Just as we're getting comfortable with Wi-Fi 6, along comes 6E, an extension that enables the use of newly available unlicensed spectrum in the 6GHz frequency band (at least here in the US). Our guest to introduce us to Wi-Fi 6E is Wes Purvis. We discuss the properties of the spectrum, how it might be used, when to expect products, and more.
The post Heavy Networking 519: Let’s Meet Wi-Fi 6E appeared first on Packet Pushers.
Abhi Karmakar and Brian Cox, of Nutanix, sat down to share their thoughts on the ongoing...
“The growth of the open networking ecosystem will be essential to meeting enterprise coverage and...
Trump vs. Twitter: U.S. President Donald Trump, one of Twitter’s most prolific users, has signed an executive order directing government agencies to target social media sites after Twitter fact-checked one of his tweets about voting by mail. The executive order argues social media platforms should lose their lawsuit protections for content posted by users, by directing the Federal Communications Commission to begin a rule-making proceeding to determine when those protections should be stripped away, NPR reports.
Internet freedom? Meanwhile, Business Insider notes that Trump said he’d shut down Twitter if he could, even as he tried to emphasize his “commitment to free and open debate on the Internet.” Trump, with more than 80 million followers on Twitter, complained about social media platforms stifling conservative voices.
Robots vs. COVID-19: A shopping center in Thailand is deploying artificial intelligence-powered robots to fight COVID-19, Euronews.com reports. The mall has thermal scanners to check shoppers’ temperatures, and robots carry public health messages and hand sanitizer.
AI on the beach: In Israel, startup Sightbit is using AI and video cameras to help lifeguards on busy beaches, NoCamels reports. The company is running a pilot program at one of Israel’s most popular beaches. Continue reading
If I asked you to summarize the great works of literature in a few paragraphs, how would you do it? Would you read over the whole thing and try to give a play-by-play of the book? Would it be more like Cliff’s Notes, summarizing the major themes but skipping over the details? Maybe you’d offer up the conclusion only and leave it as an exercise to the reader to find out? There are a lot of ways to do it and almost all of them seem insurmountable.
What if there was an easy way to jump right into starting to discuss a topic or summarize something? What if you could find a way to easily get people interested in your ideas? Believe or not, it’s not as hard as you might think. People usually freak out because they feel like there are too many places to start when they want to write something. They decide to try and figure out the perfect way to get going and, more often than not, they paralyze themselves with inaction.
So how do you get things moving? You have to find the hook.
What’s the hook? Most people think it’s Continue reading
Like many people, I have spent a lot more time at home in the last several weeks. I use the free version of Cloudflare Gateway, part of Cloudflare for Teams, to secure the Internet-connected devices on my WiFi network. In the last week, Gateway has processed about 114,000 DNS queries from those devices and blocked nearly 100 as potential security risks.
I can search those requests in the Cloudflare for Teams UI. The logs capture the hostname requested, the time of the request, and Gateway’s decision to allow or block. This works fine for one-off investigations into a block, but does not help if I want to analyze the data more thoroughly. The last thing I want to do is click through hundreds or thousands of pages.
That problem is even more difficult for organizations attempting to keep hundreds or thousands of users and their devices secure. Whether they secure roaming devices with DoH or a static IP address, or keep users safe as they return to offices, deployments at that scale need a better option for auditing tens or hundreds of millions of queries each week.
Starting today, you can configure the automatic export of logs from Cloudflare Gateway Continue reading
Here is another post of the series on basic network troubleshooting and tools under Linux. In this post, I will talk about the cURL command. Others posts of the series This post is part of a series about basic Linux Networking tips and tricks. The others posts of this series are: The ip and nmcli commands The mtr command The ss and netstat commands The curl command What is cURL? cURL is a Linux command-line tool for getting or sending data and files, using an URL syntax. Since cURL…
The post Basic Linux Networking tips and tricks part-4: curl command appeared first on AboutNetworks.net.
Pete Lumbis started his Cumulus Linux 4.0 update with an overview of differences between Cumulus Linux on hardware switches and Cumulus VX, and continued with an in-depth list of ASIC families supported by Cumulus Linux.
You can watch his presentation, as well as the more in-depth overview of Cumulus Linux concepts by Dinesh Dutt, in the recently-updated What Is Cumulus Linux All About video.
“We have seen that COVID-19 is not stopping customers from their cloud migration projects with...
“This is a big step in removing the delineation between private and public networks," analyst...
Today's IPv6 Buzz podcast examines key topics network engineers should know when working with v6, including the complexities of auto-addressing, network security and dual-stack environments, address plans, and more. Our guest is engineer and consultant Andres Taudte.
The post IPv6 Buzz 052: What Do Network Engineers Need To Know About IPv6? appeared first on Packet Pushers.
Cisco got SASE; Nutanix Q3 revenue jumped 11%; and Docker cozied up to Microsoft Azure.
I’ve been getting into the twitter poll thing lately and its producing some interesting polling by asking questions. Yesterday I asked are you eager to go back to the office ? With 129 responses we have statistical significance because the sample is large. What conclusions might we draw from this survey ? Reminder: Twitter […]
The post Who wants to work in an office ? appeared first on EtherealMind.
Using these APIs the vendor claims to be able to more efficiently correlate traces, identify root...
"We are confident that the demand for our products and services will be strong as we emerge from...
Securing workloads across an entire environment is the fundamental goal of a policy. But workloads come in a variety of form factors: virtual machines, containers, and bare metal servers. In order to protect every workload, experts recommend isolating workloads wherever possible — avoiding dependency on the host operating system and its firewall. Relying on the host firewall creates the dependency of a host to defend itself.
Securing virtual workloads is a task best handled by the hypervisor. Offering security via inspection of traffic on the virtual network interfaces of the virtual workload achieves the security you want. It also delivers isolation for security enforcement. Workloads to secure bare metal servers come in many form factors and a variety of means to achieve policy enforcement.
Bare metal servers remain in use for a variety of reasons. Securing these servers remains a necessary task in today’s virtualized data center. Reasons we still use bare metal servers: