Archive

Category Archives for "Networking"

Safer Internet Day 2019: Malaysia Gears Up for Cyber Wellness

Safer Internet Day is celebrated in over 100 countries each year to promote a more secure Internet. It nurtures and increases public awareness on cyber security, especially to young people across the globe, so that they become more responsible when using technology and digital gadgets. In Malaysia this year, this event was observed over one month, beginning 5 February.

The Malaysian Safer Internet Day campaign was officiated by Eddin Syazee Shith, Deputy Minister of Communication and Multimedia in Putrajaya, Malaysia. It focused on “Cyber Wellness,” with the objective to promote wellness in the digital world through healthy mental well-being and ethical social values.

The Internet Society Malaysia Chapter was a strategic partner in Safer Internet Day 2019. Together with the Ministry of Communications and Multimedia, CyberSecurity Malaysia and other stakeholders from the industry, regulators, and society, various programs were organized to promote cyber wellness, a safer Internet, and nurturing and increasing public awareness on cyber security.

The theme cyber wellness was chosen as young people today have greater access to the Internet and communication devices. Living in an “on demand” interactive digital culture where social media has become an influential platform to their social lives, youth can be exposed to Continue reading

HPE and Nutanix partner for hyperconverged private cloud systems

Hewlett Packard Enterprise (HPE) has partnered with Nutanix to offer Nutanix’s hyperconverged infrastructure (HCI) software available as a managed private cloud service and on HPE-branded appliances.As part of the deal, the two companies will be competing against each other in hardware sales, sort of. If you want the consumption model you get through HPE’s GreenLake, where your usage is metered and you pay for only the time you use it (similar to the cloud), then you would get the ProLiant hardware from HPE.If you want an appliance model where you buy the hardware outright, like in the traditional sense of server sales, you would get the same ProLiant through Nutanix.To read this article in full, please click here

HPE and Nutanix partner for hyperconverged private cloud systems

Hewlett Packard Enterprise (HPE) has partnered with Nutanix to offer Nutanix’s hyperconverged infrastructure (HCI) software available as a managed private cloud service and on HPE-branded appliances.As part of the deal, the two companies will be competing against each other in hardware sales, sort of. If you want the consumption model you get through HPE’s GreenLake, where your usage is metered and you pay for only the time you use it (similar to the cloud), then you would get the ProLiant hardware from HPE.If you want an appliance model where you buy the hardware outright, like in the traditional sense of server sales, you would get the same ProLiant through Nutanix.To read this article in full, please click here

History Of Networking – DECnet – David Oran

In this History of Networking episode David Oran joins us to talk about his involvement in the history of DECnet while on the team that designed it at Digital Equipment Corporation. David also was a contributor in the creation of IS-IS as well as contributing to many other significant networking projects in his distinguished career.

David Oran
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – DECnet – David Oran appeared first on Network Collective.

Anti-lasers could give us perfect antennas, greater data capacity

Playing laser light backwards could adjust data transmission signals so that they perfectly match receiving antennas. The fine-tuning of signals like this, not achieved with such detail before, could create more capacity for ever-increasing data demand."Imagine, for example, that you could adjust a cell phone signal exactly the right way, so that it is perfectly absorbed by the antenna in your phone," says Stefan Rotter of the Institute for Theoretical Physics of Technische Universität Wien (TU Wien) in a press release.To read this article in full, please click here

802.11ax Is NOT A Wireless Switch

802.11ax is fast approaching. Though not 100% ratified by the IEEE, the spec is at the point where most manufacturers and vendors are going to support what’s current as the “final” version for now. While the spec for what marketing people like to call Wi-Fi 6 is not likely to change, that doesn’t mean that the ramp up to get people to buy it is showing any signs of starting off slow. One of the biggest problems I see right now is the decision by some major AP manufacturers to call 802.11ax a “wireless switch”.

Complex Duplex

In case you had any doubts, 802.11ax is NOT a switch.1 But the answer to why that is takes some explanation. It all starts with the network. More specifically, with Ethernet.

