Archive

Category Archives for "Networking"

Privacy and Networking Part 6: Essential Questions For Privacy Best Practices

Thus far, I’ve concluded that IP addresses and other information network operators handle is personally identifiable (PII) and covered under privacy and security regulations. I’ve also looked at the data lifecycle and user rights related to private data. What are some best practices network operators can follow to reduce their risk? The simplest way to […]

The post Privacy and Networking Part 6: Essential Questions For Privacy Best Practices appeared first on Packet Pushers.

The Puzzle of Peering with Kentik

If you’ve worked at an ISP or even just closely with them you’ve probably hearing the term peering quite a bit. Peering is essentially a reciprocal agreement to provide access to networks between two providers. Provider A agrees to allow Provider B to send traffic over and through their network in exchange for the same access in the other direction. Sounds easy, right? On a technical level it is pretty easy. You simply set up a BGP session with the partner provider and make sure all the settings match and you’ve got things rolling.

The technical part isn’t usually where peering gets complicated. Instead it’s almost always related to the business side of things. The policy and negations that have to happen for a good peering agreement take way more time that hammering out some BGP configuration stanzas. The amount of traffic to be sent, the latency requirements, and even the cost of the agreement are all things that have to be figured out before the first hello packet can be exchanged. This agreement is always up for negotiation too, since the traffic patterns can change before you realize it and put you at a disadvantage.

Peerless Data Collection

If Continue reading

Heavy Networking 643: Privacy Responsibilities Of Running A Network

What does privacy have to do with running a network? Is protecting the privacy of users, customers, and the organization one of the responsibilities of the networking team? If so, what kind of information has to be kept private and how? Should privacy efforts focus on compliance, or on risk reduction? How are those different? On today’s Heavy Networking podcast we welcome Russ White to tackle these perplexing privacy questions.

Heavy Networking 643: Privacy Responsibilities Of Running A Network

What does privacy have to do with running a network? Is protecting the privacy of users, customers, and the organization one of the responsibilities of the networking team? If so, what kind of information has to be kept private and how? Should privacy efforts focus on compliance, or on risk reduction? How are those different? On today’s Heavy Networking podcast we welcome Russ White to tackle these perplexing privacy questions.

The post Heavy Networking 643: Privacy Responsibilities Of Running A Network appeared first on Packet Pushers.

How to find files on Linux and make it easy to find them again

The cd command makes it easy to switch to another directory on Liniux, but only if you know where you’re heading. In this post, I discuss a couple of tricks for moving between known locations and provide a script for finding and “remembering” files or locations that you might want to reuse.One of the easiest things to do with the cd command is return to your home directory regardless of where you are sitting in the file system at the moment. Just type cd by itself, and you’ll be back in your home directory. Typing cd ~ will do the same thing, though adding the tilde won’t get you there any faster.To read this article in full, please click here

How to find files on Linux and make it easy to find them again

The cd command makes it easy to switch to another directory on Liniux, but only if you know where you’re heading. In this post, I discuss a couple of tricks for moving between known locations and provide a script for finding and “remembering” files or locations that you might want to reuse.One of the easiest things to do with the cd command is return to your home directory regardless of where you are sitting in the file system at the moment. Just type cd by itself, and you’ll be back in your home directory. Typing cd ~ will do the same thing, though adding the tilde won’t get you there any faster.To read this article in full, please click here

How to find files on Linux and make it easy to find them again

The cd command makes it easy to switch to another directory on Liniux, but only if you know where you’re heading. In this post, I discuss a couple of tricks for moving between known locations and provide a script for finding and “remembering” files or locations that you might want to reuse.One of the easiest things to do with the cd command is return to your home directory regardless of where you are sitting in the file system at the moment. Just type cd by itself, and you’ll be back in your home directory. Typing cd ~ will do the same thing, though adding the tilde won’t get you there any faster.To read this article in full, please click here

