Archive

Category Archives for "Networking"

OpenSwitch finds critical home at Linux Foundation

The OpenSwitch Project took a significant development step this week when it became the first full feature network operating system project of the Linux Foundation.+More on Network World: Feeling jammed? Not like this I bet+The move gives OpenSwitch a neutral home where it can receive all the necessary support for long-term growth and sustainability – including back-office, technical infrastructure and ecosystem development services, said Michael Dolan, VP of Strategic Programs at The Linux Foundation.While the Linux Foundation hosts other projects in the networking space, the addition of OpenSwitch makes available a complete NOS solution, from the ASIC drivers to the APIs,’ that will run on reference hardware and in hypervisors, he stated.To read this article in full or to leave a comment, please click here

May the Replicas Be With You

Darth DownImage by Reuters/Peter NichollsDon’t make dad feel like this on Fathers Day. One heck of an epic gift, if not intergalactically expensive, this foray into the darkside will set you back $3,500. This worker from the Propshop holds a replica of Darth Vader's melted helmet from "Star Wars: The Force Awakens".To read this article in full or to leave a comment, please click here

Cisco & IBM are taking IoT analytics to the edge

The Internet of Things is no good without a way to act on the data it generates. A new partnership between two of the biggest IoT players promises to put smart collection and advanced analysis of data right where it’s needed.IBM and Cisco Systems have worked out how to run components of IBM’s Watson IoT analytics on Cisco edge devices. This will bring more intelligence closer to where the action is, helping enterprises run things like factories and oil rigs more efficiently.MORE: 10 Internet of Things Companies to WatchTo read this article in full or to leave a comment, please click here

Groundbreaking jury verdict finds Utah firms made 117 million illegal telemarketing calls

In what the Federal Trade Commission is calling a first-of-its-kind verdict, a jury has found that a Utah man and his three movie companies are responsible for a variety of “deceptive and unlawful” selling practices that include 117 million illegal telemarketing calls. In a case that has already dragged on since 2011, the jury ruling enforces both the FTC’s Telemarketing Sales Rule and its enormously popular Do Not Call Registry rules. The judge has yet to access civil penalties, but since they can be as high as $16,000 per violation it’s safe to assume the total will fall somewhere south of the $1.9 trillion maximum for just those illegal calls.To read this article in full or to leave a comment, please click here

Groundbreaking jury verdict finds Utah firms made 117 million illegal telemarketing calls

In what the Federal Trade Commission is calling a first-of-its-kind verdict, a jury has found that a Utah man and his three movie companies are responsible for a variety of “deceptive and unlawful” selling practices that include 117 million illegal telemarketing calls.In a case that has already dragged on since 2011, the jury ruling enforces both the FTC’s Telemarketing Sales Rule and its enormously popular Do Not Call Registry rules. The judge has yet to access civil penalties, but since they can be as high as $16,000 per violation it’s safe to assume the total will fall somewhere south of the $1.9 trillion maximum for just those illegal calls.To read this article in full or to leave a comment, please click here

Oracle: We’re going to sue that whistleblower cloud employee

Oracle plans to sue whistleblower Svetlana Blackburn for malicious prosecution, the company said Thursday.On Wednesday, Blackburn -- a senior finance manager in Oracle’s cloud business -- said in a lawsuit she was terminated from her job for refusing to go along with cloud-computing accounting principles she considered unlawful.Blackburn alleges that upper management was trying to fit "square data into round holes" in a bid to boost the financial reports for Oracle's cloud services business that would be "paraded" before company leaders and investors.To read this article in full or to leave a comment, please click here

FBI: Extortion e-mail, tech support scam-bags turning up the heat

Not that summer time has anything to do with it but the FBI’s Internet Crime Complaint Center (IC3) warned that e-mail extortion campaigns and the tedious tech support scams have heated up in recent weeks.+More on Network World: FBI warning puts car hacking on bigger radar screen+The IC3 said the recent uptick in email extortion comes from the data breaches at organizations like Ashley Madison, the IRS, Anthem and many others where tons personal information was stolen.To read this article in full or to leave a comment, please click here

OVS Orbit podcast with Ben Pfaff

OVS Orbit Episode 6 is a wide ranging discussion between Ben Pfaff and Peter Phaal of the industry standard sFlow measurement protocol, implementation of sFlow in Open vSwitch, network analytics use cases and application areas supported by sFlow, including: OpenStack, Open Network Virtualization (OVN), DDoS mitigation, ECMP load balancing, Elephant and Mice flows, Docker containers, Network Function Virtualization (NFV), and microservices.

Follow the link to see listen to the podcast, read the extensive show notes, follow related links, and to subscribe to the podcast.

CCNA R&S Track Changes: Should You Be Worried?

Learning@Cisco recently announced some changes to the CCNA routing & switching track to now include a taste of software defined networking, among other emerging technologies. With some consternation, CCNA candidates are scratching their heads, wondering what, exactly, this new tech means to them. After all, SDN "still does nothing," at least to hear some folks tell the tale. ;-) And yet, here we have Cisco starting to test on this stuff, right down at the associate level of their certification ladder.

The post CCNA R&S Track Changes: Should You Be Worried? appeared first on Packet Pushers.

Techniques of a Network Detective: A New Series

Put your detective hat on your head and your Network Detective badge on your lapel.  Introducing a new blog series – Techniques of a Network Detective.  This series will focus on the detective work (troubleshooting side) of our jobs as network engineers.

For over 30 years I’ve been playing in the “world of IT”. During those years there have been a lot of changes in our world. But through all that change, there has been a thread, for me, that has always remained constant. A thread and a passion that always seemed to be with me in every job over all these years.

Troubleshooting!

Being a “Network Detective” is much the same as being a regular detective in many ways.  As a Network Detective we get put on a “case” – the “Case of the Missing Packets” maybe.  We go to the crime scene and try to find answers so we can solve the “who done it”

nd1

When a “crime” happens you need to be right there interviewing the suspects, surveying the crime scene, asking the right questions.  Trying to quickly figure out what is happening, where it is happening, and why it Continue reading

Extortion schemes expand, threatening consumers and businesses with data leaks

Ransomware authors are not the only cybercriminals who use extortion tactics to make money from users and companies. Data thieves are also increasingly resorting to intimidation.The FBI's Internet Crime Complaint Center (IC3) has received many reports from users whose data was stolen in various high-profile breaches and then received emails threatening to publicly disclose their personal information, including phone numbers, home addresses and credit card information.The ransom amount asked by the extortionists ranged from 2 to 5 bitcoins or approximately $250 to $1,200, IC3 said in an advisory Wednesday.To read this article in full or to leave a comment, please click here

Extortion schemes expand, threatening consumers and businesses with data leaks

Ransomware authors are not the only cybercriminals who use extortion tactics to make money from users and companies. Data thieves are also increasingly resorting to intimidation.The FBI's Internet Crime Complaint Center (IC3) has received many reports from users whose data was stolen in various high-profile breaches and then received emails threatening to publicly disclose their personal information, including phone numbers, home addresses and credit card information.The ransom amount asked by the extortionists ranged from 2 to 5 bitcoins or approximately $250 to $1,200, IC3 said in an advisory Wednesday.To read this article in full or to leave a comment, please click here

Response: Videoconferencing Numbers

IDC published a promo piece about their research into videoconferencing market. From a market segment perspective: Multi-codec telepresence equipment revenue ($23.9 million) was down 44.4% quarter over quarter, but increased 27.4% year over year in 1Q16. Unit shipments were down 47.1% quarter over quarter, but increased 48.8% year over year. Room-based videoconferencing system revenue ($359.6 […]

The post Response: Videoconferencing Numbers appeared first on EtherealMind.

BGP Best External

BGP Best External is used in Active Standby BGP Topologies. BGP Best External helps for BGP convergence by sending external BGP prefixes which wouldn’t normally be sent if they are not overall BGP best path. There are BGP best internal, BGP best external and BGP Overall best path. BGP Best external in an active-standby scenarios […]

The post BGP Best External appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Which company has the most CCDE in the World ?

Which company has the most Cisco CCDE certified engineers in the world? Of course, Cisco  has the most certified engineers across the globe. In this post, I will introduce you to the second company that has the most CCDE engineers in the world outside of Cisco.   I like sharing the Global CCDE List whenever someone […]

The post Which company has the most CCDE in the World ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.