Archive

Category Archives for "Networking"

Does Aerohive Scale?

AerohiveLogo

Note: If you are a TL/DR type of person, let me give you the short answer to the title of the post: Yes! ?

For everyone else, I will try my hardest to keep this as short as possible. I will include as many pictures and CLI screens as I think are needed to help answer the scalability question, and no more. While I entertained the idea of making two separate posts regarding scalability, I felt it best to keep it to a single post since AP(Access Point) to AP communication and layer 3 roaming are best explained together. My wife and friends will tell you that I can be long-winded. I apologize in advance.

Let me just start by saying that I work for Aerohive Networks. I have been an employee of Aerohive for about 3 months. In that time, I have learned a tremendous amount about the overall Aerohive solution and architecture. Prior to working for Aerohive, I worked for a reseller that sold for Cisco(to include Meraki), Aruba, and Aerohive. I wasn’t unaware of Aerohive, but let’s be honest for a minute. Aerohive doesn’t have a lot of information out there around how their various protocols work. This Continue reading

DynaOptics promises a better lens for smartphone photography

A Silicon Valley startup says it's developed a better lens for smartphone photography -- one that produces clearer images without the distortion often seen in photos from competing lenses.The secret to DynaOptics' Oowa lens is a proprietary manufacturing process that produces what the company calls a freeform lens."What we are able to do with this freeform lens is essentially create a rectangular-like image so that it maps exactly onto the rectangular shape of the image sensor that's in the phone," DynaOptics CEO Li Han Chan said in an interview.To read this article in full or to leave a comment, please click here

5 questions for Apple to answer at WWDC

Apple’s Worldwide Developers Conference is coming to San Francisco next week, giving CEO Tim Cook a chance to get developers fired up over the latest that Apple has to offer.Don’t expect a new iPhone. WWDC is all about software and services, but we'll also get a general update on the state of Apple. Here are some questions Apple needs to answer at the event.How will Siri compete with Cortana and the Google Assistant? When Siri launched in 2011, it was one of the first virtual assistants of its kind, but it now has competitors from Amazon, Microsoft, Facebook and Google. Apple needs to show how Siri is better than — or can at least keep pace with — its rivals.To read this article in full or to leave a comment, please click here

NASA describes out of this world data glitch that almost finished its planet hunter

NASA’s highly successful Kepler space telescope has had more than its share of near fatal experiences.The latest happened in April when the spacecraft went into “Emergency Mode” which among other things allows for priority access to ground-based communications via NASA’s Deep Space Network. NASA noted at the time that the spacecraft is nearly 75 million miles from Earth, making the communication slow. Even at the speed of light, it takes 13 minutes for a signal to travel to the spacecraft and back.The spacecraft has since returned to normal function.To read this article in full or to leave a comment, please click here

Industrial control systems vendors get careless about domain squatting

Many companies protect their brands by registering domain names that are slight variations on their own, but manufacturers of industrial control systems don't seem to have followed suit, potentially leaving customers open to attack.Researchers from security consultancy Digital Bond have found 433 so-called "squat" domains whose names are similar to those of 11 industrial manufacturers, and which have been registered by unknown third parties. Some of the domains have been hosting scams, malicious redirects and malware.Attackers engage in domain squatting for various reasons: to host phishing pages in order to steal credentials, direct accidental visitors to malware, profit from the brand's popularity by displaying ads, or sell the domain to the brand owner for a large fee.To read this article in full or to leave a comment, please click here

Silicon Choices

Cumulus Networks has always strived to provide our customers with choice. And now, Cumulus Linux 3.0 has been refactored to make the user experience fun and easy … and at the same time bring you, even more choice:

  • In hardware platforms, from a variety of manufacturers.
  • In CPU architectures — x86 and ARM.
  • In Broadcom networking chips for a variety of use cases — 1G, 10G, 10GBase-T, 40G and 100G switches with Helix4, Hurricane2, Trident-II, Trident-II+ or Tomahawk chips inside.
  • And now, for the first time, choice in silicon vendors with the introduction of Cumulus Linux-powered 40G and 100G switches with Mellanox Spectrum chips inside.

Shrijeet Mukherjee (our fearless engineering leader) kicked off the Cumulus Linux 3.0 development cycle with this as our main goal — to offer even more choice to our customers. And then this happened…

three-dragons

 

So we took on the challenge of unifying the user experience across this sweeping range of hardware platforms and switch silicon without muting the unique prowess and feature richness of any of them.

How did we do this? By deploying the three dragons in our arsenal: ONIE, switchd and the Linux kernel itself (which is now better fed by Continue reading

EP07: Interview with Jacob Hess – CoFounder of NexGenT

Jacob Hess is an entrepreneur and systems engineer who has over 15 years experience in Information Technology. Working in both the customer and systems integrator environments he has designed and deployed many complex IT projects spanning the full stack of networking technologies. Jacob is also a United States Air Force veteran who served as a technical instructor and trained hundreds of network engineers to be job ready for the Department of Defense. He is the Co-founder & COO of Nexgent and is passionate about inspiring, creating, and empowering the next generation of IT engineers.

Continue reading

Lenovo wants consumers to take Google Tango for granted, so does Google

Gamers and R&D labs creating new applications for augmented reality (AR) and virtual reality (VR) have been the source of enthusiasm for this new category. But most people have only a superficial opinion—or no opinion—about these exciting emergent technologies because they haven’t become relevant in their lives. The two early use cases, games and immersive 360-degree video, represent large future businesses that few people have experienced.Yesterday, Lenovo introduced the Phab2 Pro, which is both an AR device and has all the features of an Android smartphone. It’s a more approachable form of AR because the consumer looks through the Phab2 Pro like a looking glass and doesn’t feel awkward donning a strange-looking headset or visor. It feels normal—like taking a picture or video.To read this article in full or to leave a comment, please click here

3 ways to improve security as you embrace containers

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

In enterprise IT, disruptive technologies become commercially viable faster than you can say “Moore’s Law.”  However, if corporate culture and processes don’t evolve in conjunction with the pace of technology, it can inhibit the benefits of even the most awesome of enterprise apps. One area of IT where corporate culture has stymied progress is cyber security, but the rise of software containers — arguably one of the most disruptive enterprise technologies on the horizon - provides an opportunity to get application security right, or at least make it a whole lot better.

To read this article in full or to leave a comment, please click here

3 ways to improve security as you embrace containers

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.In enterprise IT, disruptive technologies become commercially viable faster than you can say “Moore’s Law.”  However, if corporate culture and processes don’t evolve in conjunction with the pace of technology, it can inhibit the benefits of even the most awesome of enterprise apps. One area of IT where corporate culture has stymied progress is cyber security, but the rise of software containers — arguably one of the most disruptive enterprise technologies on the horizon - provides an opportunity to get application security right, or at least make it a whole lot better.To read this article in full or to leave a comment, please click here