What we see in this number is a steady trend of these statistics since the Great Recession, with no evidence Continue readingNeed something to discuss over #Thanksgiving dinner? Try this— Donald Trump Jr. (@DonaldJTrumpJr) November 23, 2017
Stock markets at all time highs
Lowest jobless claims since 73
6 TRILLION added to economy since Election
1.5M fewer people on food stamps
Consumer confidence through roof
Lowest Unemployment rate in 17 years #maga
Tomorrow is Thanksgiving in the United States. It’s a holiday for getting together with family characterized by turkey dinner and whatever it is that happens in American football. While celebrating with family is great, if you use a computer for your main line of work, sometimes the conversation turns to how to setup the home wifi or can Russia really use Facebook to hack the US election. Just in case you’re a geek who finds yourself in that position this week, we wanted to give you something to play with. To that end, we’re opening the Warp beta to all Cloudflare users. Feel free to tell your family there’s been an important technical development you need to attend to immediately and enjoy!
Warp allows you to expose a locally running web server to the internet without having to open up ports in the firewall or even needing a public IP address. Warp connects a web server directly to the Cloudflare network where Cloudflare acts as your web server’s network gateway. Every request reaching your origin must travel to the Cloudflare network where you can apply rate limits, access policies and authentication before the request hits your Continue reading
The FCC plans to completely repeal #NetNeutrality this week.— Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
Firstly, it's not a NetNeutrality issue (which applies only to the Internet), but an issue with text-messages. In other words, it's something that will continue to happen even with NetNeutrality rules. People relate this to NetNeutrality as an analogy, not because it actually is such an issue.The FCC plans to completely repeal #NetNeutrality this week.— Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
The FCC plans to completely repeal #NetNeutrality this week.— Christian J. (@dtxErgaOmnes) November 22, 2017
Here's the censorship of speech that actually happened without Net Neutrality rules:#SaveNetNeutrality pic.twitter.com/6R29dajt44
As businesses evaluate their applications in the constantly evolving world of IT, new strategies are emerging for delivery. These strategies include keeping applications on-premises or moving them to one or more public cloud providers.
These public clouds come with their own networking and security constructs and policy management. This results in a new set of technology siloes that increases expense, complexity and risk:
This blog series will discuss the challenges of providing consistent networking and security policies for native cloud workloads, the value of VMware NSX Cloud, and walk through the process of securing and connecting applications running natively in the public cloud.
VMware’s strategy is to enable businesses to create and deliver applications. To support new delivery strategies, VMware NSX Cloud provides consistent networking and security for native applications running in multiple public and private clouds. Utilizing a single management console and a common application programming interface, VMware NSX Cloud offers numerous benefits:
The company added 2,500 new customers in the quarter.
The platform is compatible with open source container orchestration projects, including Kubernetes.
The other day Daniel Dib (http://lostintransit.se) asked me an interview question. The question was about certifications. What do I think about them…. and are they losing their “value”.
Poor certifications. People question their value. Of course “value” typically means for many what can the cert “do” for you once you have it. People also get so judgemental of others for “collecting” them. And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”. Poor poor certifications. In every area certifications exist they can get a bad rep. IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge.
In 2012 my view on certs changed. I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs. You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading
The other day Daniel Dib (http://lostintransit.se) asked me an interview question. The question was about certifications. What do I think about them…. and are they losing their “value”.
Poor certifications. People question their value. Of course “value” typically means for many what can the cert “do” for you once you have it. People also get so judgemental of others for “collecting” them. And yes… when I was younger I was, admittedly, one of those people who looked down on people I viewed as “cert collectors”. Poor poor certifications. In every area certifications exist they can get a bad rep. IT industry, Scuba Diving, .. heck even in girl scouts when there was always that one girl who wanted to try to get every possible girl scout badge.
In 2012 my view on certs changed. I realized I could use them to my advantage to help me organize my learning by making goals and signing up for certs. You see, back in 2010 I had bought a few books about Wireshark by Laura Chappel and told myself I would make Continue reading
If you are a hacker or a security company, 2017 was a very good year.
Some security people have scoffed at me when I say that security
problems are primarily "just bugs".
Those security people are f*cking morons.
Because honestly, the kind of security person who doesn't accept that
security problems are primarily just bugs, I don't want to work with.
Ugh turns out you're wrong! I know you let quality data inform your opinions, and hope the FBI is a sufficiently credible source for you https://t.co/SVwaLilF9B— Rune Sørensen (@runesoerensen) November 14, 2017
Enterprises must realize the advantages of the cloud without introducing new risk.
Remote user authentication and role based access control (RBAC) is an important requirement when deploying new systems in an organization, particularly in the networking world. For that matter, systems typically leverage RADIUS or Active Directory (AD) servers, to name a few.
NSX-T integrates with VMware Identity Manager (vIDM) to get the following benefits related to user authentication:
This blog post covers the main steps required to integrate NSX-T with vIDM and to configure roles that grant different privileges to different users. It does not cover deployment and hardening of VMware Identity Manager (vIDM). At the end of the post, there is a link to a demo showing how to do the configuration and several role-based access tests.
Assuming that both NSX-T Manager and vIDM appliances are deployed, powered on and configured with the basic management details (IP address, admin users, etc.), the integration requires the following steps:
One week from today, we’ll be at ION Belgrade! Our last event of the year take place on Thursday, 23 November 2017, alongside the 3rd Republic of Serbia Network Operators’ Group (RSNOG).
As always, ION Conferences bring network engineers and leading industry experts together to discuss emerging technologies and hot technology topics. Early adopters provide valuable insight into their own deployment experiences and bring participants up to speed on new standards emerging from the IETF.
Agenda
The half-day agenda and all our great speakers for ION Belgrade will make this a great event. Here’s a quick look at the day:
Registration
ION Belgrade registration is open! Learn more about our co-host on the RSNOG main page.
Webcast
RSNOG will be live streaming the ION in the morning and RSNOG in the afternoon. The stream will be embedded on the conference main page, right above the agenda, here (Serbian) and here (English).
IPv6 Tutorial
Jordi Palet Martinez will conduct an IPv6 training session the day before the ION. Continue reading
Revenue from the company's core business of routers and switches declined 4 percent.
In late June I wrote Security Here I Come! The transition wasn’t quite as fast as I thought it would be. But for the past couple months I’ve been able to really start digging in.
My initial response after watching just 2 CiscoLive VoDs? FEAR!
I really enjoyed these sessions a great deal!! They were the absolute perfect eye-opener to me!
Neil Lovering had the “Verizon Data Breach Report” in his slides (below).
Its funny because I have seen it before. To be completely honest I have seen it quite a number of times. But it was just something about how he presented it. He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us. I paused the VoD on this slide…. paused it and just really took the time to take it all in.
My reaction to this slide? Lol. This is when the fear began. Two simple facts on the Continue reading