns. But should you doubt the significance of this weirdness, realize that it’s not only a United States phenomena, it’s global! TIME just published an article titled The Creepy Clown Craze Is Now Taking Over the World while The Verge tried to be sort of rational with The 2016 clown panic: 10 questions asked and answered. But no matter how much the media deny it, this is a serious thing, people. You thought the zombie apocalypse was a big deal? The clownpocalypse could well be Trump-sized, as in yuuuuuuggggggge. But fear not, dear reader, I have the answer as to how we can stay safe from marauding clowns; it’s a device called the Clowntector, an early warning system to spot and locate clown activity so professional, anti-clown professionals can do their sacred duty.To read this article in full or to leave a comment, please click here

US may use sanctions to punish Russia for election hacking

The U.S. response to election-related hacks that the Obama administration now blames on the Russian government could include sanctions against that country. The administration has said that it has a range of options, including economic sanctions, to respond to Russian cyber attacks. On Friday, a Republican lawmaker said he would propose legislation to move those sanctions forward. Senator Cory Gardner, who represents Colorado, said his planned legislation would mandate that the U.S. government investigate Russian cyber criminals and sanction them when appropriate.To read this article in full or to leave a comment, please click here

US may use sanctions to punish Russia for election hacking

The U.S. response to election-related hacks that the Obama administration now blames on the Russian government could include sanctions against that country. The administration has said that it has a range of options, including economic sanctions, to respond to Russian cyber attacks. On Friday, a Republican lawmaker said he would propose legislation to move those sanctions forward. Senator Cory Gardner, who represents Colorado, said his planned legislation would mandate that the U.S. government investigate Russian cyber criminals and sanction them when appropriate.To read this article in full or to leave a comment, please click here