Archive

Category Archives for "Networking"

UPDATE 4-18: How enterprise networking is changing with a work-at-home workforce

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security concerns.  What follows is a round-up of news and traffic updates that Network World will update as needed to help keep up with the ever-changing situation.  Check back frequently!UPDATE 4.17AT&T reported that Email traffic is down 25% as more people opt for phone and video calls.  Video conferencing is on the rise with more than 470k Webex Meeting Calls on April 9, the highest during the COVID-19 pandemic.  It also stated instant messaging, including text traffic from messaging apps and platforms, has slightly declined since the week prior, but overall is up nearly 60%.To read this article in full, please click here

The New Stack Context: Stress, Resilience and the Network Effects of COVID-19

Welcome to The New Stack Context, a podcast where we discuss the latest news and perspectives in the world of cloud native computing. For this week’s episode, we spoke with The New Stack correspondent Jennifer Riggins about all of the reporting she and others on the TNS team have been doing recently on the effects that the COVID-19 global pandemic is having on the tech industry. TNS editorial and marketing director Libby Clark hosted this episode, alongside founder and TNS publisher Alex Williams and TNS managing editor Joab Jackson. Subscribe: Fireside.fm | Stitcher | Overcast | TuneIn For this episode, we wanted to look at and not only discuss the changing patterns in network traffic that the global COVID-19 pandemic has wrought, due to factors such as people staying at home and working from home, and the sudden acceleration of e-learning. As Riggins writes in a recent post: For a lot of tech and infrastructure teams, they not only are going through the stress of the collective trauma we’re sharing in, but they are struggling to keep up with ever-scaling, extreme strains on their systems. Simply put, Continue reading

Daily Roundup: Nokia Faces a Hostile Takeover

Nokia faced a hostile takeover bid; COVID-19 related ransomware attacks spiked; and Red Hat stacked...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Portworx Essentials: A Free Cloud Native Storage Engine for Kubernetes

If you deal with Kubernetes, you know that storage is one of the core building blocks of the cluster infrastructure. It is as important as the compute building block delivered by the worker nodes. Since the power of the cluster is always measured in terms of the number of worker nodes and their configuration, storage doesn’t get its share of attention. Imagine this: you configured a powerful bare-metal cluster and want to run a highly available and mission-critical workload on it. Without a solid storage engine, your cluster is only good for running stateless and ephemeral workloads that don’t need persistence. But any enterprise application is a combination of both — stateless and stateful services. You wouldn’t be able to justify the investment made in the brand new Kubernetes cluster if you are unable to run end-to-end applications on it. When you install the open source, up-steam Kubernetes distribution, it doesn’t come with a high-performance storage engine. Unlike managed Kubernetes services in the public cloud that come with default storage classes mapped to their respective block storage services, your cluster doesn’t have any storage class. A persistent volume is to storage what a node is to compute. Just like the Continue reading

Nokia Stares Down Hostile Takeover Bid

The hostile takeover bid follows a previous report that claimed the company was considering...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Red Hat Stacks OpenStack Onto ZTE’s XCloud

The work is targeted at helping telecommunication operators deploy virtual network functions in...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AMD introduces high-performance EPYC processors

AMD has introduced three new processors in its second-generation EPYC 7Fx2 series, which is optimized for frequency and delivers what AMD claims is the fastest per-core performance in the x86 server market.In the server space, AMD is besting Intel when it comes to core count. AMD has the 64-core EPYC line. Intel, which currently tops out at 28 cores, has 38- and 48-core parts due later this year. But it's the individual core performances that matter, and in some benchmarks, Intel wins. READ MORE: How to dispose of IT hardware without hurting the environmentTo read this article in full, please click here

Ransomware Attacks Spike 148% Amid COVID-19 Scams

“Notable spikes in attacks can also be correlated to key days in the COVID-19 news cycle,”...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Is BGP Safe Yet? No. But we are tracking it carefully

Is BGP Safe Yet? No. But we are tracking it carefully

BGP leaks and hijacks have been accepted as an unavoidable part of the Internet for far too long. We relied on protection at the upper layers like TLS and DNSSEC to ensure an untampered delivery of packets, but a hijacked route often results in an unreachable IP address. Which results in an Internet outage.

The Internet is too vital to allow this known problem to continue any longer. It's time networks prevented leaks and hijacks from having any impact. It's time to make BGP safe. No more excuses.

Border Gateway Protocol (BGP), a protocol to exchange routes has existed and evolved since the 1980s. Over the years it has had security features. The most notable security addition is Resource Public Key Infrastructure (RPKI), a security framework for routing. It has been the subject of a few blog posts following our deployment in mid-2018.

Today, the industry considers RPKI mature enough for widespread use, with a sufficient ecosystem of software and tools, including tools we've written and open sourced. We have fully deployed Origin Validation on all our BGP sessions with our peers and signed our prefixes.

However, the Internet can only be safe if the major network operators deploy Continue reading

Member News: Internet Society Chapters Focus on Connecting People During Pandemic

Staying connected: Several Internet Society Chapters are focusing on ways to help people stay connected while living under stay-at-home orders or following social-distancing guidelines related to the COVID-19 pandemic. The Netherlands Chapter has released a toolbox of open source tools to help people work from home.

Resources for the people: Meanwhile, the Dominican Republic Chapter has released a list of COVID-related resources for residents. The list includes information on virtual private networks, on teleworking, and on the country’s cybersecurity resources. The Chapter also released a set of recommendations for the government, for Internet service providers, and for other companies. For example, the Chapter recommends that ISPs offer flexible or low-cost service plans to customers during the pandemic.

