Archive

Category Archives for "Networking"

Cisco names winners of Innovation Everywhere Challenge

Innovation Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovation Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovate Everywhere Challenge

Innovate Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovate Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovation Everywhere Challenge

Innovation Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovation Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovate Everywhere Challenge

Innovate Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovate Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovation Everywhere Challenge

Innovation Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently Innovation Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovate Everywhere Challenge

Innovate Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovate Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Gartner: DDoS defenses have been backsliding but starting a turnaround

Distributed denial-of-service attacks have been getting bigger and lasting longer, and for the past few years defenses haven’t kept pace, but that seems to be changing, Gartner analysts explained at the firm’s Security and Risk Management Summit.Gartner tracks the progress of new technologies as they pass through five stages from the trigger that gets them started to the final stage where they mature and are productive. The continuum is known as the Hype Cycle. Gartner Gartner analyst Lawrence OransTo read this article in full or to leave a comment, please click here

Gartner: DDoS defenses have been backsliding but starting a turnaround

Distributed denial-of-service attacks have been getting bigger and lasting longer, and for the past few years defenses haven’t kept pace, but that seems to be changing, Gartner analysts explained at the firm’s Security and Risk Management Summit.Gartner tracks the progress of new technologies as they pass through five stages from the trigger that gets them started to the final stage where they mature and are productive. The continuum is known as the Hype Cycle. Gartner Gartner analyst Lawrence OransTo read this article in full or to leave a comment, please click here

Announcing NetBox

Several years ago, I lamented the few options available for a provider-grade IPAM solution. Specifically, I explained why building a custom application would be undesirable:

Could I create a custom IPAM solution with everything we need? Sure! The problem is that I'm a network engineer, not a programmer (a natural division of labor which, it seems, is mostly to blame for the lack of robust IPAM solutions available). Even if I had the time to undertake such a project, I have little interest in providing long-term maintenance of it.

But I suppose time makes fools of us all.

Nearly one year ago, I started developing an IPAM application as part of my day job. Leveraging my experience with the Django Python framework, I had a working proof-of-concept in just a week. Over the next several months, the project grew more mature and began to take on additional roles: data center infrastructure management, circuit tracking, and credentials storage. Today, the tool functions as our "source of truth" for many aspects of our infrastructure. We call it NetBox.

Continue reading · 6 comments

Announcing NetBox

Update: NetBox has been released!

Several years ago, I lamented the few options available for a provider-grade IPAM solution. Specifically, I explained why building a custom application would be undesirable:

Could I create a custom IPAM solution with everything we need? Sure! The problem is that I'm a network engineer, not a programmer (a natural division of labor which, it seems, is mostly to blame for the lack of robust IPAM solutions available). Even if I had the time to undertake such a project, I have little interest in providing long-term maintenance of it.

But I suppose time makes fools of us all.

Nearly one year ago, I started developing an IPAM application as part of my day job. Leveraging my experience with the Django Python framework, I had a working proof-of-concept in just a week. Over the next several months, the project grew more mature and began to take on additional roles: data center infrastructure management, circuit tracking, and credentials storage. Today, the tool functions as our "source of truth" for many aspects of our infrastructure. We call it NetBox.

Continue reading · 29 comments

Announcing NetBox

Update: NetBox has been released!

Several years ago, I lamented the few options available for a provider-grade IPAM solution. Specifically, I explained why building a custom application would be undesirable:

Could I create a custom IPAM solution with everything we need? Sure! The problem is that I'm a network engineer, not a programmer (a natural division of labor which, it seems, is mostly to blame for the lack of robust IPAM solutions available). Even if I had the time to undertake such a project, I have little interest in providing long-term maintenance of it.

But I suppose time makes fools of us all.

Nearly one year ago, I started developing an IPAM application as part of my day job. Leveraging my experience with the Django Python framework, I had a working proof-of-concept in just a week. Over the next several months, the project grew more mature and began to take on additional roles: data center infrastructure management, circuit tracking, and credentials storage. Today, the tool functions as our "source of truth" for many aspects of our infrastructure. We call it NetBox.

