Back in February, I wrote a piece entitled “HP Buying Aruba?”. In that post, I provided some context around why I thought HP buying Aruba could end up being a bad idea. I also mentioned in that post that I hoped HP did right by Aruba’s customer base and didn’t put the corporate handcuffs on them.
After several months and many conversations with HP, Aruba, and my peers, I have a different take. I am not 100% ready to back off from my concerns though. The acquisition has closed. The deal is done. However, it is too early in the process to be certain of much of anything regarding the future state of Aruba, its products, and its ability to execute as they have in the past. Let’s just say I am about 75% headed in the opposite direction of my initial concerns.
This past week, I was fortunate enough to attend HP Discover in Las Vegas. HP paid for my travel and expenses for HP Discover. For that, I thank them and I can definitively tell you that I was not pressured into writing anything as a result of this trip. As luck would have it, Aruba Continue reading
As many of you have heard by now, Cisco has announced their new CCNA Cloud and CCNP Cloud certifications. These certifications are designed to be a focus-based around their “Internet of Things” (IoT) concept, which will also play into the “Internet of Everything” (IoE) transformation that we’ll see happening over the next several years. In addition to Cisco, so many other companies are participating in the IoT concept, at a minimum, the companies listed here.
As a quick summary, the IoT definition refers to the endpoints, devices, and networks that connect to the internet, whereas their IoE definition is more of a “tied in system” that brings networked devices, and endpoints (IoT) together into a much larger solution that will allow the ability to connect people, places, and things in a much more relevant and valuable way than ever imagined. IoE brings people, processes, data, and the connected devices together to form – essentially, in my own words “a connected world”.
For a visual explanation, check out this slideshow and video (which I love) developed by Cisco.
As I read into Cisco’s Continue reading
During the Cumulus Linux presentation Dinesh Dutt had at Data Center Fabrics webinar, someone asked an unexpected question: “Do you have In-Service Software Upgrade (ISSU) on Cumulus Linux” and we both went like “What? Why?”
Dinesh is an honest engineer and answered: “No, we don’t do it” with absolutely no hesitation, but we both kept wondering, “Why exactly would you want to do that?”
Read more ...Let’s say you’ve been offered a new job. $70k base salary, with up to $20k per year extra for on-call duties. Great! $90k! That’s $10k more than my salary now! Sign me up!
Wait a minute. Not so fast.
Years ago I received some good advice: Treat your on-call payment as a separate item. Don’t consider it as part of your base salary. This is because you need to be paid properly both for doing your job, and for the inconvenience of being on-call.
Evaluate the base salary for what it is: Your salary for doing your day-to-day job. Ignoring the on-call part, did they offer you enough money for the role? Is it a good match for your experience?
Separately decide if the on-call payment is enough to justify being on-call. Does it represent a fair payment for the extra work?
Why does this matter? A few reasons:
How to Call REST APIs from a REST Client and Python
Presenter: Matt (didn't catch last name, sorry)
Presenter: Konrad Reszka, IoT Vertical Solutions Group Engineering Lead
“Given a chance, how many people in this room would volunteer to be a meteorologist in San Diego? You'd never be wrong!”
Presenter: Jeff Schutt - Cybersecurity Solutions Architect (Jeff works in Adv Services in the IoT team)
Full Title: An IoT Security Model & Architecture for Securing Cyber-Physical and IT-OT Converged Assets
Mix of IT/OT folks in the room.
LightCyber Magna Active Breach Detection automatically detects active attackers by identifying the anomalous operational behaviors sourced from compromised hosts in your network. By focusing on actual attack behaviors, and not technical artifacts like signatures, Magna provides accurate breach indicators and eliminates excessive false positives.
The post PQ Show 51 – LightCyber Magna Active Breach Detection – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.
The Cloonix development team released an update to Cloonix version 26 in May 2015. An important addition in version 26 is a greatly expanded and improved Cloonix user guide.
The new version also changes the user interface, adds a new LAN type, and eliminates the t2t device. It also includes updated guest virtual machines.
In Cloonix Version 26, the user interface eliminates the tool bar and makes all graph objects available via a right-click drop-down menu.
Right-click to access the virtual network object menu
Cloonix v26 KVM configuration window
The only change to the install procedure is a some new prerequisite software packages that must be installed to support compilation.
You can install pre-compiled binaries or compile Cloonix from source code. I prefer to compile it. The source code and the precompiled binaries are on the Cloonix Software page.
To compile the source code on Xubuntu 14.04, I followed the procedure documented in the Cloonix install documentation.
We will install Cloonix v26 in our Home directory. Download and unpack the source code.
How does Internet work - We know what is networking
This one is long. Do not be afraid though, I made it just to give you the fastest way to deploy functional dot1x to your company HQ without reading even more documentation and searching for those little timer default settings. I the article prior to this I showed you how to setup your environment with simple dot1x and make it as simple as possible. I will not repeat again the part about setting up Radius Clients on server side, everything else is here once again just more complex. Now is time for a more complex example that will make your implementation
If you’ve visited the Brocade website recently, you’ve probably seen the “Free NFV Certification” banner. I signed up for this several months ago, but had put off completing the course. I had a little downtime recently prior to starting work at Brocade, so I completed this course & exam. Here’s my impressions.
From the official documentation:
As a Brocade Certified vRouter Engineer, you must be able to demonstrate the ability to install, configure and troubleshoot features of Brocade Vyatta Network OS.
i.e. it’s primarily about the basics of Vyatta.
Here’s what you get when you sign up:
Note that you can run the Vyatta image on a local hypervisor, or if you prefer you can select it from the AWS marketplace. Personally I ran it on VMware Fusion on my laptop. It’s light on resource, so you can easily spin up several Continue reading
On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.
The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers Podcast and was written by Ethan Banks.