Archive

Category Archives for "Networking"

Cisco Paints 5G Strategy Around Optics, Packet Core

“We helped build the first version of the internet, the internet gave birth to the cloud, and now...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to use the Linux uniq command

In Linux, the uniq command can help find out the individual users who are logged into a given server, but it’s not a straightforward process.Yes, using the command on its own yields a list of who’s logged in, but it can list individual users more than once depending on what they’re doing.There are ways to get around this by sorting the results of uniq so they deliver only once the names of all the users. This 2-Minute Linux Tip video by Network World’s Unix as a Second Language blogger Sandra Henry Stocker shows how to do just that. Click below. YT embed code: To read this article in full, please click here

Five Ways to Quickly Uncover Malicious Activity and Protect Your Kubernetes Workloads

Organizations are rapidly moving more and more mission-critical applications to Kubernetes (K8s) and the cloud to reduce costs, achieve faster deployment times, and improve operational efficiencies, but are struggling to achieve a strong security posture because of their inability to apply conventional security practices in the cloud environment. Commitment to cloud security grows, but security safeguards are not keeping up with the increased use of the various cloud platforms. Regardless of the cloud provider or service model, individual organizations are ultimately responsible for the security of their data.

According to a 2019 Ponemon Institute Global Cloud Data Security Study, 70 percent of respondents find it more complex to manage privacy and data protection regulations in a cloud environment than on-premises. Meanwhile, the percent of corporate data stored in the cloud environment has grown from an average of 30 percent in 2015 to an average of 48 percent in 2019. In the same study, 56 percent of respondents say the use of cloud resources increases compliance risk.

The downside associated with a security breach is severe for any organization, but especially so for companies in regulated environments like financial services, healthcare and telecommunications. Now there’s a new and highly effective way Continue reading

Space-data-as-a-service gets going

Upcoming space commercialization will require hardened edge-computing environments in a small footprint with robust links back to Earth, says vendor OrbitsEdge, which recently announced that it had started collaborating with Hewlett Packard Enterprise on computing-in-orbit solutions.OrbitsEdge says it’s the first to provide a commercial data-center environment for installing in orbit, and will be using HPE’s Edgeline Converged Edge System in a hardened, satellite micro-data-center platform that it’s selling called SatFrame.To read this article in full, please click here

Space-data-as-a-service prepares to take off

Upcoming space commercialization will require hardened edge-computing environments in a small footprint with robust links back to Earth, says vendor OrbitsEdge, which recently announced that it had started collaborating with Hewlett Packard Enterprise on computing-in-orbit solutions.OrbitsEdge says it’s the first to provide a commercial data-center environment for installing in orbit, and will be using HPE’s Edgeline Converged Edge System in a hardened, satellite micro-data-center platform that it’s selling called SatFrame.To read this article in full, please click here

Space-data-as-a-service gets going

Upcoming space commercialization will require hardened edge-computing environments in a small footprint with robust links back to Earth, says vendor OrbitsEdge, which recently announced that it had started collaborating with Hewlett Packard Enterprise on computing-in-orbit solutions.OrbitsEdge says it’s the first to provide a commercial data-center environment for installing in orbit, and will be using HPE’s Edgeline Converged Edge System in a hardened, satellite micro-data-center platform that it’s selling called SatFrame.To read this article in full, please click here

Space-data-as-a-service prepares to take off

Upcoming space commercialization will require hardened edge-computing environments in a small footprint with robust links back to Earth, says vendor OrbitsEdge, which recently announced that it had started collaborating with Hewlett Packard Enterprise on computing-in-orbit solutions.OrbitsEdge says it’s the first to provide a commercial data-center environment for installing in orbit, and will be using HPE’s Edgeline Converged Edge System in a hardened, satellite micro-data-center platform that it’s selling called SatFrame.To read this article in full, please click here

Google, VMware Headline Linux Foundation’s ACT Program

The program is looking to manage the responsibility and investment challenges facing open source...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SASE: Here’s Where Your Digital Business Network Starts

SASE is emerging in response to the needs of today’s digital business. The digital business is...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SolarWinds Sweeps Up VividCortex for $117.5M

The VividCortex acquisition better positions SolaWinds against competitors including Cisco, Aruba,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Fortinet Snaps Up SOAR Provider CyberSponse

CyberSponse's feature set will further extend the automation and incident response capabilities of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nokia 5G Dynamic Spectrum Sharing Plans Gain Dynamics

