Archive

Category Archives for "Networking"

Palo Alto Networks pushes enterprise zero trust

Palo Alto Networks bolstered its security portfolio with products that target enterprise network users looking to make the move to a zero-trust environment.The new capabilities focus on a number of zero trust mechanisms—including  SaaS, cloud and DNS that will be available in June—and will make it significantly easier for organizations to adopt zero-trust security across the enterprise, according to Anand Oswal, senior vice president and general manager with Palo Alto. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key As more people are working from anywhere, they require fast and always-on access to data and applications in the distributed cloud, regardless of location, Oswal said. “An all-encompassing zero-trust approach to network security is critical for safeguarding productivity in the new reality of remote, mobile, and hybrid work,” he said.To read this article in full, please click here

Back to Basics: Unnumbered IPv4 Interfaces

In the previous blog post in this series, we explored some of the reasons IP uses per-interface (and not per-node) IP addresses. That model worked well when routers had few interfaces and mostly routed between a few LAN segments (often large subnets of a Class A network assigned to an academic institution) and a few WAN uplinks. In those days, the WAN networks were often implemented with non-IP technologies like Frame Relay or ATM (with an occasional pinch of X.25).

The first sign of troubles in paradise probably occurred when someone wanted to use a dial-up modem to connect to a LAN segment. What subnet (and IP address) do you assign to the dial-up connection, and how do you tell the other end what to use? Also, what do you do when you want to have a bank of modems and dozens of people dialing in?

Cisco CEO on security: “There is really no perimeter in the enterprise to defend anymore.”

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Cisco CEO: There’s no enterprise perimeter to defend anymore

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Cisco CEO on security: “There is really no perimeter in the enterprise to defend anymore.”

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Cisco CEO: There’s no enterprise perimeter to defend anymore

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Multiplayer Doom on Cloudflare Workers

Multiplayer Doom on Cloudflare Workers
Multiplayer Doom on Cloudflare Workers

There are halls and corridors in Cloudflare engineering, dangerous places for innocent wanderers, filled with wild project ideas, experiments that we should do, and extremely convincing proponents. A couple of months ago, John Graham-Cumming, our CTO, bumped into me in one of those places and asked: "What if we ported Doom multiplayer to work with our edge network?". He fatally nerd-sniped me.

Aside by John: I nerd-sniped him because I wanted to show how Cloudflare Workers and Durable Objects are a new architectural paradigm where, rather than choosing between two places to write code (the client, the browser or app, and the server, perhaps in a cloud provider availability zone), there’s a third way: put code on the edge.

Multiplayer Doom on Cloudflare Workers

Writing code that runs on a client (such as JavaScript that runs in a browser or a native app on a phone) has advantages. Because the code runs close to the end-user it can be highly interactive, there’s almost no latency since it’s literally running on the device. But client-side code has security problems: it’s literally in the hands of the end-user and thus can be reverse engineered or modified. And client-side code can be slow to update as it Continue reading

MIRA Project to Provide Overview of Internet’s Resiliency in Africa

Internet resilience is the ability of a network to maintain an acceptable level of service at all times. The Internet  plays a critical role in society and the COVID-19 pandemic has reinforced the importance of reliable and stable Internet connectivity. However, not all countries have Internet infrastructure that is robust enough to provide an acceptable […]

The post MIRA Project to Provide Overview of Internet’s Resiliency in Africa appeared first on Internet Society.

Born In The Cloud Enterprise Case Study With Tekion – Packet Pushers LiveStream With Alkira (Video 2)

Tekion builds cloud-based applications for the automotive retail industry. The company uses Alkira’s cloud networking product to connect a network of automobile dealerships to an array of cloud-hosted services. In this video, the Packet Pushers’ Ethan Banks talks to Tekion’s Jamie Fox. They discuss how the Alkira platform enables Tekion to leverage multiple clouds with […]

The post Born In The Cloud Enterprise Case Study With Tekion – Packet Pushers LiveStream With Alkira (Video 2) appeared first on Packet Pushers.

