Archive

Category Archives for "Networking"

How much network automation stuff should I learn as a network engineer? & Passing the DevNet Associates Exam

It is important to note that the question is not "should I learn any?" but rather "how much should I learn?". The new Cisco DevNet Certifications help us answer that question. Let me share my journey to that conclusion. In early February I decided to take the DevNet Associates Exam. I scheduled it for the READ MORE

The post How much network automation stuff should I learn as a network engineer? & Passing the DevNet Associates Exam appeared first on The Gratuitous Arp.

Going Beyond Black History Month

Going Beyond Black History Month

Around this time of year in the United States, African-Americans are often tasked with explaining why we spend 28 (or in the case of a leap year 29) days celebrating the contributions our ancestors made to this country. It may come in the form of responding to ignorant questions posed in learning environments or expressed in well-crafted articles lauding the relevancy of Black history in our modern time.

Black history is not only relevant, it is how we ensure that our heroes are not forgotten and that we have a viable future in our respective industries. As Carter G. Woodson famously said, “If a race has no history, if it has no worthwhile tradition, it becomes a negligible factor in the thought of the world, and it stands in danger of being exterminated.”

As the US leaders of Afroflare, Cloudflare’s employee resource group (ERG) for employees of African descent, we made a personal commitment this month and beyond to effectively represent, build, and grow at Cloudflare and in the tech industry.

To honor that commitment, we decided to tackle some commonly asked questions about the state of African-Americans in tech.

How many African-Americans work in tech?

The latest Continue reading

AT&T, Verizon, T-Mobile Tied to GSMA Net-Zero Emission Pact

Designed to reduce emissions trajectories for mobile, fixed, and data center operators, the SBT...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Worth Reading: Do We Need Regulation for IoT Security?

A pretty good summary of the topic by Drew Conry-Murray: the market is not going to correct itself, it’s very hard to hold manufacturers or developers accountable for security defects in their products, and nothing much will change until someone dies.

And just in case you wonder how "innovative forwarding-looking disruptive knowledge-focused" companies could produce such ****, I can highly recommend The Stupidity Paradox.

Worth Reading: Do We Need Regulation for IoT Security?

A pretty good summary of the topic by Drew Conry-Murray: the market is not going to correct itself, it’s very hard to hold manufacturers or developers accountable for security defects in their products, and nothing much will change until someone dies.

And just in case you wonder how "innovative forwarding-looking disruptive knowledge-focused" companies could produce such ****, I can highly recommend The Stupidity Paradox.

DNSSEC Validation (Revisited)

One year ago, I looked at the state of adoption of DNSSEC validation in DNS resolvers and the answer was not unreservedly optimistic. Instead of the “up and to the right” curves that show a momentum of adoption, there was a pronounced slowing down aof the momentum of DNSSEC adoption. The current picture of DNSSEC adoption is certainly far more heartening, and I would like to update this earlier article on DNSSEC with more recent data.

Pure Storage Pops New FlashArray Controller

Pure Storage capped off the year with an update to its flagship FlashArray line hours head of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware Suffers Operational Indigestion

The company began to lose momentum coming out of its latest fiscal year in which it made 10...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: Huawei CSO Mocks US Security Policy

Huawei CSO mocked US security policy; Palo Alto Networks added X factor to $560M Demisto buy; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Fortinet CEO: SD-WAN, Edge, Automation Key to Next-Gen Security

Perimeter-based security is no longer sufficient, security surfaces and compute demands are...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Is the Internet Resilient Enough to Withstand Coronavirus?

It’s being called the world’s biggest work-from-home experiment. With concerns growing over the spread of the Coronavirus, schools and businesses around the world are implementing contingency plans that encourage distance learning and work from home. Usage of e-learning, messaging, and videoconferencing tools is also growing rapidly, placing additional load on these Internet-based applications and platforms and generating additional traffic. And with more people staying at home, online media consumption is poised to increase as well.

Many are wondering if the Internet can handle the strain of rapid traffic growth and increased latency. Will it cause a catastrophic failure of the Internet? The answer: not likely.

Core Internet infrastructure providers should be able to easily absorb the increase in traffic and demand, especially if the growth is gradual over a period of days, weeks, or months. Cloud infrastructure providers should also have sufficient additional compute, storage, and bandwidth capacity to enable their customers, including the e-learning, messaging, and videoconferencing tool providers, to scale their systems as necessary. In order to keep traffic local, content delivery infrastructure from companies including Akamai, Cloudflare, Google, Netflix, and Apple is deployed in many last-mile networks. Internet Exchange Points (IXPs) can also help keep traffic local, Continue reading

Palo Alto Networks Adds X Factor to $560M Demisto Buy

Palo Alto Network’s product announcement coincided with its quarterly earnings report, which fell...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Denial of Services as a Service

Hacking isn’t new. If you follow the 2600 Magazine culture of know the name Mitnick or Draper you know that hacking has been a part of systems as long as their have been systems. What has changed in recent years is the malicious aspect of what’s going on in the acts themselves. The pioneers of hacking culture were focused on short term gains or personal exploitation. It was more about proving you could break into a system and getting the side benefit of free phone calls or an untraceable mobile device. Today’s hacking cultures are driven by massive amounts of theft and exploitation of resources to a degree that would make any traditional hacker blush.

