Archive

Category Archives for "Networking"

Juniper Fuses AI, Connected Security at RSA

It’s also getting a little bit SASE with its secure SD-WAN, but executives say they’ll talk...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Why Network Segmentation Matters

When IT leaders hear about segmentation, their first thought is usually about dividing a network up using VLANs or VXLANs. But segmentation also plays a critical security role in securing dynamic multi-cloud environments, IoT and BYOD strategies, and automated workflows in today’s highly distributed environments.Digital Innovation is disrupting enterprise organizations, adding new networks such as dynamic multi-cloud to enable new services and business opportunities. However, these new environments also create increased risk. The explosive adoption of IoT and mobile devices, as well as applications and services from multiple clouds, are pushing the attack surface beyond the traditional network boundaries. And because workflows, applications, and transactions have to span all of these new environments, traditional network-based segmentation strategies stop at the edge of each network environment without putting cumbersome and complex solutions in place.To read this article in full, please click here

BrandPost: Innovation, customer-centric philosophy makes Huawei a trusted partner

The need to stay connected anytime, anywhere has led to connectivity being one of the core elements of large campuses and public spaces. In recent years, the development only goes faster, where world-class infrastructure is gradually getting well-equipped with the right settings to keep people online. This leads to the exponential growth on the demand for excellent network coverage with extremely low latency.Let’s take St. Jakob Park as an example. As the home field of FC Basel, St. Jakob Park is Switzerland’s largest football stadium, with the requirement to keep 40,000 visitors, spectator stand, shops, and parking lots connected with large bandwidth, high concurrency, and low latency. The Park needs an advanced Wi-Fi network that delivers full wireless coverage and achieves secure connections.To read this article in full, please click here

AT&T, Raytheon, Armis Join Open Cybersecurity Alliance

The group also today made available OpenDXL Ontology, which it says is the first open source...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Automation Story: Add a Web UI

Imagine you followed the steps taken by Anne Baretta and stored network inventory into a database. What could you do with that information (apart from creating reports)? How about adding a web UI to help less-skilled network operators perform automated tasks?

Notes

  • While we won’t tell you how to build a web UI in our network automation course, we will tell you how to build a system out of numerous components (and what components you might need).

Automation Story: Add a Web UI

Imagine you followed the steps taken by Anne Baretta and stored network inventory into a database. What could you do with that information (apart from creating reports)? How about adding a web UI to help less-skilled network operators perform automated tasks?

Notes

  • While we won’t tell you how to build a web UI in our network automation course, we will tell you how to build a system out of numerous components (and what components you might need).

20 years of maintaining an open source program

It’s been almost 10 years since my previous post about this. And 20 years since 2000-02-24, which is when arping 0.1 was released. It was a 208 line C file, with a hand made Makefile.

As of today when Arping 2.21 is overdue to be released, the code in .c and .h files (excluding tests) is 3863 lines, and it uses the amazing autotools framework for analyzing dependencies.

I’ve recently had the displeasure of working with cmake, which is just the worst. Why anyone would think cmake is even remotely acceptable I’ll never understand.

CMake sucks

But the Arping story continues. It isn’t getting many new major features. Still, since the last post there’s been 205 commits, and 10 releases.

Things like:

  • Change from gettimeofday() to clock_gettime(), when available. More info about that in this blog post.
  • Don’t check for uid=0 and stop. Capabilities can come in other ways
  • Change from poll() to select() to work around bug in MacOS X
  • Use nice and modern getifaddrs() to resolve interfaces
  • Update documentation
  • Improve error messages
  • Update author email address
  • Fix warnings and general code cleanup
  • Used coverity to find and fix suspicious code
  • Add some more stats to output
  • Continue reading

Managed 4G/5G service connects to Amazon, Microsoft clouds

Federated Wireless is launching a turnkey 4G/5G service through a partnership with Amazon Web Services and  Microsoft Azure that runs over Citizens Broadband Radio Service (CBRS), which the Federal Communications Commission opened up to public use in January.The idea is pretty simple: Federated’s new connectivity-as-a-service offering can be purchased directly through both the AWS Marketplace and Azure for a monthly fee. The company’s consultants and engineers do a walkthrough or site survey, ship CBRS equipment, install it on the customer’s network and monitor and manage the system afterwards.To read this article in full, please click here

The Big Trends That Were set to Shape MWC Barcelona

The event might not be happening, but that doesn't mean we are going to ignore the big trends we...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

CEX (Code EXpress) 04. List what you need.

