Archive

Category Archives for "Networking"

IETF 96

The IETF meetings are relatively packed events lasting over a week, and it’s just not possible to attend every session. From the various sessions I attended here are a few personal impressions that I took away from the meeting that I would like to share with you.

In light of increased cyberattacks, White House sets defense plan with FBI in charge

Faced with increasingly troubling attacks on its cyber infrastructure, the United States has outlined new measures intended to help it respond more effectively to attacks that might compromise public safety or its national security interests.On Tuesday, President Obama approved a directive that lays out how federal agencies will respond to “significant cyber incidents," with the FBI to be formally in charge of investigating.To read this article in full or to leave a comment, please click here

In light of increased cyberattacks, White House sets defense plan with FBI in charge

Faced with increasingly troubling attacks on its cyber infrastructure, the United States has outlined new measures intended to help it respond more effectively to attacks that might compromise public safety or its national security interests.On Tuesday, President Obama approved a directive that lays out how federal agencies will respond to “significant cyber incidents," with the FBI to be formally in charge of investigating.To read this article in full or to leave a comment, please click here

Apple reports second straight quarter of declining iPhone sales

Apple has reported its second straight quarter of falling iPhone sales, hit by stiff competition in China and the ongoing slowdown in the worldwide smartphone market.The company sold 40.4 million iPhones from April to June, down from 47.5 million in the same quarter last year, Apple announced Tuesday.Revenue for the quarter, the third of its fiscal year, was $42.4 billion, down 17 percent from $49.6 billion a year earlier. Its net profit fell 27 percent to $7.8 billion. To read this article in full or to leave a comment, please click here

Google taps AI to help you bid for digital ads

Real-time bidding is an aspect of digital marketing that can seem overly complex for the average bear, so it was only a matter of time before AI entered the picture. This week, Google brought machine learning into the process to help make it easier.Tapping some of the same artificial-intelligence technologies that have already appeared in Google Photos and AlphaGo, Smart Bidding is a new capability for conversion-based automated bidding across AdWords and DoubleClick Search to help companies determine their optimal bid for any given campaign or portfolio. It can factor in millions of signals, Google says, and continually refines models of users' conversion performance at different bid levels.To read this article in full or to leave a comment, please click here

Bailed out by Comware’s python interpreter

Something funny happened to an IRF stack the other day. The gear was moved to a remote location and, as part of the move, the cables/transceivers were moved around.

The IRF (10Gb/s) and uplink (1Gb/s) ports switched places.

The new IRF ports (5 and 6) got added to the configuration just fine, leaving me with:
 #  
irf-port 1/1
port group interface Ten-GigabitEthernet1/1/1
port group interface Ten-GigabitEthernet1/1/2
port group interface Ten-GigabitEthernet1/1/5
port group interface Ten-GigabitEthernet1/1/6
#
irf-port 2/2
port group interface Ten-GigabitEthernet2/1/1
port group interface Ten-GigabitEthernet2/1/2
port group interface Ten-GigabitEthernet2/1/5
port group interface Ten-GigabitEthernet2/1/6
#

But IRF would't release the old ports making it impossible to repurpose them as uplinks:
 [switch]irf-port 1/1  
[switch-irf-port1/1]undo port group interface Ten-GigabitEthernet1/1/1
Check failed for reason:
Can't support IRF on a port with 1000M speed!
[switch]

Can't remove a port from the IRF group because it's ineligible to participate in IRF. Okaaaaay...

Without functioning uplinks, it was impossible to transfer the saved configuration away for an off-box edit.

Python to the rescue!
I split the IRF, used python to edit the stored configuration in-place on each IRF member, then rebooted the switches individually. Here's the edit-by-python:
 <switch>python   
Python 2.7.3 (default, Apr Continue reading

What is 6PE?

6PE is one of the efficient solutions for interconnecting IPv6 islands over an IPv4-only MPLS cloud without needing to drastically change the core network design by having all your Core routers dual-stacked 6PE does not use manual standard tunnels, it provides an alternative where all tunnels are established dynamically eliminating the need to configure and …

The post What is 6PE? appeared first on Networkers-online.com.

Gain access to an ARM server running Linux OS, through the cloud

If you want to play with an ARM-based server, you can now apply to gain access to one online through the Linaro Developer Cloud.The cloud service was announced in March but has finally gone live. It's mainly targeted at developers who want to evaluate ARM servers.The free service is one way to access ARM servers, which aren't widely available. Applications go through an approval process, and only those serious about programming for ARM servers will likely be approved.Developers will get remote access to bare-metal servers with ARM processors. Linaro has said servers will have ARM-based chips from Qualcomm, Cavium, and Huawei, and users will be able to select specific hardware.To read this article in full or to leave a comment, please click here

Financial analysts forecast another downturn for Apple’s iPhone, Mac

Apple later today will again announce a downturn for all three of its primary product lines, according to a group of independent and institutional financial analysts.The June quarter results will nearly mirror those of the first three months of 2016, when Apple reported selling 16% fewer iPhones than in the same period in 2015, marking the first time since the 2007 roll-out that sales for the iconic smartphone contracted on a year-over-year basis.According to Philip Elmer-DeWitt, who formerly blogged about Apple for Fortune but now runs the subscription-based Apple 3.0 website, the nine independent and 18 institutional analysts he queried forecast a fall in unit sales of the iPhone, iPad and Mac lines, as well as another decline in revenue.To read this article in full or to leave a comment, please click here