Ethernet is a broadcast medium. Packets are launched into the network and it is hoped that the packet finds the destination. All nodes on the network listen and, if the packet isn’t destined for them they discard it. This is the nature of the broadcast. If multiple stations try to talk at once, the packets collide and no one hears anything. That’s why Ethernet developed a collision detection Continue reading

China | Silicon Valley | China: A path less traveled

“Real knowledge is to know the extent of one's ignorance.”
― Confucius

Blueprint:

China | Silicon Valley | China: A path less traveled

Don’t tell our CEO, Matthew Prince, but the first day I interviewed at Cloudflare I had a $9.00 phone in my pocket, a knock-off similar to a Nokia 5140, but the UI was all in Chinese characters—that phone was a fitting symbol for my technical prowess. At that time in my career I could send emails and use Google, but that was about the extent of my tech skill set. The only code I’d ever seen was in the Matrix, Apple computers confused me, and I was working as a philosophy lecturer at The University of California, Santa Cruz. So, you know, I was pretty much the ideal candidate for a deeply technical, Silicon Valley startup.

This was in 2013. I had just returned from two years of Peace Corps service in the far Southwest of China approaching the Himalayan plateau. That experience gave me the confidence to walk into Cloudflare’s office knowing that I would be good for the job despite the gaps in my knowledge. My early training in philosophy plus my Peace Corps service gave me a blueprint for learning and Continue reading

Shifting Responsibility in Network Design and Operations

When I started working with Cisco routers in late 1980s all you could get were devices with a dozen or so ports, and CPU-based forwarding (marketers would call it software defined these days). Not surprisingly, many presentations in Cisco conferences (before they were called Networkers or Cisco Live) focused on good network design and split of functionality in core, aggregation (or distribution) and access layer.

What you got following those rules were stable and predictable networks. Not everyone would listen; some customers tried to be cheap and implement too many things on the same box… with predictable results (today they would be quick to blame vendor’s poor software quality).

Read more ...

Cisco, Google reenergize multi-cloud/hybrid cloud joint development work

Cisco and Google have expanded their joint cloud development activities to help customers more easily build secure multicloud and hybrid applications everywhere from on-premises data centers to public clouds.[Check out what hybrid cloud computing is and learn what you need to know about multi-cloud. Get regularly scheduled insights by signing up for Network World newsletters] The expansion centers around Google’s new open-source hybrid cloud package called Anthos, which was introduced at the company’s Google Next event this week. Anthos is based on – and supplants – the company's existing Google Cloud Service beta. Anthos will let customers run applications, unmodified, on existing on-premises hardware or in the public cloud and will be available on Google Cloud Platform (GCP) with Google Kubernetes Engine (GKE), and in data centers with GKE On-Prem, the company says. Anthos will also let customers for the first time manage workloads running on third-party clouds such as AWS and Azure from the Google platform without requiring administrators and developers to learn different environments and APIs, Google said. To read this article in full, please click here

Cisco, Google reenergize multicloud/hybrid cloud joint development

Cisco and Google have expanded their joint cloud-development activities to help customers more easily build secure multicloud and hybrid applications everywhere from on-premises data centers to public clouds.[Check out what hybrid cloud computing is and learn what you need to know about multi-cloud. Get regularly scheduled insights by signing up for Network World newsletters] The expansion centers around Google’s new open-source hybrid cloud package called Anthos, which was introduced at the company’s Google Next event this week. Anthos is based on – and supplants – the company's existing Google Cloud Service beta. Anthos will let customers run applications, unmodified, on existing on-premises hardware or in the public cloud and will be available on Google Cloud Platform (GCP) with Google Kubernetes Engine (GKE), and in data centers with GKE On-Prem, the company says. Anthos will also let customers for the first time manage workloads running on third-party clouds such as AWS and Azure from the Google platform without requiring administrators and developers to learn different environments and APIs, Google said. To read this article in full, please click here

BrandPost: Enhanced security at the edge

It’s becoming a cliché to say that data security is a top concern among executives and boards of directors. The problem is: the problem just won’t go away.Hackers and attackers are ever finding new ways to exploit weaknesses. Just as companies start to use emerging technologies like artificial intelligence and machine learning to protect their organizations in an automated fashion, so too are bad actors using these tools to further their goals.In a nutshell, security simply cannot be overlooked. And now, as companies increasingly adopt edge computing, there are new considerations to securing these environments.To read this article in full, please click here