This week's Network Break covers a pair of Cisco acquisitions, new path analysis capabilities from NetBeez, how the DarkSide ransomware gang is getting the spotlight, sleazy behavior from US broadband companies, and other tech news.
The post Network Break 333: Cisco Acquires Optical Controller Software; DarkSide Gang Gets The Spotlight appeared first on Packet Pushers.
Last week I began discussing why AS Path Prepend doesn’t always affect traffic the way we think it will. Two other observations from the research paper I’m working off of are:
A slightly more complex network will help explain these two observations.
Assume AS65000 would like to control the inbound path for 100::/64. I’ve added a link between AS65001 and 65002 here, but we will still find prepending a single AS to the path won’t make much difference in the path used to reach 100::/64. Why?
Because most providers will have a local policy configured—using local preference—that causes them to choose any available customer connection over other paths. AS65001, on receiving the route to 100::/64 from AS65000, will set the local preference so it will prefer this route over any other route, including the one learned from AS65002. So while the cause is a little different in this case than the situation covered in the first post, the result is the Continue reading
Today at RSA Conference 2021, we’re excited to announce that VMware is a winner of the CyberDefense Magazine 2021 Global InfoSec Award as Market Leader in Firewall. One of VMware’s core beliefs is that we need structural and architectural changes to how organizations approach security. This means taking a fresh look at how we approach issues such as internal data center security. This is exactly what led us to deliver the VMware NSX Service-defined Firewall.
The NSX Service-defined Firewall is one of the foundations of VMware Security. This solution is a unique distributed, scale-out internal firewall that protects all east-west traffic across all workloads without network changes. This radically simplifies the security deployment model. It includes a distributed firewall, advanced threat protection, and network traffic analytics. With the VMware NSX Service-defined Firewall, security teams can protect their organizations from cyberattacks that make it past the traditional network perimeter and attempt to move laterally. Its key differentiating capabilities include:
Help is on the way: The U.S. government is offering a $50-a-month broadband subsidy for people who took a financial hit during the COVID-19 pandemic, CNet reports. The subsidies are part of a COVID-19 relief package passed by Congress in December. More than 825 broadband providers, including AT&T, Comcast and Verizon, are participating. Online soldiers: An […]
The post The Week in Internet News: U.S. Rolls Out Broadband Subsidy appeared first on Internet Society.
Last week we pushed out netsim-tools release 0.6.2. It’s a maintenance release, so mostly full of bug fixes apart from awesome contributions by Leo Kirchner who
Other bug fixes include:
Do you have a few people at work that you can trust?
Having friends at work is more important than you think. Research suggests that being part of a close group in the workplace leads to higher levels of employee productivity, motivation, and loyalty towards the organization.
But what if you are an introvert, or are simply having trouble trying to fit into the new workplace? The good news is that there are always ways that you that make friends at work. If you think fitting in at work is far too difficult for you, we recommend trying the following tips.
The first step towards making friends at work is being a great listener. There is always an unspoken office culture being followed – whether that’s certain inside jokes, bringing cakes for birthdays, methods of greeting, or even nicknames for certain people. You should also carefully observe how everybody communicates with one another. Do they prefer emails, or do they have a group chat? By listening closely, you become better aware of how things work around the office and you can easily start fitting into place.
An easy way to Continue reading
I’m not sure if it’s just us in networking/IT, or people leading interviews in general (probably the latter), but we have a tendency to ask really bad questions in interviews. Often the questions revolve around factoids or things that need to be memorized. Some interviewers will even intentionally try to “trick” you. This is a really bad way of conducting an interview and will guaranteed lead to poor results. Instead of asking someone to quote an RFC, you should focus on asking open-ended questions and even guide the candidate if they are getting stuck on something. Why?
Reasoning – You want to see how people reason their way to answering a question. What is their thought process? Asking the administrative distance of BGP will just give you back a one-sentence answer or no answer at all. You can learn much more about someone’s skill level if you give them some clues and see if they can take the discussion forward. Are they comfortable asking you for input? Are they comfortable saying that they don’t know something?
Remove tension – Most, if not all, people are somewhat nervous when being interviewed. You want get an accurate representation of their skill so Continue reading
Johan Gustawsson wrote a lengthy blog post describing Telia’s approach to next-generation Internet backbone architecture… and it’s so refreshing seeing someone bringing to life what some of us have been preaching for ages:
I don’t know enough about optics to have an opinion on what they did there, but it looks as good as the routing part. It would be great to hear your opinion on the topic – write a comment.
Apple’s long-awaited privacy update for iOS is out, and it’s a solid step in the right direction.
One skill he focuses on is abduction, which was Sherlock Holmes’s favorite method.
Yesterday, The Epoch Times reported on leaked internal Chinese government documents revealing Continue reading
Weekend project after a while!. Not Long ago, I did mention that my cute Dog is responsible for destructing most of the wall and paper, when enquired pro’s said its part of puppy growing up and it still needs time.Along with Dog, I personally would love to feed and enjoy petting other species to be honest out of which birds and plants are major, there are earthworms and sea life but Dog is not a threat to them based on the placement.
Links
Git: https://github.com/yukthr/auts/tree/master/aws_deeplens
Credits: Some of the code block is picked up from : https://aws.amazon.com/blogs/machine-learning/building-a-smart-garage-door-opener-with-aws-deeplens-and-amazon-rekognition/
Tripod stand: https://www.amazon.co.uk/gp/product/B08FGSV9CZ/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1
AWS DeepLens
https://aws.amazon.com/deeplens/ – Is ML/AI enabled camera which can be used at edge inferencing. Slipping down to my usual choice of words, this piece of equipment has an onboard camera , a Gpu , a Cpu and ubuntu host OS. Easily integrates with AWS and runs a local Lambda for inferencing, hence decisions are made on the device instead of reaching out to AWS to do the logic.
What is the problem!
There is a small garden at the rear of the Continue reading
John Capobianco recently released his Magic Carpet: a tool that helps you gather information from network devices without the usual Ansible bloat and glacial speed.
Believing in “no job is finished until the paperwork is done”, he wrote extensive documentation, and recorded a collection of videos describing the tool’s functionality – definitely worth reading, watching, and exploring.