Continue reading · 29 comments

IDG Contributor Network: Algolia moves beyond web search to place search

Algolia offers a hosted search platform. That means if you're a developer wanting to offer search within your applications and websites, you just integrate Algolia's search engine and it does it all for you—allowing you to focus on what is important: your app. Since its inception in 2012, Algolia has gained over 1,500 customers.Algolia API returns search results quickly and offers a search-as-you-type experience for end users. A perfect example of farming out parts of an application to third parties, Algolia follows in the footsteps of communication platforms such as Twilio and email platforms such as Sendgrid. To deliver both economics and speed, Algolia built itself a distributed, cloud-based, search network. It leverages 12 individual data centers globally to deliver a claimed 50ms response time for search within the top markets globally.To read this article in full or to leave a comment, please click here

Microsoft fixes critical flaws in Windows, IE, Edge, and Office

Microsoft has fixed more than 40 vulnerabilities in its products Tuesday, including critical ones in Windows, Internet Explorer, Edge, and Office.The vulnerabilities are covered in 16 security bulletins, six of which are marked as critical and the rest as important. This puts the total number of Microsoft security bulletins for the past six months to more than 160, a six-month record during the past decade.Companies running Windows servers should prioritize a patch for a critical remote code execution vulnerability in the Microsoft DNS Server component, covered in the MS16-071 bulletin.To read this article in full or to leave a comment, please click here

Microsoft fixes critical flaws in Windows, IE, Edge, and Office

Microsoft has fixed more than 40 vulnerabilities in its products Tuesday, including critical ones in Windows, Internet Explorer, Edge, and Office.The vulnerabilities are covered in 16 security bulletins, six of which are marked as critical and the rest as important. This puts the total number of Microsoft security bulletins for the past six months to more than 160, a six-month record during the past decade.Companies running Windows servers should prioritize a patch for a critical remote code execution vulnerability in the Microsoft DNS Server component, covered in the MS16-071 bulletin.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Spy boss warns of IoT hacks crippling whole cities

Large cities could crash to a halt “with the click of a button,” the Telegraph newspaper has reported. The head of spying for the United Kingdom has apparently warned that Internet of Things (IoT) adoptation increases the risk of hackers bringing “major cities to a standstill.”Robert Hannighan, the director of Government Communications Headquarters (GCHQ), the British equivalent of the National Security Agency (NSA) in the United States, made the warning at a science festival in the U.K. recently, the Telegraph writes.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Spy boss warns of IoT hacks crippling whole cities

Large cities could crash to a halt “with the click of a button,” the Telegraph newspaper has reported. The head of spying for the United Kingdom has apparently warned that Internet of Things (IoT) adoptation increases the risk of hackers bringing “major cities to a standstill.”Robert Hannighan, the director of Government Communications Headquarters (GCHQ), the British equivalent of the National Security Agency (NSA) in the United States, made the warning at a science festival in the U.K. recently, the Telegraph writes.To read this article in full or to leave a comment, please click here

‘Spam king’ Sanford Wallace sentenced to 2.5 years in prison for Facebook phishing scam

Self-styled spam king Sanford Wallace was sentenced to two-and-a-half years in prison on Tuesday for a phishing scam that resulted in the sending of over 27 million messages to Facebook users.Last August, Wallace admitted to compromising around 500,000 Facebook accounts, using them to send over 27 million spam messages through Facebook's servers, between November 2008 and March 2009.Sentencing had been scheduled for last December, but it has taken the court almost a year to reach a sentencing decision.To read this article in full or to leave a comment, please click here

‘Spam king’ Sanford Wallace sentenced to 2.5 years in prison for Facebook phishing scam

Self-styled spam king Sanford Wallace was sentenced to two-and-a-half years in prison on Tuesday for a phishing scam that resulted in the sending of over 27 million messages to Facebook users.Last August, Wallace admitted to compromising around 500,000 Facebook accounts, using them to send over 27 million spam messages through Facebook's servers, between November 2008 and March 2009.Sentencing had been scheduled for last December, but it has taken the court almost a year to reach a sentencing decision.To read this article in full or to leave a comment, please click here