The timeline for quantum computing is getting shorter

Financial traders rely heavily on computer financial simulations for making buying and selling decisions. Specifically, “Monte Carlo” simulations are used to assess risk and simulate prices for a wide range of financial instruments. These simulations also can be used in corporate finance and for portfolio management.But in a digital world where other industries routinely leverage real-time data, financial traders are working with the digital equivalent of the Pony Express. That’s because Monte Carlo simulations involve such an insanely large number of complex calculations that they consume more time and computational resources than a 14-team, two-quarterback online fantasy football league with Superflex position.To read this article in full, please click here

Using Gimp to modify PDF files

If you’ve never used Gimp—a free image editor available for GNU/Linux, OS X, Windows and other operating systems—you might be quite surprised by its capabilitiesI use it for everything from Facebook posts when the available backgrounds don’t work well for what I want to say to political buttons that I design and press out using a button-making machine.Converting and manipulating image files with Linux commands Gimp can do everything from resizing and cropping images to adding text, changing colors or distorting images in artistic ways. You can use it to draw with its pencil or paintbrush and layer additional images. It’s quite a versatile tool. Yet I only recently noticed that it can also be used to manipulate PDF files, not just the many types of image files that most people use it to create, modify or enhance.To read this article in full, please click here

The timeline for quantum computing is getting shorter

Financial traders rely heavily on computer financial simulations for making buying and selling decisions. Specifically, “Monte Carlo” simulations are used to assess risk and simulate prices for a wide range of financial instruments. These simulations also can be used in corporate finance and for portfolio management.But in a digital world where other industries routinely leverage real-time data, financial traders are working with the digital equivalent of the Pony Express. That’s because Monte Carlo simulations involve such an insanely large number of complex calculations that they consume more time and computational resources than a 14-team, two-quarterback online fantasy football league with Superflex position.To read this article in full, please click here

Using Gimp to modify PDF files

If you’ve never used Gimp—a free image editor available for GNU/Linux, OS X, Windows and other operating systems—you might be quite surprised by its capabilitiesI use it for everything from Facebook posts when the available backgrounds don’t work well for what I want to say to political buttons that I design and press out using a button-making machine.Converting and manipulating image files with Linux commands Gimp can do everything from resizing and cropping images to adding text, changing colors or distorting images in artistic ways. You can use it to draw with its pencil or paintbrush and layer additional images. It’s quite a versatile tool. Yet I only recently noticed that it can also be used to manipulate PDF files, not just the many types of image files that most people use it to create, modify or enhance.To read this article in full, please click here

Packet Bursts in Data Center Fabrics

When I wrote about the (non)impact of switching latency, I was (also) thinking about packet bursts jamming core data center fabric links when I mentioned the elephants in the room… but when I started writing about them, I realized they might be yet another red herring (together with the supposed need for large buffers in data center switches).

Here’s how it looks like from my ignorant perspective when considering a simple leaf-and-spine network like the one in the following diagram. Please feel free to set me straight, I honestly can’t figure out where I went astray.

Chip shortage will hit IT-hardware buyers for months to years

A shortage of all sorts of processors and other components could affect the availability and price of IT hardware for the next 12 to 18 months, according to CEOs of major tech companies including Intel, IBM, Extreme, Cisco and Juniper.COVID-19 triggered an explosion of the global remote workforce, which created an extraordinary demand for new tech gear. It also forced the shutdown of processor plants, and restarting them and renewing supply chains to their pre-pandemic state will be a lengthy process, according to industry executives and analysts. Beyond the pandemic, a recent fire at a large chip plant in Japan didn’t help.To read this article in full, please click here

Chip shortage will hit IT-hardware buyers for months to years

A shortage of all sorts of processors and other components could affect the availability and price of IT hardware for the next 12 to 18 months, according to CEOs of major tech companies including Intel, IBM, Extreme, Cisco and Juniper.COVID-19 triggered an explosion of the global remote workforce, which created an extraordinary demand for new tech gear. It also forced the shutdown of processor plants, and restarting them and renewing supply chains to their pre-pandemic state will be a lengthy process, according to industry executives and analysts. Beyond the pandemic, a recent fire at a large chip plant in Japan didn’t help.To read this article in full, please click here

Tech Bytes: Automating Network Troubleshooting With PathSolutions (Sponsored)

Today we’re talking about automating network troubleshooting. We’re sponsored by PathSolutions, maker of the TotalView network monitoring software. TotalView pulls in network and device data and then runs it through a heuristics engine to identify problems such as cabling faults, QoS misconfigurations, VLAN tagging faults, and others. The engine can surface up issues automatically to help network engineers identify and resolve problems. Our guest is Tim Titus, CTO at PathSolutions.

The post Tech Bytes: Automating Network Troubleshooting With PathSolutions (Sponsored) appeared first on Packet Pushers.