6 IoT skills that will future-proof your career

What can you do to ensure your technical skills remain relevant and in demand even as technology evolves?For years, I've suggested that sysadmins and other technology professionals who want to stay ahead of the curve focus on: Developing skills for the next wave of technology innovations Routinely picking up some in-demand skills Investing some of their time in side projects that may not pay off right away While that still seems to be excellent advice, it appears a specific focus on the Internet of Things (IoT) should be added to the list. Earlier this year, Gartner predicted that 20.4 billion IoT devices will be connecting in 2020. That's just over two years from now, and that's a lot of devices. Srini Vemula, global product management leader at SenecaGlobal, believes this influx of new IoT devices will lead to tens of thousands of new jobs in the IoT economy.To read this article in full or to leave a comment, please click here

Future-proofing your career with IoT

What can you do to ensure your technical skills remain relevant and in demand even as technology evolves?For years, I've been suggesting that sysadmins and other technology professionals who want to stay ahead of the curve focus on: developing skills for the next wave of technology innovations routinely picking up some in-demand skills investing some of their time in side projects that may not pay off right away While this still seems to be excellent advice, it appears that a specific focus on IoT should be added to the list. Earlier this year, Gartner predicted that 20.4 billion IoT devices will be connecting in 2020. That's just over two years from now and that's a lot of devices. Srini Vemula, global product management leader at SenecaGlobal, believes that this influx of new IoT devices will lead to tens of thousands of new jobs in the IoT economy.To read this article in full or to leave a comment, please click here

Good to Great: Hallmarks of High-Tech Leadership

You are probably expecting me to write another monthly blog on exciting innovative technology. Today I digress and reflect on recent awards and accolades Arista has received and how we got here. At Arista, we have worked very hard to become a great company. Building a good company takes constant hard work and heavy lifting. Making a great company is an even harder work-in-progress, demanding tenacity, especially in high technology, where disruptions are daunting and challenges are frequent. 

Good to Great: Hallmarks of High-Tech Leadership

You are probably expecting me to write another monthly blog on exciting innovative technology. Today I digress and reflect on recent awards and accolades Arista has received and how we got here. At Arista, we have worked very hard to become a great company. Building a good company takes constant hard work and heavy lifting. Making a great company is an even harder work-in-progress, demanding tenacity, especially in high technology, where disruptions are daunting and challenges are frequent. 

Some Yubikeys Affected by Infineon Security Weakness

As Robin Wilton discussed a few days ago in Roca: Encryption Vulnerability and What to do About It, yet another security vulnerability has been discovered. If you have one of the ISOC-branded Yubikey 4s that we have given out at some conferences, they were affected by the recently disclosed Infineon vulnerability. See these two links for details:

This issue impacts only some limited uses of the keys. For details, see
https://www.yubico.com/keycheck/functionality_assessment.

You can get your ISOC-branded Yubikey 4 replaced at no cost to you by going to this page and following the instructions.

If you have questions or concerns, please contact Steve Olshansky, Internet Technology Program Manager, at <[email protected]>.

The post Some Yubikeys Affected by Infineon Security Weakness appeared first on Internet Society.

For Google Networks, Predictable Latency Trumps Everything

If you want to build infrastructure that scales larger than a single image of a server and an operating system, you have no choice but to network together multiple machines. And so, the network becomes a kind of hyper backplane between compute elements and, in many cases, also a kind of virtual peripheral bus for things like disk and flash storage. From the outside, a warehouse-scale computer, as Google has been calling them for nearly a decade, is meant to look and behave like one machine even if it most certainly is not.

It is hard to quantify how

For Google Networks, Predictable Latency Trumps Everything was written by Timothy Prickett Morgan at The Next Platform.

A Sublime Text Keymap for Bracketeer

I’ve made no secret of the fact that I’m a fan of Sublime Text (ST). I’ve evaluated other editors, like Atom, but still find that ST offers the right blend of performance, functionality, customizability, and cross-platform support. One nice thing about ST (other editors have this too) is the ability to extend it via packages. Bracketeer is one of many packages that can be used to customize ST’s behavior; in this post, I’d like to share a keymap I’m using with Bracketeer that I’ve found very helpful.

