Archive

Category Archives for "Networking"

Upgrade Scripts

We need to do “upgrades in the network” is one of those phrases that chills the bones of all IT engineers. Upgrades don’t have to be so painful and in this blog, we’re going to discuss the upgrade process recommended by Cumulus and leave you with some example automation to make the process as efficient as possible.

Upgrades are necessary to maintain stable and secure code but bring the risk of new bugs and sustained outages due to unforeseen circumstances, and they’re generally not very easy to perform. Anyone who has worked network operations knows that upgrade windows could run as quickly as an hour or as long as all night (and maybe for the next three nights). Even as I write this I am remembering experiences from upgrade windows of old where things did not go according to plan. But before we get into the specifics of the upgrade process with Cumulus, it is worth discussing why upgrades in the network are so fraught with peril.

DISCLAIMER: Rant Incoming

The biggest impediment to network upgrades is complexity. When we say complexity we mean the conscious choice to add complexity into the design of the network that most folks undertake Continue reading

The Serverlist Newsletter 2nd Edition: Available Now

The Serverlist Newsletter 2nd Edition: Available Now

Check out our second edition of The Serverlist below. Get the latest scoop on the serverless space, get your hands dirty with new developer tutorials, engage in conversations with other serverless developers, and find upcoming meetups and conferences to attend.

Sign up below to have The Serverlist sent directly to your mailbox.

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

Linux security: Cmd provides visibility, control over user activity

There's a new Linux security tool you should be aware of — Cmd (pronounced "see em dee") dramatically modifies the kind of control that can be exercised over Linux users. It reaches way beyond the traditional configuration of user privileges and takes an active role in monitoring and controlling the commands that users are able to run on Linux systems.Provided by a company of the same name, Cmd focuses on cloud usage. Given the increasing number of applications being migrated into cloud environments that rely on Linux, gaps in the available tools make it difficult to adequately enforce required security. However, Cmd can also be used to manage and protect on-premises systems.To read this article in full, please click here

BrandPost: How edge computing will bring business to the next level

What do embedded sensors, ecommerce sites, social media platforms, and streaming services have in common? They all produce vast volumes of data, much of which travels across the internet. In fact, Cisco estimates global IP traffic will grow to 3.3 zettabytes annually by 2021 – up three times compared to internet traffic in 2017.For many businesses, these data packets represent treasure troves of actionable information, from customers’ buying preferences to new market trends. But as the volume and velocity of data increases, so too does the inefficiency of transmitting all this information to a cloud or data center for processing.To read this article in full, please click here

BrandPost: How edge computing will bring business to the next level

What do embedded sensors, ecommerce sites, social media platforms, and streaming services have in common? They all produce vast volumes of data, much of which travels across the internet. In fact, Cisco estimates global IP traffic will grow to 3.3 zettabytes annually by 2021 – up three times compared to internet traffic in 2017.For many businesses, these data packets represent treasure troves of actionable information, from customers’ buying preferences to new market trends. But as the volume and velocity of data increases, so too does the inefficiency of transmitting all this information to a cloud or data center for processing.To read this article in full, please click here

BrandPost: How is 802.11ax different than the previous wireless standards?

Most networking groups have a wireless guy, maybe two – you might be that person. For years, the rest of the campus network group hasn’t really had to think about what they plugged into the network. Give them a gig port, PoE, probably set up a VLAN and that’s it: wireless sorted.Because when it all came down to it, it didn’t matter how many wireless users connected to the access point because only one device, the client or the access point, could transmit at one time. What’s more, a single wireless client is not going to tax a gig port. In fact, the more clients there are on an AP, the less traffic ends up on the wire since they spend more time trying to get a timeslot to transmit, like the seagulls in “Finding Nemo” yelling “Mine, mine, mine.”To read this article in full, please click here

BrandPost: How is 802.11ax different than the previous wireless standards?

Most networking groups have a wireless guy, maybe two – you might be that person. For years, the rest of the campus network group hasn’t really had to think about what they plugged into the network. Give them a gig port, PoE, probably set up a VLAN and that’s it: wireless sorted.Because when it all came down to it, it didn’t matter how many wireless users connected to the access point because only one device, the client or the access point, could transmit at one time. What’s more, a single wireless client is not going to tax a gig port. In fact, the more clients there are on an AP, the less traffic ends up on the wire since they spend more time trying to get a timeslot to transmit, like the seagulls in “Finding Nemo” yelling “Mine, mine, mine.”To read this article in full, please click here

BrandPost: The Network Gets Personal

In a competitive environment, with so much emphasis on the need for communications service providers (CSPs) to offer more personalized services to increase customer loyalty, the network plays a crucial role, explains Kent McNeil, Vice President of Software for Blue Planet. While the connection between network infrastructure and the customer relationship isn’t obvious, it is actually what drives personalization of services and competitive edge.Enhancing the customer experience and lowering churn rates are key objectives for CSPs; however, an influx of competition is challenging customer loyalty. Equally, leading-edge technologies, from devices to cloud, have created new visions for consumers and enterprises. This has significantly changed customer demands, as well as expectations about how those requirements are fulfilled. Customers expect more personalized services, with tailored offers and ease-of-use.To read this article in full, please click here

BrandPost: The Network Gets Personal

In a competitive environment, with so much emphasis on the need for communications service providers (CSPs) to offer more personalized services to increase customer loyalty, the network plays a crucial role, explains Kent McNeil, Vice President of Software for Blue Planet. While the connection between network infrastructure and the customer relationship isn’t obvious, it is actually what drives personalization of services and competitive edge.Enhancing the customer experience and lowering churn rates are key objectives for CSPs; however, an influx of competition is challenging customer loyalty. Equally, leading-edge technologies, from devices to cloud, have created new visions for consumers and enterprises. This has significantly changed customer demands, as well as expectations about how those requirements are fulfilled. Customers expect more personalized services, with tailored offers and ease-of-use.To read this article in full, please click here

Unpacking the Stack and Addressing Complaints about Content

Unpacking the Stack and Addressing Complaints about Content
Unpacking the Stack and Addressing Complaints about Content

Although we are focused on protecting and optimizing the operation of the Internet, Cloudflare is sometimes the target of complaints or criticism about the content of a very small percentage of the more than thirteen million websites that use our service. Our termination of services to the Daily Stormer website a year and a half ago drew significant attention to our approach to these issues and prompted a lot of thinking on our part.  

At the time, Matthew wrote that calls for service providers to reject some online content should start with a consideration of how the Internet works and how the services at issue up and down the stack interact with that content. He tasked Cloudflare’s policy team with engaging broadly to try and find an answer. With some time having passed, we want to take stock of what we’ve learned and where we stand in addressing problematic content online.  

The aftermath of the Daily Stormer decision

The weeks immediately following the decision in August 2017 were filled with conversations. Matthew made sure the Cloudflare team accepted every single invitation to talk about these issues; we didn’t simply put out a press release or “no comment” anyone. Continue reading

Dynamic Network Diagrams, This is what we need!

We all create network diagrams. Network Engineers create network diagrams.  But for who ? When ? How they are accurate ? Do we really need network diagrams ? Let me share my thoughts with you.    Network engineers have been creating network diagrams, physical diagrams, logical diagrams, showing Vlans , IP addresses , so many …

The post Dynamic Network Diagrams, This is what we need! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.