Smartwatch shipments nosedive, but recovery due in 2017

The global smartwatch market nosedived by 32% in the second quarter of 2016, with Apple Watch shipments down by 55% when compared to a year earlier, according to research firm IDC. The decline — the first since the market started in 2013 — is expected to reverse next year after Apple and Google launch important operating system updates this fall, IDC said. Also, more watches will launch with cellular connections to LTE wireless without the need to connect via Bluetooth to a smartphone. Apple was the only smartwatch maker in the top five to see a decline in the second quarter, although the Apple Watch remained the top smartwatch by far, with 1.6 million devices shipped and 47% of the market, IDC said.To read this article in full or to leave a comment, please click here

Yahoo users have no need to panic

For Yahoo's stalwart users, the company's acquisition should not usher in any dramatic changes in the near future.Actually, some industry analysts say people using Yahoo Mail, its search engine or its news page now may feel more secure, and that services are unlikely to disappear from lack of funding or lack of corporate interest anytime soon.However, for a company that has become a decided B-list player after once being an Internet pioneer, changes to Yahoo may be akin to a tree falling in a forest when there's no one there to hear it.+ ALSO ON NETWORK WORLD 9 big moments in Yahoo's troubled history +To read this article in full or to leave a comment, please click here

61% off LEMONBEST HD 720p Handheld Wifi Inspection Scope – Deal Alert

Here's one of those gadgets you might want to have around, just in case. This wireless inspection camera is ideal for HVAC inspection, cable routing, automotive inspection & maintenance, or for anybody who just likes to drop things into dark confined spaces. Simply put, this waterproof camera/scope lets you see into those hard-to-see spaces. The camera is flexible, 3.2 ft in length, and roughly the size of a #2 pencil. It has an adjustable high-intensity LED light and an attachable hook, mirror, and magnet. Everything you need for the annoying nooks and crannies in your life. It broadcasts 1280 x 720 HD images in real time to your laptop, phone or tablet via wifi, so no wires or plugs required. The WiFi inspection scope from LEMONBEST averages 4 out of 5 stars on Amazon from over 60 customers (read reviews). Amazon indicates that its typical list price of $199.89 has been reduced by 61% to just $78.59. See it now on Amazon.To read this article in full or to leave a comment, please click here

The worlds of OpenStack and containers are colliding

One of the largest backers of OpenStack – Mirantis – is reconstructing its distribution of the open source cloud computing platform to make it run in containers, marking a potentially massive shift for the project.+MORE AT NETWORK WORLD: VMware, IBM and Microsoft are top cloud software management vendors +Mirantis today announced a partnership with Google in which the two companies will develop integrations between OpenStack and Google’s container management platform named Kubernetes, which is also an open source project. The end goal will be that OpenStack will be able to run atop Kubernetes, encapsulated in a series of application containers. Doing so will make it easier for end users to update OpenStack to newer versions, and it gives users the freedom to run OpenStack anywhere Kubernetes is supported, says Mirantis Chief Marketing Officer Boris Renski.To read this article in full or to leave a comment, please click here

Windows 10: Insiders initiated more than 5,000 changes to the Anniversary Update

After the complete tone deafness of the Windows 8 development cycle, Terry Myerson decided to change course once put in charge of the Windows development team. Microsoft would take a page from Seattle's most famous fictional resident, Dr. Frasier Crane, and adopt the motto of "I'm listening."According to a writer for WinBeta who visited Microsoft and got the news straight from the horse's mouth, Windows Insiders who tested beta builds of the OS since its release last year logged over 75 million pieces of feedback, with over 5,000 changes and enhancements to the Windows 10 Anniversary Update as a result.To read this article in full or to leave a comment, please click here

SMS-based two-factor authentication may be headed out the door

SMS messaging for two-factor authentication might become a thing of the past. A U.S. federal agency is discouraging its use.The National Institute of Standards and Technology is pushing for the change. Its latest draft of its Digital Authentication Guideline, updated on Monday, warns that SMS messages can be intercepted or redirected, making them vulnerable to hacking.Many companies, including Twitter, Facebook, and Google, as well as banks, already use the phone-based text messaging to add an extra layer of security to user accounts.It works like this: To access the accounts, the user not only needs the password, but also a secret code sent by the company by text message. Ideally, these one-time passcodes are sent to a designated phone number to ensure no one else will read them.To read this article in full or to leave a comment, please click here

SMS-based two-factor authentication may be headed out the door

SMS messaging for two-factor authentication might become a thing of the past. A U.S. federal agency is discouraging its use.The National Institute of Standards and Technology is pushing for the change. Its latest draft of its Digital Authentication Guideline, updated on Monday, warns that SMS messages can be intercepted or redirected, making them vulnerable to hacking.Many companies, including Twitter, Facebook, and Google, as well as banks, already use the phone-based text messaging to add an extra layer of security to user accounts.It works like this: To access the accounts, the user not only needs the password, but also a secret code sent by the company by text message. Ideally, these one-time passcodes are sent to a designated phone number to ensure no one else will read them.To read this article in full or to leave a comment, please click here