Bracketeer is a package that modifies ST’s default bracketing behavior. I first started using Bracketeer to help with writing Markdown documents, as it makes adding brackets (or parentheses) around existing text easier (it automatically advances the insertion point after the closing bracket). After using Bracketeer for a little while, I realized I could extend the keymap for Bracketeer to have it also help me with “wrapping” text in backticks and a few other characters. I did this by adding this line to the default keymap:

{
  "keys": [ "`" ],
  "command": "bracketeer",
  "args": {
    "braces": "``",
    "pressed": "`"
  }
}

With this line in the keymap, I could select some text, press Continue reading

Blockchain poised to disrupt traditional retail operations

The demise of retail grocery stores might be just around the corner.The founders of Russian grocery delivery company Instamart claim to have signed non-binding memoranda with consumer goods giant Unilever, major Dutch dairy co-op FrieslandCampina, and U.S. food products manufacturer Mars, among others. INS’s objective is to build a blockchain-based food-supply network to connect manufacturers with consumers — thus bypassing retailers and wholesalers altogether. Massive consumer price cuts are promised.Also on Network World: Blockchain: You’ve got questions; we’ve got answers “INS is a decentralized ecosystem that enables consumers to buy directly from grocery manufacturers, bypassing retailers and wholesalers, at prices up to 30 percent lower than in supermarkets,” the company says in its press release. The firm will be releasing a token sale at the end of this month — the first stage of its launch planned for Q4 2018.To read this article in full or to leave a comment, please click here

VMware jumps into SD-WAN with VeloCloud purchase

VMware today announced plans to acquire VeloCloud, one of the leading companies in the fast-growing software-defined Wide Area Network (SD-WAN) market.SD-WAN represents a new way to manage network connectivity to branch and remote offices using software-defined networking principles. Software-based SD-WAN offerings from companies like VeloCloud can aggregate multiple types of connections, including broadband, MPLS and cellular, to create more reliable connections that are often less expensive than a pure MPLS use. Research firm IDC predicts SD-WAN will be a more than $1 billion market this year, and grow at 69% to more than $8 billion by 2021.To read this article in full or to leave a comment, please click here

VMware jumps into SD-WAN with VeloCloud purchase

VMware today announced plans to acquire VeloCloud, one of the leading companies in the fast-growing software-defined Wide Area Network (SD-WAN) market.SD-WAN represents a new way to manage network connectivity to branch and remote offices using software-defined networking principles. Software-based SD-WAN offerings from companies like VeloCloud can aggregate multiple types of connections, including broadband, MPLS and cellular, to create more reliable connections that are often less expensive than a pure MPLS use. Research firm IDC predicts SD-WAN will be a more than $1 billion market this year, and grow at 69% to more than $8 billion by 2021.To read this article in full or to leave a comment, please click here

Fortinet Next Generation Firewalls : Fortinet 5000 Series Firewalls

Today I am going to talk about Fortinet Next Generation Firewalls. As i already wrote many articles on Next Generation firewalls. Below are some of the links of other vendors describing Next Generation Firewalls


Above are some of the articles i wrote about Firewalls on different vendors which includes Cisco, Sophos, Checkpoint, Symantec, Meraki and Palo-Alto.

Now I am going to talk about the Fortinet Next Generation Firewalls.

Fortinet Next Generation Firewalls
The Fort iGATE High-end series of Data Center and Next-Gen Firewalls deliver all the top-rated security effectiveness you expect from Fortinet, in an ultra-low latency compact appliance and flexible chassis platform. 
Fig 1.1- Fortigate Next Generation Firewalls


Purpose built Forti-ASIC processors and FortiOS, delivers exceptional throughput and enables security, scalability, flexibility and manageability you demand for data center edge Continue reading

Reaction: Enabling Privacy is not Harmful

The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative. What is the line of argument? According to a recent article in CircleID, it seems to be something like this:

  • Governments have a right to asymmetrical encryption capabilities in order to maintain order. In other words, governments have the right to ensure that all private communication is ultimately readable by the government for any lawful purpose.
  • Standards bodies that enable end-to-end encryption that will prevent this absolute governmental good endanger society. The leaders of such standards bodies may, in fact, be prosecuted for their role in subverting government power.

The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order?

Let me begin here: this is not just a technical issue. There are two opposing worldviews in play. Engineers don’t often study worldviews, or philosophy, so these questions tend to get buried in Continue reading

MINIX — The most popular OS in the world, thanks to Intel

Take a look at your desktop computer. What operating system is it currently running? Now take a look in your data center — at all of your servers. What operating system are they running? Linux? Microsoft Windows? Mac OS X? You could be running any of those three — or one of countless others. But here’s the crazy part: That’s not the only operating system you’re running. If you have a modern Intel CPU (released in the last few years) with Intel’s Management Engine built in, you’ve got another complete operating system running that you might not have had any clue was in there: MINIX. To read this article in full or to leave a comment, please click here

MINIX — The most popular OS in the world, thanks to Intel

Take a look at your desktop computer. What operating system is it currently running? Now take a look in your data center — at all of your servers. What operating system are they running? Linux? Microsoft Windows? Mac OS X? You could be running any of those three — or one of countless others. But here’s the crazy part: That’s not the only operating system you’re running. If you have a modern Intel CPU (released in the last few years) with Intel’s Management Engine built in, you’ve got another complete operating system running that you might not have had any clue was in there: MINIX. To read this article in full or to leave a comment, please click here