Pandemic privacy: One of the many concerns during the COVID-19 pandemic is a loss of privacy as governments and private organizations track mobile phones as a way to monitor the spread of the virus and the effectiveness of social-distancing programs. The Canada Chapter notes that the pandemic has raised fears about the surveillance state. In Canada, the prime minister has ruled against cell phone surveillance for tracking the spread of the virus, but “if the virus rapidly spreads further, no doubt device tracking Continue reading

Creating Conspicuously Compelling Content

It’s funny how little things change in the middle of big, world changing experiences. I’ve noticed that my daily blog viewership has gone down, as have many other folks I’ve talked to. The number of people reading has been reduced for some reason. However the number of video views of content on other platforms like Youtube has gone up dramatically. It’s almost like the people that were reading because they wanted to get a quick digest now have the free time to watch a whole video on a topic.

I got on the bandwagon too, recently publishing my first episode of Tomversations this week. I’ve also talked to several friends that are either starting or restarting a podcast. The gold mine for content creation has opened for business. However, I still hear the same refrains about content that I’ve heard for years when I talk about writing:

  • “I don’t have anything to say!”
  • “It’s hard to write things down!”
  • “Isn’t it easier to just talk about stuff?”

These are all valid questions, no matter what medium you’re developing for. But let me give you a roadmap to take those objections, turn them on their heads, and be Continue reading

How to Utilize Your Networking Capability for Business Relationships

Building a solid relationship is essential for success between parties involved in a business. A good relationship is the bedrock that determines the outcome of the business itself, because everything comes down to communication, understanding, and mutual agreement. Therefore, it’s worth every effort put into it.

Your networking capability can be of great benefit in building a good business relationship if properly utilized. But first, what does the term “networking capability” mean? Networking capability can be defined as the ability to build, sustain, and put to beneficial use the relationships built with external organizations and/or individual partners.

The main purpose and effect of utilizing your networking capability for business relationships become much clearer when you understand that business relationships are in three stages. You know when and how to get to each stage as a result of your networking capability. These three stages include:

  • Relationship initiation capability
  • Relationship developing/building capability
  • Relationship termination capability

These three networking capabilities (skills) are a must-have in the relationship aspect of your business. Let’s take a look at them more closely.

3 Networking Capability Skills

Relationship Initiation Capability

Under this stage, there are two things you should do first.

·       Select highly valued Continue reading

Waiting for a Rainy Day to Do Security Training? It’s Pouring

The FortiGuard Labs team as recently as April 4 reported seeing an average of about 600 new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Time-Based One-Time Passwords for Phone Support

Time-Based One-Time Passwords for Phone Support
Time-Based One-Time Passwords for Phone Support

As part of Cloudflare’s support offering, we provide phone support to Enterprise customers who are experiencing critical business issues.

For account security, specific account settings and sensitive details are not discussed via phone. From today, we are providing Enterprise customers with the ability to configure phone authentication to allow for greater support to be offered over the phone without need to perform validation through support tickets.

After providing your email address to a Cloudflare Support representative, you can now provide a token generated from the Cloudflare dashboard or via a 2FA app like Google Authenticator. So, a customer is able to prove over the phone that they are who they say they are.

Configuring Phone Authentication

If you are an existing Enterprise customer interested in phone support, please contact your Customer Success Manager for eligibility information and set-up. If you are interested in our Enterprise offering, please get in contact via our Enterprise plan page.

If you already have phone support eligibility, you can generate single-use tokens from the Cloudflare dashboard or configure an authenticator app to do the same remotely.

On the support page, you will see a card called “Emergency Phone Support Hotline – Authentication”. From here you Continue reading

Video: Going Beneath the Cisco SD-WAN Surface

David Penaloza decided to demystify Cisco’s SD-WAN, provide real world experience beyond marketing hype, and clear confusing and foggy messages around what can or cannot be done with Cisco SD-WAN.

He started the first part of his Cisco SD-WAN Foundations and Design Aspects webinar with a quick look beneath the surface of shiny marketing and corporate slidess.

You need Free ipSpace.net Subscription to watch the video.

Heavy Networking 512: Production Ready Automation With Cumulus Networks (Sponsored)

In today's Heavy Networking episode, we talk Production Ready Automation. That's a topic we've covered before on Packet Pushers, so what wondrous newness does sponsor Cumulus Networks bring to the table? The idea is a system that's ready for you to use. Why? Because a lot of folks are finding that rolling their own artisanal network automation takes considerable time both to create and maintain. Our guests are Pete Lumbis, Director of Technical Marketing and Rama Darbha, Director of Services at Cumulus Networks.

The post Heavy Networking 512: Production Ready Automation With Cumulus Networks (Sponsored) appeared first on Packet Pushers.

Heavy Networking 512: Production Ready Automation With Cumulus Networks (Sponsored)

In today's Heavy Networking episode, we talk Production Ready Automation. That's a topic we've covered before on Packet Pushers, so what wondrous newness does sponsor Cumulus Networks bring to the table? The idea is a system that's ready for you to use. Why? Because a lot of folks are finding that rolling their own artisanal network automation takes considerable time both to create and maintain. Our guests are Pete Lumbis, Director of Technical Marketing and Rama Darbha, Director of Services at Cumulus Networks.

Microsegmentation architecture choices and how they differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here

How microsegmentation architectures differ

Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here