Archive

Category Archives for "Networking"

SDN? I Still Don’t kNow what it is…

Contains SDN

Today you get to play the SDN Definition Game: match the definition of Software Defined Neworking with the person who said it at the Networking Field Day 11 Delegate Roundtable. I’d make this exercise “drag and drop” but that sounds a bit complicated, so instead you’re on your honor not to cheat. Click on the image to see the answers in a new window.

SDN Match Game

SDN, Whatever That Is

I should note that the quotes I used were taken from conversation, so if I mis-transcribed anything or used it too far out of context I apologize to the speaker concerned. In actual fact though, who said what in this case doesn’t really matter. I shared the quotes to demonstrate that even when defined by a group of smart people like these, there doesn’t seem to be one definition of SDN that everybody can agree on. That has opened the door for marketing departments everywhere to use the SDN tag on anything and everything (aka “SDN Washing”) in the hopes that it sounds impressive and thus presumably increases sales. As a result, many people – both vendors and customers – believe that SDN is becoming a four letter word.

SDN Game Goes Wrong

Buy the Solution, Continue reading

Box makes it easier for businesses to control encryption of cloud data

Box has made it easier for its customers to control how stored data is encrypted with an update announced Thursday.The company announced a new service called Box KeySafe, which allows companies to control the keys used to encrypt data stored in Box. It comes in two flavors: a KeySafe with AWS Key Management Service that's designed to be easy for small companies to handle and not require a lot of time, and KeySafe with AWS CloudHSM, which uses hardware modules to manage keys via Amazon's product and is the latest revision of what was previously the Enterprise Key Management service.While that was useful for large enterprises like GE and McKinsey & Company that were willing to dedicate people to managing the security hardware, it left out smaller businesses that wanted control over their encryption keys, which is where the new product comes in. Box says the version of KeySafe that relies on Amazon's Key Management Service takes as little as 30 minutes to set up, and is simple to maintain.To read this article in full or to leave a comment, please click here

For Those Who Think Differently

A week ago Plexxi’s founder and CTO, Dave Husak presented at the Boston area networking Meetup called BOSNOG. This week Plexxi celebrates our five-year founding anniversary. I was at the Meetup with the Plexxi team and during the Q&A segment a question was asked that provoked some reflection on my part. The question was “what has been the biggest barrier to adoption for Plexxi?” A simple question, but the answer is not so simple.

The biggest barrier to Plexxi has been the ingrained acceptance of networking complexity and singular design to all networking requirements. Over the past five years, many companies brought to market solutions that added to this complexity with little if any underlying changes to the traditional network architecture. The past five years in networking has been witness to a multitude of technical attempts to change networking through the façade of automation, but none have tried to make it simpler and better. During these five years entire product lines from our competitors have achieved full cradle to end-of-life cycle in an attempt to “…harness the intelligent network through programmability and abstraction across multiple layers, offering a choice of protocols, industry standards, and usage-based deployment models” with the goal to Continue reading

IDG Contributor Network: Wi-Fi should be used to catch criminals, police advisor says

Criminals leave forensic evidence behind at crime scenes that's not being collected by police investigators, says a law enforcement expert.MAC addresses and router log-in attempts are recorded by routers. That information can tie a smartphone owner to a time and location, which can be valuable when trying to charge or prosecute suspects in criminal cases, reckons a police technical advisor.Routers "These devices could hold a lot of information, but we're not capturing it," Dan Blackman, a Western Australia police advisor and Edith Cowan University PhD student, said in a Science Network Western Australia article.To read this article in full or to leave a comment, please click here

Website Reborn and Migrated to Pelican

Hello and Welcome, again, to my newly brushed website !! After a long period of inactivity, I decided to resume my on-line activity and started by migrating away from Wordpress onto a new platform based on something that I use pretty often these days: Python !

IDG Contributor Network: Ransomware is only getting worse. How do you prepare for it?

Ransomware is big business. Over the last few years we've observed the steady rise of ransomware, with some trepidation. It is fast becoming a multi-billion dollar business, and it's getting surprisingly sophisticated. The ransomware industry is continually innovating, offering cybercriminals new technology, various business models, and all the support they need to conduct successful attacks on unsuspecting individuals and companies.Changing face of ransomware Ransomware has come full circle since it first appeared on the scene in 2005. Early crypto ransomware soon gave way to misleading apps, fake antivirus tools, and lockers. But it's back now, it's mature, and it's here to stay, according to Symantec's Evolution of Ransomware report.To read this article in full or to leave a comment, please click here

Feds grab $39M worth of fake sports gear ahead of NFL Super Bowl 50

In its annual Super Bowl-timed crackdown on counterfeit sports gear – everything from fake hats to shirts-- the U.S. Immigration and Customs Enforcement (ICE) agency said it had seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million – so the problem isn’t getting any smaller. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+ The crackdown, known as Operation Team Player, began at the conclusion of last year’s Super Bowl, also resulted in 41 criminal arrests and 35 convictions, ICE stated.To read this article in full or to leave a comment, please click here

DHS EINSTEIN firewall fails to detect 94% of threats, doesn’t monitor web traffic

When you think “Einstein,” something along the lines of smart probably comes to mind. But the Department of Homeland Security's $6 billion EINSTEIN intrusion detection system is closer to dumb than smart, as the firewall fails to scan for 94% of common security vulnerabilities; it doesn’t even monitor web traffic for malicious content! That is supposed to be coming in 2016, with wireless network protection coming in 2018.The newest failings of EINSTEIN, aka the National Cybersecurity Protection System (NCPS), came after an audit and are highlighted in a harsh U.S. Government Accountability Office (GAO) report (pdf) which outlines a plethora of changes that need to be implemented.To read this article in full or to leave a comment, please click here

Star Trek’s USS Enterprise gets serious Smithsonian restoration

Few museums in the world can restore and preserve important historical items like the Smithsonian. So it comes as no surprise the level of detail and effort by the Smithsonian National Air and Space Museum on the conservation of the original TV studio model of Star Trek’s main attraction, the USS Enterprise. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+ According to a recent post on its “Air and Space” blog, the museum detailed the meticulous work going into the refurbishing of the 11-ft model: “After a year of extensive research, conservation work on the original studio model of the USS Enterprise is now underway in the Museum’s spacedock. Our goal is to stabilize the model and return it to its appearance from August of 1967, during the filming of the episode The Trouble with Tribbles, which marked the last known modification of the ship during the production of Star Trek.”To read this article in full or to leave a comment, please click here

MPLS Design Case Study

MPLS Design – MPLS Design Case Studies are the useful resources to learn the design details of MPLS. You will be provided a brief information about the business and technical requirements. You can share your answer at the comment section below. Note: This is only one of the case studies in the DesignWorld. DesignWorld provides […]

The post MPLS Design Case Study appeared first on Orhanergun.

MPLS Design Case Study

MPLS Design – MPLS Design Case Studies are the useful resources to learn the design details of MPLS. You will be provided a brief information about the business and technical requirements. You can share your answer at the comment section below. Note: This is only one of the case studies in the DesignWorld. DesignWorld provides […]

The post MPLS Design Case Study appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

The Future State of Security Starts with Virtualization: VMware at the 2016 RSA Conference

It’s no secret that by transforming networking into a software industry, network virtualization has accelerated innovation. But what does virtualization mean for security more broadly? Can virtualization be a key weapon in the arsenal for improving IT security? If so, how?

Tom Corn, & Guido Appenzeller, VMware Inc.

Tom Corn, & Guido Appenzeller, VMware Inc.

Continue reading