Archive

Category Archives for "Networking"

Smartphones from Xiaomi and Micromax pressure established manufacturers

Indian smartphone manufacturer Micromax and Xiaomi from China have given the low-end segment a shake up with their latest products, and even if the devices don’t go on sale around the world, their launches will likely be felt globally.The Micromax Yu Yuphoria the Xiaomi Mi 4i’s combination of impressive specs and aggressive pricing will put pressure on the likes of Samsung Electronics and Motorola Mobility to step up their efforts in the segment for sub-US$200 smartphones.“It’s more pain for the established vendors. These devices have the potential to reset customer expectations,” said Ben Wood, chief of research at CCS Insight.The Yu Yuphoria was launched on Tuesday in India. It’s an LTE smartphone that will cost about $110 without a contract in that country. It has a 5-inch, 720 x 1280 pixel screen and a Snapdragon 410 processor. The specification also includes an 8-megapixel main camera and a 5-megapixel front camera, as well as 2GB of RAM and 16GB of integrated storage. While smartphones in this price category used to look as cheap as they were, the Yuphoria has a metal frame to help it look more premium.To read this article in full or to leave a Continue reading

Asian nations increasingly hit by espionage groups

Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.Some of the groups have been active for years, but the extent of their operations are only now coming to light.One Chinese-speaking group, dubbed Naikon, has been operating for five years and has had a “high volume, high profile, geo-political attack activity,” researchers from Kaspersky Lab said Thursday in a report.The group has targeted top-level government, military and civilian organizations from the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar (Burma), Singapore, Nepal, Thailand, Laos and China.To read this article in full or to leave a comment, please click here

Let’s Review: OSPF LSA Types

With my Written exam for CCIE: R/S coming up soon (Cisco Live 2015) I figured this would be a good time to back over some basics, and when it comes to OSPF what is more basic than OSPF LSA Types! LSA Type 1 – These are also known as Router LSA’s, every router participating in […]

My Top 10 Things to Look Forward to at Cisco Live 2015

  10. John Chambers Keynote This year will mark John Chambers last Cisco Live Keynote as CEO of Cisco, ending his 20 year run in the position.  In case you may have missed the announcement, starting on July 26th, Chuck Robbins will take over as CEO.  This keynote will be John’s farewell and perhaps the welcoming […]

The post My Top 10 Things to Look Forward to at Cisco Live 2015 appeared first on Fryguy's Blog.

Common Networking Protocols in LAN, WAN and Datacenter

Spanning Tree, Link Aggregation , VLAN and First Hop Redundancy protocols are used in Campus, Service Provider Access and Aggregation and in the Datacenter environment. There are definitely other protocols which are common across the Places in the Networks but in order to keep this article short and meaningful I choose these four. I will… Read More »

The post Common Networking Protocols in LAN, WAN and Datacenter appeared first on Network Design and Architecture.

China-based hackers used Microsoft’s TechNet for attacks

Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security vendor FireEye.The group, which FireEye calls APT (advanced persistent threat) 17, is well-known for attacks against defense contractors, law firms, U.S. government agencies and technology and mining companies.TechNet is highly trafficked website that has technical documentation for Microsoft products. It also has a large forum, where users can leave comments and ask questions.APT17—nicknamed DeputyDog—created accounts on TechNet and then left comments on certain pages. Those comments contained the name of an encoded domain, which computers infected by the group’s malware were instructed to contact.To read this article in full or to leave a comment, please click here

VCDX-NV Interview: Nemtallah Daher Discusses VMware NSX Certification

Nemtallah Daher is Senior Network Delivery Consultant at the consulting firm AdvizeX Technology. Recently he took some time out of his day to talk with us about why, as a networking guy, he thinks learning about network virtualization is critical to further one’s career. 

***

I’ve been at AdvizeX for about a year now. I do Cisco, HP, data center stuff, and all sorts of general networking things: routing, switching, data center, UCS. That kind of stuff. Before coming to AdvizeX, I was a senior network specialist at Cleveland State University for about 20 years.