Nokia doesn’t expect the technology to deliver meaningful performance gains on 5G standalone...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google’s New VMs Use Dynamic Resource Management to Slash Costs

This includes a custom-built CPU scheduler and performance-aware live migration to make better use...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco targets hyperscalers with silicon, high-end routers

Cisco says it wants to change the future of the Internet and has rolled out the new silicon, hardware and software it says will move toward that goal.The centerpiece of Cisco’s strategy revolves around its custom Silicon One chip technology and new Cisco 8000 Series carrier-class routers built on that silicon, which the company says has been in development for more than five years, at a cost of over $1 billion. The 8000s feature a new operating system – IOS XR7 that runs the boxes and handles security.Network pros react to new Cisco certification curriculum The Cisco Silicon One Q100 optical-routing silicon brings up to 10Tbps of network bandwidth in its first iteration – with a future goal of 25Tbps – and support for large non-blocking distributed routers, deep buffering with rich QoS and programmable forwarding. To read this article in full, please click here

Cisco targets hyperscalers with silicon, high-end routers

Cisco says it wants to change the future of the Internet and has rolled out the new silicon, hardware and software it says will move toward that goal.The centerpiece of Cisco’s strategy revolves around its custom Silicon One chip technology and new Cisco 8000 Series carrier-class routers built on that silicon, which the company says has been in development for more than five years, at a cost of over $1 billion. The 8000s feature a new operating system – IOS XR7 that runs the boxes and handles security.Network pros react to new Cisco certification curriculum The Cisco Silicon One Q100 optical-routing silicon brings up to 10Tbps of network bandwidth in its first iteration – with a future goal of 25Tbps – and support for large non-blocking distributed routers, deep buffering with rich QoS and programmable forwarding. To read this article in full, please click here

What’s hot at the edge for 2020? Everything

Few areas of the enterprise face as much churn as the edge of the network.  Experts say a variety of challenges drive this change – from increased SD-WAN access demand to cloud interconnected resources and IoT, the traditional perimeter of the enterprise is shifting radically and will continue to do so throughout 2020.One indicator: Gartner research that says by 2023, more than 50% of enterprise-generated data will be created and processed outside the data center or cloud, up from less than 10% in 2019.To read this article in full, please click here

What’s hot at the edge for 2020? Everything

Few areas of the enterprise face as much churn as the edge of the network.  Experts say a variety of challenges drive this change – from increased SD-WAN access demand to cloud interconnected resources and IoT, the traditional perimeter of the enterprise is shifting radically and will continue to do so throughout 2020.One indicator: Gartner research that says by 2023, more than 50% of enterprise-generated data will be created and processed outside the data center or cloud, up from less than 10% in 2019.To read this article in full, please click here

Celebrating a Successful Chapterthon 2019!

We are incredibly inspired by the collaborative projects brought to life by our Chapters for the 2019 Chapterthon, the global contest in which Internet Society Chapters develop a project within a set timeline and budget to achieve a common goal for the development of the Internet. This year’s theme was “Connecting the Unconnected” – because every last person on the planet is part of having an Internet for “everyone”, and we won’t rest until each person has the option of choosing to be connected.

Internet Society Chapters from all corners of the world developed innovative solutions that will continue to serve as inspiration for communities everywhere working to connect the unconnected. At the end of the contest, each project presented a three-minute video about the project specifics and its benefits to the community. Winning projects received a prize.

See how they addressed this global issue through local community initiatives!


Announcing the Winners!

1st Prize (USD 3000)
US New York Chapter
First Annual NYC Mesh Installathon: This project aims to mobilize a large team of volunteers on a single day to expand the NYC Mesh community network to at least six new locations, and connect underserved areas of New York City.

2nd Prize (USD 2000)
South Africa Chapter
Qokolweni Wi-fi Hotspots: This Continue reading

Asset Inventories

PCI365

How do you know what you need to apply your PCI DSS controls to? Simple, you check your asset inventory. You do have one, right? You know, PCI DSS requirement 2.4? Oh. You haven’t got one, have you.

Never fear, creating one is relatively simple providing you know your scope. Creating the asset inventory is really just a case of listing all the components that are in-scope for you. What should you include though?

Well, all system components so that’s things like network devices, firewalls, servers, desktops, laptops, wireless access points (important enough they get their own requirement, 11.1.1) and POI machines. You should also include at least key software that is used within your environment (think operating systems, payment applications, server software etc.)

You also need to include enough information to satisfy PCI DSS so for each item that is:

  • Enough information to uniquely identify the component (host…

View original post 263 more words