Archive

Category Archives for "Networking"

IT specialist Atos makes bid for DXC

IT outsourcing giant Atos has put in a bid to acquire DXC Technology, which would give the French IT giant a big foot in the door to the U.S. market.The rumor first ran last week on Reuters, which put the purchase price at $10.1 billion. Atos issued a rather short statement confirming the talks, but did not confirm the rumored price. It said there was no certainty of an outcome and further announcements would be made “when appropriate.”For its part, DXC said it had indeed received an offer from Atos, again without mentioning the price, and said it would be “evaluating the proposal.”To read this article in full, please click here

IT specialist Atos makes bid for DXC

IT outsourcing giant Atos has put in a bid to acquire DXC Technology, which would give the French IT giant a big foot in the door to the U.S. market.The rumor first ran last week on Reuters, which put the purchase price at $10.1 billion. Atos issued a rather short statement confirming the talks, but did not confirm the rumored price. It said there was no certainty of an outcome and further announcements would be made “when appropriate.”For its part, DXC said it had indeed received an offer from Atos, again without mentioning the price, and said it would be “evaluating the proposal.”To read this article in full, please click here

Untangling Compliance: Working Toward a Global Framework

Untangling Compliance: Working Toward a Global Framework

As part of Cloudflare’s recent Privacy Week we hosted a series of fireside chats on security, privacy, and compliance. Many of these conversations touched on the intricate legal debate being held in Europe around data sovereignty. Here are some of the highlights.

To learn more about the solutions Cloudflare launched to help businesses navigate their compliance needs — including the new data localization suite — see our recent blog post here.

Prof. Dr. Wilfried Bernhardt
Honorary professor -- University of Leipzig,
Attorney, CEO Bernhardt IT Management Consulting GmbH

Untangling Compliance: Working Toward a Global Framework

We have to agree to go down a common road, a common path. And this common path can really only consist of saying: let's sit down together again. I'm talking about the European Commission and, above all, the new administration in the United States. We are all waiting for them expectantly.

And then we look at what our common fundamental values are and see if we don’t simply come together better than we have in the past. After all, our fundamental values are the same: human rights, democracy, the rule of law. You have to concede that there are some differences in understanding when it comes to interpreting what privacy means — Continue reading

How to prep for becoming an IoT leader

As the Internet of Things (IoT) explodes in enterprise settings, there's an opportunity for IT pros to step into new leadership roles. Often, IoT deployments are key to transformational initiatives, so having the skills to head up a significant IoT project can have a beneficial effect on career advancement. Tech Spotlight: IT Leadership The CIO’s next key role: Change agent (CIO) How IT must adapt to the emerging hybrid workplace (Computerworld) How to mandate agility in software development, operations, and data science (InfoWorld) The CISO’s newest responsibility: Building trust (CSO) How to prep for becoming an IoT leader (Network World) Companies are grappling with how to properly manage and secure their IoT deployments. They need people who can evaluate a wide range of IoT connectivity options, balance the requirements of different connected devices, and deploy appropriate edge infrastructure to gather and process IoT input. For IT leaders, now's the time to think about building an IoT team with the right expertise.To read this article in full, please click here

Screencasting Path in Suzieq

A new year, a new medium. One of the fringe benefits of choosing Streamlit is that it natively supports creating screencasts. For me, a toddler at best when it comes creating video content (my dad is better than I am at this), this was a useful feature as it allowed...

pygnmi 7. Integration of pygnmi with Nornir

Hello my friend,

With this blogpost we continue the series of pygnmi tutorials covering various use cases of our Python library created to help you with managing your network devices via GNMI. And today we show you, how easily you can use it with Nornir, if you like this automation framework.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Can it be enough automation?

Yes, it can be. But how to understand, what you should automate and what shouldn’t? What are the success strategies to start the automation projects and what are the receipts of disaster? What is the most efficient ways and technologies depending on context, and how to identify? Should you still stick to CLI? Is the model-driven automation all the time suitable? There are gazillions of questions about the network automation, which you may have in your mind, but don’t know whom to ask. We are here to help you.

At our trainings, advanced network automation and automation with Nornir (2nd Continue reading

Worth Reading: AI/ML/Space Predictions Scorecard, 2021 Edition

In January 2018 Rodney Brooks made a series of long-term predictions about self-driving cars, robotics, AI, ML, and space travel. Not surprisingly, his predictions were curmudgeonly and pessimistic when compared to the daily hype (or I wouldn’t be blogging about it)… but guess who was right ;)

He’s also the only predictor I’m aware of who is not afraid to compare what he wrote with how reality turned out years down the line. On January 1st he published the 2021 edition of the predictions scorecard and so far he hasn’t been too pessimistic yet. Keep that in mind the next time you’ll be listening to your favorite $vendor droning about the wonders of AI/ML.

Meet The Workers Team Over Discord

Meet The Workers Team Over Discord
Meet The Workers Team Over Discord

The Cloudflare Workers team is excited to announce the opening of our Discord channel! You can join right away by going here.

