In this transcript from Seeking Alpha, Gary Moore, Chief Operating Office of Cisco claims that " eight of the global ten over-the-top providers like Amazon are huge Cisco customers". For network architect & strategy types, it's worth reading to see how Cisco intends to extract more revenue from your budget. In particular there are several references to Cisco "analytics service offerings" which Mr Moore states are opportunities for upsell in SmartNet maintenance. It might be worth looking into those products to prepare a "defense against the dark arts" from Cisco account managers.
The post Cisco COO Claims Amazon as Huge Customer and Other Insights appeared first on EtherealMind.
Let’s try to define what EtherChannel is and why it exists nowadays as a powerful feature.
The post Understand Etherchannel Load Balancing. appeared first on Packet Pushers Podcast and was written by Michał Janowski.
Glue Networks had a presence at the last ONUG, where Tom Hollingworth was able to get an overview from Glue’s founder, Jeff Gray:
As you can see, Glue’s product targets the WAN, and specifically addresses the difficult provisioning tasks that most shops do manually. These include but are not limited to:
Jeff visited our Tech Field Day round table at ONUG 2014 and gave us a more detailed introduction to the product:
First, some things I think this product does (or will do) well. The configuration of PfR or QoS en masse is a low-hanging use case I’ve mentioned before and even if I can do it using scripts today, having a single tool that does it in a simple way will provide value. These specific configurations are difficult and error-prone, so anything that tackles this is going to be useful.
I also did enjoy hearing about the options for getting the config onto the device. Jeff listed three options for Continue reading
The Arbor Security Engineering Response Team (ASERT) has released a research paper concerning the Etumbot malware.
Etumbot is a backdoor used in targeted attacks since at least March 2011. Indicators suggest that Etumbot is associated with the Numbered Panda group, also known as IXEHSE, DynCalc, and APT12. Although previous research has covered related malware, little has been publicly discussed regarding Etumbot’s capabilities.
Indicators suggest that the Etumbot dropper is delivered via spear phishing and is contained inside an archive file intended to be of interest to the target. The attackers use the Unicode Right to Left Override technique and document icons to disguise malicious executable content as document files. Once the dropper is executed, the backdoor is activated and a distraction file of interest to the target is opened for viewing. ASERT has observed several Etumbot samples using distraction documents involving Taiwanese and Japanese topics of interest, and has also observed recent development activity which indicates that attack campaigns are ongoing.
Once installed, the backdoor connects to it’s Command & Control server and receives an encryption key. RC4 encryption, along with HTTP transactions intended to blend in with typical traffic are used for backdoor communications. Etumbot’s core functionality Continue reading
Facebook has telling people more about it's in-house designed and developed whitebox Ethernet switching based on Broadcom silicon (not sure if it's Trident2 or Arad), their own Linux distribution and OpenCompute standards.
The post Response: Bare-metal Switches And SDN controllers At Facebook appeared first on EtherealMind.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have coffee break. Thanks to Steven Hill from Current Analysis for joining us this week. Show Links […]
The post Coffee Break – Show 8 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
[player] This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have coffee break. Thanks to Steven Hill from Current Analysis for joining us this week. Show […]
The post Coffee Break – Show 8 appeared first on Packet Pushers.
sudo apt-get install hsflowdNote: Network managers may find this command odd since it is usually not possible to install third party software on switch hardware. However, what is even more radical is that Cumulus Linux allows users to download source Continue reading
It is slightly paradoxical that since I left networking for the student life I’ve actually been reading more about networking than I was able to during the last years of my working life. Similarly, I’ve had more time to follow the goings on in the social media, especially when the big conferences were on. Over […]
The post Conferences: Go appeared first on Packet Pushers Podcast and was written by Matthew Mengel.
How does the internet work - We know what is networking
On point to point links we actually do not need special broadcast address of that subnet because there's only one way you can send a packet across point to point link.
Gartner has defined itself a new market segment in “Network Performance Monitoring and Diagnostics” (NPMD) that highlights “solutions from AppNeta, CA Technologies, Corvil, Fluke Networks, Genie Networks, HP, Infovista, JSDU (via Network Instruments acquisition), Lancope, NetScout Systems, Niksun, Orsyp, Paessler, Riverbed, and SevOne.” These are all good companies but these companies mostly rely on hardware […]
The post Response: SDN Disruption to Networking Monitoring & Gartner’s NPMD appeared first on EtherealMind.
Experts are in agreement that Software Defined Networking/Network Virtualization will make the network world more efficient and more agile, but opinions vary on the best path forward. We reached out to two of the most prominent players to ask them to spell out why they think their approach is best.
vice president of product marketing in VMware’s Networking & Security Business Unit, argues that network virtualization – embodied in the company’s NSX product -- is the way to go because it abstracts network control from network hardware while replicating everything the application expects to see, vastly simplifying the task of building and managing complex network environments. View debate
To read this article in full or to leave a comment, please click here