Archive

Category Archives for "Networking"

IDG Contributor Network: Can enterprise IT seem like a good deal again?

A few weeks ago, I sat on a panel hosted by CenturyLink on sustainability and efficiency in IT. At CenturyLink’s sunny Irvine, California, data center my co-panelists gathered ahead of going on stage and on camera. One of the panelists remarked that enterprise IT was dying—dying—slowly dying. But I believe this characterization is too broadly phrased and an inaccurate choice of words.The enterprise’s data center paradigm has changed irrevocably. And it will progress on its change cycle as enterprises embark on fewer new builds, and trends show that market share favors the commercial data center service providers. The paradigm of public cloud puts the sometimes outmoded ways of the enterprise data centers and legacy enterprise IT into an unfavorable light. But rest assured, there are some positive signs for enterprise IT—and good results ahead—but some changes do need to occur.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Public cloud causing enterprise IT to change

A few weeks ago, I sat on a panel hosted by CenturyLink on sustainability and efficiency in IT. At CenturyLink’s sunny Irvine, California, data center my co-panelists gathered ahead of going on stage and on camera. One of the panelists remarked that enterprise IT was dying—dying—slowly dying. But I believe this characterization is too broadly phrased and an inaccurate choice of words. The enterprise’s data center paradigm has changed irrevocably. And it will progress on its change cycle as enterprises embark on fewer new builds, and trends show that market share favors the commercial data center service providers. The paradigm of public cloud puts the sometimes outmoded ways of the enterprise data centers and legacy enterprise IT into an unfavorable light. But rest assured, there are some positive signs for enterprise IT—and good results ahead—but some changes do need to occur.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can enterprise IT seem like a good deal again?

A few weeks ago, I sat on a panel hosted by CenturyLink on sustainability and efficiency in IT. At CenturyLink’s sunny Irvine, California, data center my co-panelists gathered ahead of going on stage and on camera. One of the panelists remarked that enterprise IT was dying—dying—slowly dying. But I believe this characterization is too broadly phrased and an inaccurate choice of words.The enterprise’s data center paradigm has changed irrevocably. And it will progress on its change cycle as enterprises embark on fewer new builds, and trends show that market share favors the commercial data center service providers. The paradigm of public cloud puts the sometimes outmoded ways of the enterprise data centers and legacy enterprise IT into an unfavorable light. But rest assured, there are some positive signs for enterprise IT—and good results ahead—but some changes do need to occur.To read this article in full or to leave a comment, please click here

This company uses AI to stop cyberattacks before they start

An ounce of prevention is worth a pound of cure, as the old saying goes, and that's just as true in cybersecurity as it is in health. So believes Cylance, a startup that uses AI to detect and prevent cyberattacks.On Wednesday, Cylance announced that it just raised a whopping US $100 million in Series D funding. It will use the new infusion to expand its sales, marketing, and engineering programs.Dubbed CylanceProtect, the company's flagship product promises AI-based endpoint security while using a fraction of the system resources required by the approaches used in most enterprises today. Enabling that are technologies including machine learning.To read this article in full or to leave a comment, please click here

This company uses AI to stop cyberattacks before they start

An ounce of prevention is worth a pound of cure, as the old saying goes, and that's just as true in cybersecurity as it is in health. So believes Cylance, a startup that uses AI to detect and prevent cyberattacks.On Wednesday, Cylance announced that it just raised a whopping US $100 million in Series D funding. It will use the new infusion to expand its sales, marketing, and engineering programs.Dubbed CylanceProtect, the company's flagship product promises AI-based endpoint security while using a fraction of the system resources required by the approaches used in most enterprises today. Enabling that are technologies including machine learning.To read this article in full or to leave a comment, please click here

35% off Samsung Level U Pro Bluetooth Wireless In-ear Headphones – Deal Alert

The Samsung Level U Pro Wireless Headphones combine Ultra High Quality Audio (UHQA) technology with noise-isolating ear gels to deliver clear, vivid sound. It's designed to comfortably sit around the neck, and is splash and sweat resistant. The headphones can take calls as well. Calls and music are controlled intuitively through smart magnets in the earbuds. The Level U Pro averages 4 out of 5 stars on Amazon from over 220 customers (read reviews). It's typical list price of $99.99 has been reduced by 35% to just $64.50. Learn more and review buying options now on Amazon.To read this article in full or to leave a comment, please click here

Open Sourcing CloudFlare’s UI Framework

Open Sourcing CloudFlare’s UI Framework

Late last year, the CloudFlare UI team made a huge decision: to change JavaScript frameworks from Backbone & Marionette to React & Redux.

We’ve been one of the single biggest Backbone+Marionette apps on the web for a while now, and the decision to move was not taken lightly. On our team we have a former core team member of the Marionette team (myself), and the author of several popular Backbone projects: Backgrid and Backbone Paginator.

In the spirit of the open web, we want to share more about what we’re doing. This starts by open sourcing the UI framework that we have spent the last few months building.

Introducing cf-ui

While moving to React, we’ve taken our existing Backbone UI framework and rebuilt it from scratch on top of React. This includes over 50 packages that include dozens of components, utilities, test helpers, and more.

Open Sourcing CloudFlare’s UI Framework

Examples: https://cloudflare.github.io/cf-ui
GitHub: https://github.com/cloudflare/cf-ui

We’re not open sourcing cf-ui because we think our buttons are any better than anyone else’s buttons, but because it’s an opportunity to share some of the technical decisions that we’ve made while building out a massive React application. The hope is that this will be Continue reading

Should You Care About Cloud Native?