How to find files on Linux and make it easy to find them again

The cd command makes it easy to switch to another directory on Liniux, but only if you know where you’re heading. In this post, I discuss a couple of tricks for moving between known locations and provide a script for finding and “remembering” files or locations that you might want to reuse.One of the easiest things to do with the cd command is return to your home directory regardless of where you are sitting in the file system at the moment. Just type cd by itself, and you’ll be back in your home directory. Typing cd ~ will do the same thing, though adding the tilde won’t get you there any faster.To read this article in full, please click here

Kubernetes Unpacked 007: Kubernetes From Beginner To Advanced

Learning Kubernetes isn't easy. In fact, there are so many places to start that people literally don’t know where to begin. Do they learn Kubernetes security? Networking? Infrastructure? Development? Michael Levan catches up with Kevin Evans and Robin Smorenburg to talk about their journeys into Kubernetes, how each of them started, links to learning resources, and where they’re at now.

Kubernetes Unpacked 007: Kubernetes From Beginner To Advanced

Learning Kubernetes isn't easy. In fact, there are so many places to start that people literally don’t know where to begin. Do they learn Kubernetes security? Networking? Infrastructure? Development? Michael Levan catches up with Kevin Evans and Robin Smorenburg to talk about their journeys into Kubernetes, how each of them started, links to learning resources, and where they’re at now.

The post Kubernetes Unpacked 007: Kubernetes From Beginner To Advanced appeared first on Packet Pushers.

Cisco backlog still looms

Like many of its competitors, Cisco’s quarterly and year-end financial results show the good and bad of the current economy—a record of new product orders alongside record backlogged orders.Cisco reported that for the period ending July 30, its quarterly revenue was basically flat year-over-year at $13.1 billion, but revenue for the 2022 fiscal year was up three percent to $51.6 billion.   [ Get regularly scheduled insights by signing up for Network World newsletters. ] “Full year product orders and backlog are both at record highs,” Cisco’s CEO Chuck Robbins said in a written statement before the company’s quarterly and year-end Wall Street phone briefing.To read this article in full, please click here

Cisco backlog still looms

Like many of its competitors, Cisco’s quarterly and year-end financial results show the good and bad of the current economy—a record of new product orders alongside record backlogged orders.Cisco reported that for the period ending July 30, its quarterly revenue was basically flat year-over-year at $13.1 billion, but revenue for the 2022 fiscal year was up three percent to $51.6 billion.   [ Get regularly scheduled insights by signing up for Network World newsletters. ] “Full year product orders and backlog are both at record highs,” Cisco’s CEO Chuck Robbins said in a written statement before the company’s quarterly and year-end Wall Street phone briefing.To read this article in full, please click here

Hedge 143: Being Prepared to be Laid Off with Giovanni Messina

Forty years ago there was an implied loyalty between companies and employees—but that world is long gone. As much as companies would like their employees to be loyal, layoff culture has crept into every corner of the modern world, especially as we move into an economic downturn. Giovanni Messina joins Russ White and Tom Ammon to talk about being prepared to be laid off, including such topics as being financially prepared, building skills for the long term, and finding community.

download

How to set up DHCP failover on Windows Server

Redundancy is essential for dealing with both planned and unplanned outages, and that includes having redundant dynamic host-configuration protocol (DHCP) servers to allow uninterrupted dynamic assignment of IP addresses.For those working in Windows environments, there are currently two options for setting up redundant DHCP servers: a failover scenario with a main server paired with another in hot standby; and a load-balancing scenario in which two DHCP servers actively handle client requests. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

How to set up DHCP failover on Windows Server

Redundancy is essential for dealing with both planned and unplanned outages, and that includes having redundant dynamic host-configuration protocol (DHCP) servers to allow uninterrupted dynamic assignment of IP addresses.For those working in Windows environments, there are currently two options for setting up redundant DHCP servers: a failover scenario with a main server paired with another in hot standby; and a load-balancing scenario in which two DHCP servers actively handle client requests. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here