Archive

Category Archives for "Networking"

How the Internet Society’s Privacy Statement Stacks Up

For ten years, the Internet Society’s Online Trust Alliance (OTA) has published an annual comprehensive survey of 1,200 sites’ security and privacy practices. The 10th edition of this Audit has been released and can be found here. As part of the Audit, we score each site’s privacy statement against 29 criteria, ranging from whether it is linked to on the site’s homepage, to whether it states how the site handles children’s data.

For this blog post, we decided to use the Internet Society’s current privacy statement as an example, to illustrate the criteria used, and to show how a privacy statement fits into the bigger picture of an organization’s privacy practices. A privacy statement is only one piece of an organization’s overall privacy practices – although, as the public-facing piece, it is of course important. Other aspects (which are not included in the OTA survey) include:

  • expressing and committing to a set of overall privacy principles
  • having internal policies and practices that put the public-facing privacy statement into practice
  • internal and external enforcement of the commitments expressed in the privacy statement

There are myriad ways to structure a privacy statement and, to be frank, many privacy statements are written with different goals Continue reading

Dell enters the on-premises, pay-as-you-go business with VMware’s help

Dell EMC kicked off its Dell Technologies World show by announcing an alliance with VMware to offer Dell EMC hardware on-premises without having to buy it outright.The VMware Cloud on Dell EMC program offers the entire VMware software-defined data center (SDDC) stack on hyperconverged VxRail hardware. Rather than purchasing it outright, customers can pay for the service every month based on use. [ Read also: How to plan a software-defined data-center network ] Sound familiar? HP Enterprise has a similar program called GreenLake that does the same thing. Also, Dell has a program called Cloud Flex, a consumption financing offering for on-premises hardware.To read this article in full, please click here

Dell enters the on-premises, pay-as-you-go business with VMware’s help

Dell EMC kicked off its Dell Technologies World show by announcing an alliance with VMware to offer Dell EMC hardware on-premises without having to buy it outright.The VMware Cloud on Dell EMC program offers the entire VMware software-defined data center (SDDC) stack on hyperconverged VxRail hardware. Rather than purchasing it outright, customers can pay for the service every month based on use. [ Read also: How to plan a software-defined data-center network ] Sound familiar? HP Enterprise has a similar program called GreenLake that does the same thing. Also, Dell has a program called Cloud Flex, a consumption financing offering for on-premises hardware.To read this article in full, please click here

Episode 50 – GDPR

GDPR, the European data protection regulation that went into effect last year, was put into place to protect EU citizens from the misuse of their identifying personal information. While a positive step forward for many, it has had some unintended consequences for fundamental Internet systems and services. In this episode we take a look at how GDPR and Internet privacy regulation effects the Internet.

 


 

 

Dave Piscatello
Guest
Brian Honan
Guest
Russ White

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 50 – GDPR appeared first on Network Collective.

Looking into Linux modules

What are Linux modules? Kernel modules are chunks of code that are loaded and unloaded into the kernel as needed, thus extending the functionality of the kernel without requiring a reboot. In fact, unless users inquire about modules using commands like lsmod, they won't likely know that anything has changed.One important thing to understand is that there are lots of modules that will be in use on your Linux system at all times and that a lot of details are available if you're tempted to dive into the details.One of the prime ways that lsmod is used is to examine modules when a system isn't working properly. However, most of the time, modules load as needed and users don't need to be aware of how they are working.To read this article in full, please click here

Yet another killer cloud quarter puts pressure on data centers

You’d almost think I’d get tired of writing this story over and over and over… but the ongoing growth of cloud computing is too big a trend to ignore.Critically, the impressive growth numbers of the three leading cloud infrastructure providers—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform—doesn’t occur in a vacuum. It’s not just about new workloads being run in the cloud; it’s also about more and more enterprises moving existing workloads to the cloud from on-premises data centers.To read this article in full, please click here

Yet another killer cloud quarter puts pressure on data centers

You’d almost think I’d get tired of writing this story over and over and over… but the ongoing growth of cloud computing is too big a trend to ignore.Critically, the impressive growth numbers of the three leading cloud infrastructure providers—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform—doesn’t occur in a vacuum. It’s not just about new workloads being run in the cloud; it’s also about more and more enterprises moving existing workloads to the cloud from on-premises data centers.To read this article in full, please click here