To hear vendors tell the story, every enterprise in the world will be running cloud native applications on hybrid cloud networks any second now. In fact, if you’re not already firing up those containers, your business is behind. I mean…gosh…you’re probably losing thousands of dollars each minute because you’re not agile enough. You’ll be doing massive layoffs before you’re done reading this article just to stay alive. Nonsense.

Vetting vendors via VoIP

Who among us hasn’t set up a new and unique email account for a particular commercial transaction just so we’ll know who to blame when the account gets flooded with spam? Well, a member of Reddit’s community devoted to systems administration (r/sysadmin) says he took the tactic a step further … actually, 12 steps further.From a post headlined: “How to get blacklisted as a vendor.” Yesterday I was hunting for a new vendor. Mostly out of curiosity (but also to help me in picking a company that's not completely sleazy) I set up a batch of temporary phone numbers in our VoIP system, 12 in all, and called each vendor from a different number.To read this article in full or to leave a comment, please click here

Vetting vendors via VoIP

Who among us hasn’t set up a new and unique email account for a particular commercial transaction just so we’ll know who to blame when the account gets flooded with spam? Well, a member of Reddit’s community devoted to systems administration (r/sysadmin) says he took the tactic a step further … actually, 12 steps further.From a post headlined: “How to get blacklisted as a vendor.” Yesterday I was hunting for a new vendor. Mostly out of curiosity (but also to help me in picking a company that's not completely sleazy) I set up a batch of temporary phone numbers in our VoIP system, 12 in all, and called each vendor from a different number.To read this article in full or to leave a comment, please click here

US intelligence unit to advance management of virtual desktop security, systems

Getting a handle on cloud-based virtual operations is no easy task. Next month researchers from the Intelligence Advance Research Projects Activity (IARPA) will introduce a new program that looks to address that management concern by developing better technology to manage and secure Virtual Desktop Infrastructure (VDI) environments.+More on Network World: Intelligence agency wants computer scientists to develop brain-like computers+IARPA, the radical research arm of the of the Office of the Director of National Intelligence will introduce the Virtuous User Environment (VirtUE) which it says aims to “creatively define and develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial VDI; develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.”To read this article in full or to leave a comment, please click here

US intelligence unit to advance management of virtual desktop security, systems

Getting a handle on cloud-based virtual operations is no easy task. Next month researchers from the Intelligence Advance Research Projects Activity (IARPA) will introduce a new program that looks to address that management concern by developing better technology to manage and secure Virtual Desktop Infrastructure (VDI) environments.+More on Network World: Intelligence agency wants computer scientists to develop brain-like computers+IARPA, the radical research arm of the of the Office of the Director of National Intelligence will introduce the Virtuous User Environment (VirtUE) which it says aims to “creatively define and develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial VDI; develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.”To read this article in full or to leave a comment, please click here

US intelligence unit to advance management of virtual desktop security, systems

Getting a handle on cloud-based virtual operations is no easy task. Next month researchers from the Intelligence Advance Research Projects Activity (IARPA) will introduce a new program that looks to address that management concern by developing better technology to manage and secure Virtual Desktop Infrastructure (VDI) environments.+More on Network World: Intelligence agency wants computer scientists to develop brain-like computers+IARPA, the radical research arm of the of the Office of the Director of National Intelligence will introduce the Virtuous User Environment (VirtUE) which it says aims to “creatively define and develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial VDI; develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.”To read this article in full or to leave a comment, please click here

Why Troubleshooting Is Overrated

This post is the result of a thought I had after someone asked me to describe an interesting problem I’d faced. I think they meant troubleshooting, because that’s how I answered it.

Speak to most network engineers about what they love about the job, and troubleshooting will crop up quite frequently. I’ve got to admit, being able to delve into a complex problem in a high pressure situation with a clock against it more often than not does give me a rush of sorts. The CLI-fu rolls off your fingers if you’ve been on point with your studies, or you’re an experienced engineer, you methodically tick off what the problems could be and there’s a “Eureka” moment where you triumphantly declare the root cause.

But then what?

I don’t mean what’s the solution to the problem. That’s usually obvious. In most cases, the root cause is one of these culprits:
– Poor design. E.g: 1Gb link in a 10Gb path, designing for ECMP and then realising they’ve used BGP to learn a default route and not influenced your metrics, so anything outside your little IGP’s domain is going to be deterministically routed.
– A fault. E.g: Link down Continue reading

Avaya IAUG is all about the Breeze, no troubles

This week the International Avaya Users Group (IAUG) is holding its annual event in Orlando. The IAUG is an independent user community, so even though the event was centered on Avaya, it was run by a group of customers and not the vendor. The theme of the event, “Engage” has been Avaya’s theme for many of its events over the past year, and it carried over into the user event. Gary Barnett, Avaya’s senior vice president and general manager of Engagement Solutions gave the day one keynote. In case you’re wondering what Engagement Solutions are, it’s really Avaya’s entire collaboration suite, which includes customer and team “engagement” solutions, as well as mobile application.To read this article in full or to leave a comment, please click here

2016 State of Bug Bounty report: Bigger bounties, more industries offering programs

The rise in global cyberattacks and the “critical deficit of security talent” helped bug bounty programs grow in the last year and to diversify from those offered by “tech giants” to more traditional industries.One trend over the last year has been for payouts to increase, according to the 2016 State of Bug Bounty report (pdf). Last year, the average bug reward on Bugcrowd’s platform was $200.81; this second annual report shows an increase of 47%, with the average reward rising to $294.70.To read this article in full or to leave a comment, please click here