It’s much like the difference between petty street crime and “organized” crime. With a patron and a purpose, the organizers of the individual members can coordinate to accomplish a bigger goal than was ever thought possible by the person on the street. Just like a wolf pack or jackals, you can take down a much bigger target with come coordination. I talked a little bit about how the targets were going to start changing almost seven years ago and how we needed to start figuring Continue reading

XML

XML – Extensible Markup Langauage

Its more suitable as data representation choice when software element need to communicate with each other.

Let review the XML basics with an example

anurudh@anurudh:~/newfolder$ cat ex1_xm.xml 
<device>
  <vendor>Cisco</vendor>
  <model>7600</model>
  <version>IOS 15.6</version>
</device>


Here <device>  is root , which is present in outermost XML tag of document , also referred as parent of the element <vendor>,<mode> and <version> , whereas <vendor>,<mode> and <version>  is known as children of the parent element <device>.

Namespace : Its part of XML Specification to differentiate between different XML blocks having same names

  let’s take an example  , if I have one more xml document as below

<device>
  <vendor>Cisco</vendor>
  <model>9600</model>
  <version>IOS 15.6</version>
</device>

Here , the only difference between earlier XML doc and this one  is one element i.e  model  number changed from 7600 to 9600 ,but parent element is same in both XML doc i.e <device> So there should be method to avoid conflict , there comes NAMESPACE which prevent element naming conflict

The namespace can be defined by an xmlns attribute in the start tag of an element.

The namespace declaration has the following syntax. xmlns:prefix=”URI”.

<root>
  <a:device xmlns:c="http://example.org/7600devices">
      <a:vendor>Cisco</a:vendor>
      <a:model>7600</a:model>
      <a:version>IOS 15. Continue reading

Securing Memory at EPYC Scale

Securing Memory at EPYC Scale
Securing Memory at EPYC Scale

Security is a serious business, one that we do not take lightly at Cloudflare. We have invested a lot of effort into ensuring that our services, both external and internal, are protected by meeting or exceeding industry best practices. Encryption is a huge part of our strategy as it is embedded in nearly every process we have. At Cloudflare, we encrypt data both in transit (on the network) and at rest (on the disk). Both practices address some of the most common vectors used to exfiltrate information and these measures serve to protect sensitive data from attackers but,  what about data currently in use?

Can encryption or any technology eliminate all threats? No, but as Infrastructure Security, it’s our job to consider worst-case scenarios. For example, what if someone were to steal a server from one of our data centers? How can we leverage the most reliable, cutting edge, innovative technology to secure all data on that host if it were in the wrong hands? Would it be protected? And, in particular, what about the server’s RAM?

Securing Memory at EPYC Scale

Data in random access memory (RAM) is usually stored in the clear. This can leave data vulnerable to software or hardware probing by Continue reading

CCIE Enterprise Infrastructure Training

CCIE Enterprise Infrastructure Training by Orhan Ergun. As Orhan Ergun, I always aim to provide best training in the world. I started recently CCIE Enterprise Infrastructure v1. 0 training. In this post you will see why you should get this training, why you should get it from Orhan Ergun, what are the requirement to attend , what are the unique benefits, training outline and many other details.

 

CCIE Enterprise Infrastructure v1.0

 

  • New CCIE Enterprise Infrastructure training will prepare you for the new solutions of enterprise networks in today’s networking era.
  • This Training is more oriented on the basis of new and latest solutions instead of the legacy network technologies.

 

Benefits of Orhan Ergun CCIE Enterprise Infrastructure Training: 

  • 20 days – 10 Weekends – 2 and half months (80 hours, 4 hours each day, on weekends) training
  • CCIE IE Workbook and Classroom materials (More than thousand pages)
  • It will be live training but self paced training will be provided when it is completed for free to the attendees
  • Attendees will be able to receive SP Design and Segment Routing Workbooks 
  • When you want to attend CCDE Training, extra 40% discount

 

Why CCIE Enterprise Infrastructure Training Continue reading

Video: End-to-End Latency Is Not Zero

After the “shocking” revelation that a network can never be totally reliable, I addressed another widespread lack of common sense: due to laws of physics, the client-server latency is never zero (and never even close to what a developer gets from the laptop’s loopback interface).

You need Free ipSpace.net Subscription to watch the video, and the Standard ipSpace.net Subscription to register for upcoming live sessions.

Video: End-to-End Latency Is Not Zero

After the “shocking” revelation that a network can never be totally reliable, I addressed another widespread lack of common sense: due to laws of physics, the client-server latency is never zero (and never even close to what a developer gets from the laptop’s loopback interface).

You need Free ipSpace.net Subscription to watch the video, and the Standard ipSpace.net Subscription to register for upcoming live sessions.

NS1 Builds on DNS to Speed Traffic Management

When user experience is increasingly synonymous with speed and reliability, new traffic management sub-teams are appearing at elite digital enterprises. In this episode of The New Stack Makers podcast, we talk to NS1, the networking automation company or, as he calls it, “the system of record for many, many of the key domains and the applications on the internet today.” Subscribe: Fireside.fm | Stitcher | Overcast | TuneIn He says that each of us interacts with NS1 dozens of times a day, like when we are connecting on LinkedIn or sharing files on DropBox. NS1 sits at the base of this new traffic management stack, steering that traffic across our increasingly complex and distributed systems. This stack also includes content networking delivery networks (CDN), load-balancing tooling, edge networking footprints, service meshes, and software for service discovery and egress optimization. This new role isn’t just about measuring if traffic is working correctly, but really understanding both your users and systems Continue reading