Archive

Category Archives for "Networking"

Heavy Networking 451: Intelligent Network Automation And Intent Engineering With Gluware (Sponsored)

On today's Heavy Networking, recorded live at Gluware Intent 19, the Packet Pushers dive into network automation, learn about sponsor Gluware's capability to bring automation into brownfield environments and derive business intent from existing networks, and explore real-world use cases from customers Merck and Terracon.

The post Heavy Networking 451: Intelligent Network Automation And Intent Engineering With Gluware (Sponsored) appeared first on Packet Pushers.

Will Spectrum Hunger Kill Weather Forecasting?

If you are a fan of the work we do each week with our Gestalt IT Rundown on Facebook, you probably saw a story in this week’s episode about the race for 5G spectrum causing some potential problems with weather forecasting. I didn’t have the time to dig into the details behind the story on that episode, so I wanted to take a few minutes and explain why it’s such a big deal.

First, you have to know that 5G (and many other) speeds are entirely dependent upon the amount of spectrum they can use to communicate. The more spectrum available to them, the more channels they have available to communicate. Which increases the speed they can exchange information and reduces the amount of interference between devices. Sounds simple right?

Except mobile devices aren’t the only things that are using the spectrum. We have all kinds of other devices out there that use radio waves to communicate. We’ve known for several years that there are a lot of devices in the 5 GHz spectrum used by 802.11 that interfere with wireless devices. Things like ISM radios for industrial and medical applications or government radar systems. The government has instituted Continue reading

If You Worry About 768K Day, You’re Probably Doing Something Wrong

A few years ago we “celebrated” 512K day - the size of the full Internet routing table exceeded 512K (for whatever value of K ;) prefixes, overflowing TCAMs in some IP routers and resulting in interesting brownouts.

We’re close to exceeding 768K mark and the beware 768K day blog posts have already started appearing. While you (RFC 2119) SHOULD check the size of your forwarding table and the maximum capabilities of your hardware, the more important question should be “Why do I need 768K forwarding entries if I’m not a Tier-1 provider

Read more ...

Self Hosted Vagrant Cloud

It is possible to host your own Vagrant "cloud" on premises. You might want to do this to align with your companies security policy and or to host your custom Vagrant boxes. There are a number of methods to serve your Vagrant boxes, in this post I will show you how to build a web server to...

Vagrant Libvirt Install CentOS 7

This post will cover the process of installing Vagrant with the libvirt provider on CentOS 7. For reference the following software will be used in this post. CentOS - 7 Vagrant - 2.2.4 Vagrant-libvirt - 0.0.45 System Prep Before we begin, lets ensure the host is updated. cmd sudo yum...

Cisco ties its security/SD-WAN gear with Teridion’s cloud WAN service

Cisco and Teridion have tied the knot to deliver faster enterprise software-defined WAN services.The agreement links Cisco Meraki MX Security/SD-WAN appliances and its Auto VPN technology which lets users quickly bring up and configure secure sessions between branches and data centers with Teridion’s cloud-based WAN service. Teridion’s service promises customers better performance and control over traffic running from remote offices over the public internet to the data center. The service features what Teridion calls “Curated Routing” which fuses WAN acceleration techniques with route optimization to speed traffic.To read this article in full, please click here

Qualcomm loses case about its mobile-chip licensing fees

Chip maker Qualcomm has lost a round in federal court over how much it charges makers of wireless devices for its mobile chips.The company must lower its fees and submit to seven years of monitoring by the Federal Trade Commission, which brought the suit. Qualcomm says it will appeal.For more details about the suit and its impact on upcoming 5G deployments, watch this TECH(feed) video.   More about 5g networks:To read this article in full, please click here

Study: Most enterprise IoT transactions are unencrypted

Of the millions of enterprise-IoT transactions examined in a recent study, the vast majority were sent without benefit of encryption, leaving the data vulnerable to theft and tampering.The research by cloud-based security provider Zscaler found that about 91.5 percent of transactions by internet of things devices took place over plaintext, while 8.5 percent were encrypted with SSL. That means if attackers could intercept the unencrypted traffic, they’d be able to read it and possibly alter it, then deliver it as if it had not been changed.To read this article in full, please click here

Study: Most enterprise IoT transactions are unencrypted

Of the millions of enterprise-IoT transactions examined in a recent study, the vast majority were sent without benefit of encryption, leaving the data vulnerable to theft and tampering.The research by cloud-based security provider Zscaler found that about 91.5 percent of transactions by internet of things devices took place over plaintext, while 8.5 percent were encrypted with SSL. That means if attackers could intercept the unencrypted traffic, they’d be able to read it and possibly alter it, then deliver it as if it had not been changed.To read this article in full, please click here