Archive

Category Archives for "Networking"

Tips for migrating applications to Software Defined Networks

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.Software Defined Networking (SDN) is one of the hottest trends in security and networking right now. Many enterprises are considering moving to virtualized networks such as VMware NSX as part of an overall shift from relatively inflexible hardware-based architectures to nimbler, faster, more scalable virtualized deployments.But as with any migration project, careful planning and management is required. Here we look at the steps involved in an SDN migration and what you need to consider at each stage.To read this article in full or to leave a comment, please click here

PlexxiPulse—Products for Success

As the industry transitions into the next era of IT, the flood of data and application growth is forcing Cloud-based network architectures to change radically (for more info take a look here). This shift is causing an increased emphasis on tools and service integration rather than a focus on individual components. The emerging role of Cloud Architect is tasked with delivering agility and cost savings through automation, resource elasticity, data and application mobility and workflow integration. We’ve identified this new role and have the tools that will enable Cloud Builders to be successful—Plexxi Control software, Plexxi Connect and Plexxi Switch. Interested in learning more? Take a look at our solutions brief on networking for Cloud Builders.

Below please find a few of our top picks for our favorite news articles of the week.

ITBusinessEdge: Striving Toward Unified Enterprise Infrastructure
By Arthur Cole
Most enterprises are already realizing some of the benefits of cloud computing in the form of lower capital and operating costs, better scalability and access to more modern, robust infrastructure. But if they are not careful, they run the risk of migrating workloads onto too many disparate platforms, creating the same kinds of data silos that currently Continue reading

Enjoy the DesignWorld Subscription Discount before the 5-day Deadline

Hello Everyone As you all know, the DesignWorld is a place where you can find network design videos, articles, quizzes, and comparison charts. Currently, only CCDE resources are there, but the good news is that other courses will be added, too. In addition, CCDA and CCDP courses will be added. There was a promotion for the […]

The post Enjoy the DesignWorld Subscription Discount before the 5-day Deadline appeared first on Orhanergun.

Last 5 Days to Enjoy the DesignWorld Subscription Discount

Hello Everyone As you all know, the DesignWorld is a place where you can find network design videos, articles, quizzes, and comparison charts. Currently, only CCDE resources are there, but the good news is that other courses will be added, too. In addition, CCDA and CCDP courses will be added. There was a promotion for the […]

The post Last 5 Days to Enjoy the DesignWorld Subscription Discount appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Brocade joins the OpenPOWER Foundation

In my 32 year career in the IT industry there has never been a better time to embrace the partners needed to meet client requirements, needs and expectations.  Brocade has built its business on partnering with suppliers who deliver enterprise class infrastructure in all the major markets. IBM is one example of a partner who... Read more →

Wireshark Tid-bit: De-crypt SNMPv3 in Wireshark

I recently found myself troubleshooting some SNMP connectivity between a particular set of devices and an NMS. Connectivity did not appear to be the problem as IP Connectivity was there and MIB walks were successful, however some interesting errors were still getting reported on the NMS. As I captured the packets to verify this connectivity, I […]

Cybersecurity whistleblowers: Get ready for more

It is not a public problem yet. But according to multiple experts, it will be.“It” is the cybersecurity whistleblower – an employee who sees a flaw, or flaws, in his or her company’s network security, brings the problem to management but gets ignored or punished – marginalized, harassed, demoted or even fired.And then the worker either goes public or files a complaint with a federal regulatory agency like the Securities and Exchange Commission (SEC).Such a scenario is unlikely to end well – almost certainly for the company (if the complaint is credible) and perhaps even for the whistleblower, notwithstanding laws meant to protect them.To read this article in full or to leave a comment, please click here

Facebook, Google, Twitter, Woz, Trump, McAfee, Snowden, and more take sides on Apple vs. the FBI

Apple is challenging a federal court order to help access an iPhone used by one of the shooters in the San Bernardino terrorist attack, claiming that doing so would create a “dangerous precedent.”Now, other tech companies and politicians are publicly debating whether Apple’s dead-set protection of user privacy is justified and whether the FBI has a right to enter people’s iPhones via a “backdoor” to ensure national security. Shortly after Apple CEO Tim Cook posted an open letter detailing Cupertino’s refusal, tech leaders, presidential candidates, and other public figures began taking sides.To read this article in full or to leave a comment, please click here

VTech not backing down on terms change after data breach

Despite widespread public condemnation, Hong Kong toy maker VTech is not backing down from a change in its Terms and Conditions ducking its responsibilities in the event of a breach.European customers now have to agree to a Terms of Service that includes the following sentence: “You acknowledge and agree that any information you send or receive during your use of the site may not be secure and may be intercepted or later acquired by unauthorized parties."MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers This was in response to a data breach the previous fall which affected about 5 million parent accounts and more than 6 million children's' accounts. The children profiles included names, genders, birthdates, headshots and chat logs while the parent accounts included email addresses, passwords, secret questions and answers, IP addresses, and mailing addresses.To read this article in full or to leave a comment, please click here