Vapor IO provides direct, high-speed connections from the edge to AWS

Edge computing startup Vapor IO now offers a direct connection between its edge containers to Amazon Web Services (AWS) via a high-speed fiber network link.The company said that connection between its Kinetic Edge containers and AWS will be provided by Crown Castle's Cloud Connect fiber network, which uses Amazon Direct Connect Services. This would help reduce network latency by essentially drawing a straight fiber line from Vapor IO's edge computing data centers to Amazon's cloud computing data centers.“When combined with Crown Castle’s high-speed Cloud Connect fiber, the Kinetic Edge lets AWS developers build applications that span the entire continuum from core to edge. By enabling new classes of applications at the edge, we make it possible for any AWS developer to unlock the next generation of real-time, innovative use cases,” wrote Matt Trifiro, chief marketing officer of Vapor IO, in a blog post.To read this article in full, please click here

Vapor IO provides direct, high-speed connections from the edge to AWS

Edge computing startup Vapor IO now offers a direct connection between its edge containers to Amazon Web Services (AWS) via a high-speed fiber network link.The company said that connection between its Kinetic Edge containers and AWS will be provided by Crown Castle's Cloud Connect fiber network, which uses Amazon Direct Connect Services. This would help reduce network latency by essentially drawing a straight fiber line from Vapor IO's edge computing data centers to Amazon's cloud computing data centers.“When combined with Crown Castle’s high-speed Cloud Connect fiber, the Kinetic Edge lets AWS developers build applications that span the entire continuum from core to edge. By enabling new classes of applications at the edge, we make it possible for any AWS developer to unlock the next generation of real-time, innovative use cases,” wrote Matt Trifiro, chief marketing officer of Vapor IO, in a blog post.To read this article in full, please click here

Part2 – Monitoring Network Traffic with ntopng and nProbe

In the Part1 we have covered compilation of ntopng on Ubuntu 18.04.1 Server and installation of nProbe on Raspberry Pi 3. We have also configured Cisco Catalyst switch 3550 for traffic mirroring. The source of the traffic is the interface Fa0/3 where PC is connected and the destination port is Fa0/24 with connected Raspberry Pi 3B. This tutorial goes further and it covers configuration of the both ntopong and nProbe. First, let's have a look at the network topology.

Picture 1 - Network Topology

nProbe is running on Raspberry Pi 3B with the IP address 172.17.100.50/16. ntpong is running on Ubuntu 18.04.1 Server as the VirtualBox guest with the IP address 172.17.100.7/16. Our goal is to monitor network traffic from all devices connected to the ports of Cisco Catalyst switch 3550. In fact, we are monitoring only Windows 7 machine that is connected to Fa0/3.

Note: Without valid license, nProbe is working in demo mode and it is limited to show only 25000 flows export.

nProbe can work in two modes - poll mode and push mode. In a poll mode, ntopng dynamically subscribes to the probe via ZMQ, Continue reading

Must-know Linux Commands

It takes some time working with Linux commands before you know which one you need for the task at hand, how to format it and what result to expect, but it’s possible to speed up the process.To read this article in full, please click here(Insider Story)

Campus design feature set-up : Part 3

We’ve said it before but since it’s important we’ll say it again. Shared knowledge makes for a stronger ecosystem! With this in mind, I’m showing you how to set up the CL 3.7.5 campus feature: Multi-Domain Authentication in a 6-part blog series.

In this series we’re covering it all: Wired MAC Authentication using Aruba ClearPass, Multi-Domain Authentication using Aruba ClearPass, Wired 802.1x using Cisco ISE, Wired MAC Authentication using Cisco ISE, and Multi-Domain Authentication using Cisco ISE.

This third guide is how to enable Multi-Domain Authentication in Cumulus Linux 3.7.5 + using Aruba ClearPass 6.7.x.

Keep in mind that this step-by-step guide assumes that you have already performed an initial setup of Aruba ClearPass and read the following Wired 802.1x using Aruba ClearPass and Wired MAC Authentication using Aruba ClearPass.

Over the past year, Cumulus Networks has made a concerted effort to expand the breadth and scope of the campus features within Cumulus Linux. Hot off the press in 3.7.5 is one of those features, Multi-Domain Authentication (MDA).

Classically, MDA allows for a voice VLAN and data VLAN to be configured independently on the same switch port for a VoIP Continue reading

BrandPost: Measuring the edge: Finding success with edge deployments

Edge computing deployments are well underway as companies seek to better process the wealth of data being generated, for example, by Internet of Things (IoT) devices.So, what are the results? Plus, how can you ensure success with your own edge projects?Measurements of successThe use cases for edge computing deployments vary widely, as do the business drivers and, ultimately, the benefits.Whether they’re seeking improved network or application performance, real-time data analytics, a better customer experience, or other efficiencies, enterprises are accomplishing their goals. Based on two surveys — one by Automation World and another by Futurum Research — respondents have reported:To read this article in full, please click here