I started at Cleveland State in 1988 as a systems programmer, working on IBM mainframe doing CICS, COBOL and assembler. About 2 years after I started at Cleveland State, networking was becoming prevalent, and the project I was working on was coming to an end, so they asked me if I would help start a networking group. So from a small lab here, a building here, a floor there, I built the network at Cleveland State. We applied for a grant to get some hardware, applied for an IP address, domain name, all these things. There was nothing at the time, so we Continue reading

Review: 7 Android apps that track your expenses

Traveling these days is a hassle, no matter why you're going, or where -- and the necessity to track your expenses along the way just adds to the irritation. A good app, though, can make things a lot easier -- not only during the trip but afterwards, when you have to report it all to your (or your company's) accountant.The following seven Android apps have been created to help users track and report on their expenses. Some are strictly for business purposes; others can be used for both personal and work finance tracking. All of these have been updated within the last six months and have earned a rating of at least 4 out of 5 stars on Google Play by at least 100 users.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, May 14

U.S. House votes to end NSA bulk data collectionThe dragnet collection of U.S. phone records by the National Security Agency exposed by former NSA contractor Edward Snowden nearly two years ago is finally on its way to being a relic of history. The U.S. House of Representatives voted 338 to 88 in favor of a bill that prohibits the practice. However, the USA Freedom Act does extend an expiring provision in the anti-terrorism Patriot Act that allows the NSA to collect U.S. telephone and business records, but with a more limited scope.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, May 14

U.S. House votes to end NSA bulk data collectionThe dragnet collection of U.S. phone records by the National Security Agency exposed by former NSA contractor Edward Snowden nearly two years ago is finally on its way to being a relic of history. The U.S. House of Representatives voted 338 to 88 in favor of a bill that prohibits the practice. However, the USA Freedom Act does extend an expiring provision in the anti-terrorism Patriot Act that allows the NSA to collect U.S. telephone and business records, but with a more limited scope.To read this article in full or to leave a comment, please click here

Validating and searching JSON

When it comes to dealing with network automation, you can find yourself battling with many things, including dealing with XML and JSON data structures as you build apps that consume or spit out data.

Recently I’ve been using ‘jq’ to provide my JSON validation (i.e. I’ve not missed a quotation, colon, comma, curly or square bracket) when building data in JSON. Its primary function and purpose is to search through JSON data to find something in the data set, or reduce the data set to an area of focus, thus also validating your application is generating what it should be generating! A ‘lightweight and flexible command line JSON processor’ if you take the website description which is here: http://stedolan.githib.io/jq/

So how do you use this jq?

Here’s a simple JSON example with an ‘error’.

{
	"name":"App1",
	"OS":["Linux", "Windows", "Solaris", "OSX"],
	"Author":"David Gee",
	"Email":"[email protected]",
	"Twitter":"@davidjohngee"
	"Version":"alpha-v0.1",
	"IP_Address":"192.0.2.1:5000"
}

Using ‘jq’ I can not only validate the structure, but in the case of a script, I can also parse out the key/value I need. But first, let’s see where our error is.

$ jq '.' tst.json 
parse error: Expected separator between  Continue reading

Japan’s Alsok to launch warning system for unwelcome drones

Burglar alarms could soon incorporate drone-detection technology if a new service from a Japanese security company is anything to judge by.Tokyo-based Sohgo Security Services, also known as Alsok, plans to introduce a system that can detect incoming drones by listening for the signature hum of their rotors.The service could be aimed at government entities, corporations and key facilities such as nuclear power plants as a terrorism countermeasure. Other potential users are people or groups in the public eye who want to ward off the prying eyes of unmanned aerial vehicles.Alsok’s move follows an incident last month when a quadcopter with trace amounts of radiation was found on the roof of the Japanese prime minister’s office, apparently a protest of the government’s nuclear energy policy.To read this article in full or to leave a comment, please click here

Alibaba won’t last without expanding globally, new CEO says

After taking over the reins, Alibaba Group’s new CEO has made global expansion a top priority for the Chinese e-commerce giant.Alibaba will heavily invest in “new and existing overseas operations,” said Daniel Zhang in a speech on Wednesday to employees, an excerpt of which was posted on the group’s website.Zhang, 43, was the company’s chief operating officer until he replaced CEO Jonathan Lu last week, as the group said it was looking to tap new younger talent.To read this article in full or to leave a comment, please click here

Alibaba won’t last without expanding globally, new CEO says

After taking over the reins, Alibaba Group’s new CEO has made global expansion a top priority for the Chinese e-commerce giant.Alibaba will heavily invest in “new and existing overseas operations,” said Daniel Zhang in a speech on Wednesday to employees, an excerpt of which was posted on the group’s website.Zhang, 43, was the company’s chief operating officer until he replaced CEO Jonathan Lu last week, as the group said it was looking to tap new younger talent.To read this article in full or to leave a comment, please click here