Through our Discord channel, you can now connect with the team to ask questions, show off what you’re building, and discuss the platform with other developers.

Sometimes you just need to talk to another human being. Our developer docs will always be the source of truth on the mechanics of Workers, but we want to provide quicker help if you need it.

Growing The Workers Community

Over the past three years, Cloudflare Workers evolved from an initial sandbox for enterprise customers writing edge code to a developer platform for creating new applications and systems.

“We bet our whole business on Workers and it paid off big time,” said Hamlet Batista, CEO of RankSense, a SEO automation platform. “We've been saving a lot of money on infrastructure costs and DevOps resources we no longer need.”

Our team is constantly surprised by the palette of use cases from those developing on Workers. For example, a developer in Belgium created a static Workers site that teaches an online tutorial in three different languages on how to make your own face Continue reading

Building Backdoors and Fixing Malfeasance

You might have seen the recent news this week that there is an exploitable backdoor in Zyxel hardware that has been discovered and is being exploited. The backdoor admin account with the clever name ‘zyfwp’ is not something that has been present in the devices forever. The account was put in during firmware version 4.60, which was released in Q4 2020.

Zyxel is rushing to patch the devices and remove the backdoor account. Users are being advised to disable remote administration until the accounts can be deactivated and proven to be removed. However, the bigger question in my mind relates to the addition of the user account in the first place. Why would you knowingly install a backdoor?

Hello, Joshua

Backdoors are nothing new in the computer world. I’d argue the most famous backdoor account in the history of computer hacking belongs to Joshua, the dormant login for the War Operations Programmed Response (WOPR) computer system in the 1983 movie Wargames. Joshua was an old login for the creator to access the system outside of the military chain of command. When the developer was removed from the project the account was forgotten about until a kid discovered it and Continue reading

Heavy Networking 556: The State Of GNS3 For Network Labs

GNS3 is a tool for building virtual networks for labbing. Heavy Networking welcomes GNS3 co-founder and developer Jeremy Grossman and networking instructor David Bombal. We cover the state of GNS3 in 2021, including what GNS3 can do that maybe you didn’t know, and what’s on the roadmap.

The post Heavy Networking 556: The State Of GNS3 For Network Labs appeared first on Packet Pushers.

Cisco fights to keep alive its planned $2.6B purchase of optical-tech vendor Acacia

Cisco’s planned acquisition of Acacia Communications took a litigious turn this week as the networking giant has gone to court to keep the optical technologies vendor from terminating the purchase.Cisco filed for a temporary restraining order in Delaware Chancery Court Jan. 8 to prevent Acacia from terminating its acquisition agreement with the company. The move followed an Acacia statement issued earlier on Jan. 8 that stated the company “has elected to terminate its merger agreement with Cisco Systems, Inc., effective immediately.”[Get regularly scheduled insights by signing up for Network World newsletters.] Acacia said the proposed merger was conditioned on the satisfaction or waiver of customary closing conditions, including obtaining necessary regulatory approvals within the timeframe contemplated by the merger agreement. One of those was the approval of China’s State Administration for Market Regulation (SAMR), and Acacia said that hasn't been obtained within the originally agreed time frame.To read this article in full, please click here

Spotlight on home-office connectivity intensifies in 2021

Now that it's clear remote work is here to stay, what are the technology priorities for IT departments charged with keeping the enterprise workforce productive and secure?In a December report, research firm Gartner said it expects 48% of employees will work from home, even after the pandemic, compared with 30% pre-pandemic.More about SD-WAN: How to buy SD-WAN technology: Key questions to consider when selecting a supplier • How to pick an off-site data-backup method •  SD-Branch: What it is and why you’ll need it • What are the options for security SD-WAN? Forrester, too, expects the remote worker population to remain elevated. "While there is no clear end point to the pandemic yet, the number of employees working remotely will begin to dwindle, eventually settling in at 300% of pre-pandemic levels at the minimum," wrote Forrester principle analyst David Johnson, in a blog post about 2021 remote work and automation trends.To read this article in full, please click here

Video: Cisco SD-WAN Policies and Centralized Magic

Right after Cisco SD-WAN devices are onboarded, how are the control and data plane tasks started? In this section, David Penaloza covers how Cisco SD-WAN solution makes the most of its SDN nature: single point of policy application and centralized management platform. The types of policies, the plane on which they act, their application and the actions that can performed are the main focus in this part of the series.

You need Free ipSpace.net Subscription to watch the video.

25 years as a Network Engineer!

Cisco-2501

In January 1996, I entered for the first time in the configuration of a Cisco 2501 router. This was the beginning of my career as a network engineer. That was just 25 years ago! Here’s a quick look back and a few tips for junior engineers who are at the beginning of their careers.   25 years as a Network Engineer! In 25 years, I had the opportunity to change several times my working environment and specialty as a network engineer: I went from network engineer and peering-manager for regional…

The post 25 years as a Network Engineer! appeared first on AboutNetworks.net.