The Week in Internet News: Your Doorbell is Spying on You

We’ve got our eyes on you: Ring, the Amazon-owned, IoT-powered video doorbell and security system vendor, has partnered with 400 police departments across the U.S. and is providing them with video footage, the Washington Post reports. Privacy advocates have raised concerns, saying the partnerships could subject innocent people, including those who Ring users have flagged as “suspicious,” to greater surveillance.

We’re listening, too: Meanwhile, Apple has apologized for some of its contractors listening in to recordings of customer’s interactions with the Siri digital assistant, Fox Business News says. Apple had been using the recordings for quality control, but the practice was not in line with Apple’s “high ideals,” the company said.

Also, the apps: Google has pulled a popular file-scanning app, CamSpanner, from the Google Play store, after reports that it contains malware, CNN reports. Researchers Kaspersky had found several negative reviews on the app’s profile that complained the app had the “presence of unwanted features.” The malware could show “intrusive advertising” to users.

Internet spycraft: China and other nations are using popular networking site LinkedIn to recruit spies in Western nations, the New York Times reports. One former foreign policy official in U.S. President Barack Obama’s Continue reading

Day Two Cloud 017: Grappling With Multi-Cloud’s Operational Implications

More and more organizations are adopting “multi-cloud" strategies. Some do it as a hedge against cloud system failures, others as a competitive cudgel. Day Two Cloud looks at the business, technical, and process implications with guest Alex Neihaus, a cloud infrastructure architect.

The post Day Two Cloud 017: Grappling With Multi-Cloud’s Operational Implications appeared first on Packet Pushers.

What is Optimal Routing and Suboptimal Routing in Networking

What is Optimal Routing and Suboptimal Routing in Networking? This may be seen very easy for some of you but let’s make a philosophy a little bit, means let’s design around optimal routing.  Network engineers know that one of the tradeoff in network design is Optimal Routing. We want our application traffic to follow Optimal …

The post What is Optimal Routing and Suboptimal Routing in Networking appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Recommended Resources for September 2019 First Week

I would like to share with you every week some networking resources , can be video , article , book , diagram , another website etc. Whatever I believe can be useful for the computer network engineers, mobile network providers, satellite engineers ,transmission experts, datacenter engineers,  basically whatever I am interested in and I like, …

The post Recommended Resources for September 2019 First Week appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

BGP Optimal Route Reflection – BGP ORR

BGP Optimal Route Reflection provides Optimal Routing for the Route Reflector Clients without sending all available paths.  I recommend you to read this post if you don’t know about BGP Route Reflector. If you are looking to learn BGP starting from Zero to Hero, Click Here.  Service Providers mostly prefers Hot Potato Routing in their …

The post BGP Optimal Route Reflection – BGP ORR appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

SLOG: serializable, low-latency, geo-replicated transactions

SLOG: serializable, low-latency, geo-replicated transactions Ren et al., VLDB’19

SLOG is another research system motivated by the needs of the application developer (aka, user!). Building correct applications is much easier when the system provides strict serializability guarantees.

Strict serializability reduces application code complexity and bugs, since it behaves like a system that is running on a single machine processing transactions sequentially.

The challenge with strict serializability (or even just serializability on a regular DBMS) is that it requires coordination, and as we know, coordination kills performance. Weaker consistency models can give better performance yet “expose applications to potential race condition bugs, and typically require skilled application programmers.” But developers are the kingmakers (I think it’s been enough time now that we can drop the ‘new’ in that phrase?? ;) ), and thus:

… the demand for systems that support strict serializability has only increased.

So starting with strict serializability as a given, how do we claw back some of that performance? That’s where SLOG (Serializable LOw-latency, Geo-replicated transactions) comes in.

SLOG achieves high throughput, strictly serializable ACID transactions at geo-replicated scale for all transactions submitted across the world, all the while achieving low latency for transactions Continue reading

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

Operators Dish on 5G Strategies for Enterprise

5G heralds a new framework for mobile connectivity and has enterprises poised to gain entirely new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Will CCDE Practical Exam (Lab) Change in 2020?

Will CCDE Exam (Lab) change in 2020. I have been receiving this question again and again after Cisco’s announcement on Cisco certification exam changes.  Short answer is NO. Little bit long answer is, it will not change in February 2020 and in fact it has been the only design certification since many years. (Cisco I …

The post Will CCDE Practical Exam (Lab) Change in 2020? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Technologies and the protocols may not be used for what they were intended

I was reading a book today , called Deploying QoS for Cisco IP and NGN networks, which I can recommend you for history and future for QoS in networking industry, there was couple paragraph in the book, which lead me to share my thoughts about the protocols/technologies and their usage.   In the book, as …

The post Technologies and the protocols may not be used for what they were intended appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

AnsibleFest Atlanta – Infrastructure Automation

Blog_AnsibleFest2019-Infrastructure-Automation-Track

 

AnsibleFest is only a few short weeks away and we are excited to share with you all the great content and sessions we have lined up! On the Ansible blog, we have been taking a closer look at each of the breakout session tracks so that attendees can better personalize their AnsibleFest experience. We sat down with Track Lead Dylan Silva to find out more about the Infrastructure Automation Track and sessions within the track.  

 

Who is this track best for? 

This track is best for sysadmins that are looking for information related to general infrastructure automation with Ansible.

 

What topics will this track cover? 

Sessions in this track will cover bare-metal, server administration, and inventory management, among other related topics. There will be a session covering the automation of VMware infrastructure using REST APIs, how to use Ansible against your vSphere environment, how to use Ansible to pull approved firewall change requests from our change management system, and much more. 

 

What should attendees expect to learn from this track? 

Attendees should expect to learn best practices related to infrastructure management. This includes scaling Ansible for loT deployments, taking a closer Continue reading

SDxCentral’s Top 10 Articles — August 2019

HCX, VMware’s Top-Secret Sauce, Comes Out; VMware Buys Veriflow for Network Monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Lanner Joins Forces With Hot OCP Ecosystem

Networking manufacture Lanner, well known for its uCPE and white box appliances, is the latest...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.