Hello my friend,

We continue discussion about the variable in the Python, which we have started in the previous article. Today we cover new type, which is very useful and, therefore, widely used. In various programming languages, this type is known under various names. So, who is here? 

Network automation training – boost your career

Don’t wait to be kicked out of IT business. Join our network automation training to secure your job in future. Come to NetDevOps side.

How does the training differ from this blog post series? Here you get the basics and learn some programming concepts in general, whereas in the training you get comprehensive set of knowledge with the detailed examples how to use Python for the network and IT automation. You need both.

What are we going to do today?

Answering to the question in the end of the preamble, here is the list. It is also known under the name array; however, in the Python’s terminology list is the correct term. The list variable contains any amount of the elements (starting from zero), which are siblings to each other, and they can be of any type as described in the previous article. Continue reading

Kubernetes Security Plagued by Human Error, Misconfigs

Exposures and data breaches due to misconfigurations have become an “alarmingly common” trend...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Lora – Test and results – awesome

What is LORA – Best reference – https://www.thethingsnetwork.org

I will anyways attempt to define this as a newbie who just got into this technology

with the help of a specific Receiver and Transmitter and using Radio waves you can send small bits of information to long ranges without the need of repeaters or wireless IP networking gear. “

Why is this useful – I have many use cases simple one being measuring soil moisture for plants and measuring water level in an overhead tank.

I currently have a very expensive setup of a Raspberry Pi zero wireless, a Repeater to repeat my Base Ip Network and a solar panel to power the power-hungry sensor as Raspberry pi does not know how to go into Deepsleep and wakeup.

Lora Makes it simple and even in reasonable living space, wireless routers do not perform well to cover the range up till the back yard garden.

What do you need – Listed in the below article and its nicely written

Most of the Sample Code – https://randomnerdtutorials.com/ttgo-lora32-sx1276-arduino-ide/

I have tested its range till 300m without any issues at all, that’s like 4 times what my wireless router can do!

Continue reading

Daily Roundup: Digital Ocean Grabs $300M Life Preserver

Digital Ocean grabbed a $300M life preserver; Microsoft imported AWS logs for free; and U.S....

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

NDSS 2020: The Best in Security Research – For the Good of the Internet

On 23 February, the 27th consecutive Network and Distributed System Security Symposium (NDSS) kicks off in San Diego, CA. NDSS is a premier academic research conference addressing a wide range of topics on network and system security. It’s an incubator for new, innovative ideas and research on the security and privacy of the Internet.

NDSS 2020 (23-26 February) will be one of the biggest NDSS symposium yet, featuring 88 peer-reviewed academic papers, 34 posters, 5 workshops, and 2 keynotes on vital and timely topics. Here are some of the highlights.

Workshops

This year’s program officially starts with five workshops on Sunday, 23 February. NDSS workshops are organized around a single topic and provide an opportunity for greater dialogue between researchers and practitioners in the area.

The QUIC Privacy and Security (QUIPS) Workshop focuses on QUIC security and privacy analysis efforts. The IETF QUIC protocol is a modern UDP-based, stream-multiplexing, encrypted transport protocol. Inspired by prior art, QUIC’s packet and header encryption removes cleartext information from the network while simultaneously mitigating ossification of version-specific protocol behavior. The goal of the QUIPS workshop is to bring formal analysis results to the IETF working group and developer communities in order to build confidence Continue reading

Canada’s Innovative Future Relies on Upholding Core Properties of the Capital ‘I’ Internet

As Canada considers how to renew its broadcasting and telecommunications regulatory regime, it should steer clear of recent recommendations that would impact key Internet properties that foster Canadian innovation online.

On Jan. 29 the Broadcasting and Telecommunications Legislative Review (BTLR) panel handed the Canadian government 97 recommendations to consider as it prepares new legislation to update the decades-old Telecommunications Act, Radiocommunication Act and Broadcasting Act.

While it has laudable advice on how to improve access to rural and remote Indigenous communities in Canada, the report’s major flaws would inhibit the same Canadian innovation the recommendations intend to promote.

This includes giving Canadian Radio-television and Telecommunications Commission (CRTC) the authority to treat the Internet like a broadcasting network, and setting unrealistic rules that would harm crucial elements of the Internet in the name of promoting Canadian content online.

There are many reasons you can’t treat the Internet like a traditional broadcaster, but the key one is this: the Internet is not like other technologies.

While it is essentially just an interconnected network of networks – hence the name: Inter-net – the Internet was built with a unique set of properties that were critical to its success to date: openness, decentralization, Continue reading