IDG Contributor Network: 6 things IT executives must do to accelerate IoT adoption

Are you ready for the Internet of Things (IoT)? Despite its transformational potential, most organizations are not. In an era of rapid disruption and digital transformation, IT executives and managers must lead the charge. You must bridge the gap between technology, business, engineering and operations. You must be evangelists, teachers, facilitators and innovators. To succeed, I’ve listed six things you must do to accelerate IoT adoption within your organization.Increase your organization’s IoT IQ Start the journey by increasing awareness, knowledge and conversations around IoT throughout the organization. This can be done in several ways:To read this article in full or to leave a comment, please click here

The Internet of Things goes to school

It appears research universities are a great place to test Internet of Things (IoT) deployments. That’s because they often comprise a microcosm of a wide variety of organizational and technical environments.Gordon Wishon, CIO of Arizona State University, explained the reasoning to Campus Technology this way:To read this article in full or to leave a comment, please click here

Small Site Multihoming with DHCP and Direct Internet Access

Cisco recently (15.6.3M2 ) resolved CSCve61996, which makes it possible to fail internet access back and forth between two DHCP-managed interfaces in two different front-door VRFs attached to consumer-grade internet service.

Prior to the IOS fix there was a lot of weirdness with route configuration on DHCP interfaces assigned to VRFs.

I'm using a C891F-K9 for this example. The WAN interfaces are Gi0 and Fa8. They're in F-VRF's named ISP_A and ISP_B respectively:


First, create the F-VRFs and configure the interfaces:

 ip vrf ISP_A  
ip vrf ISP_B

interface GigabitEthernet8
ip vrf forwarding ISP_A
ip dhcp client default-router distance 10
ip address dhcp
interface FastEthernet0
ip vrf forwarding ISP_B
ip dhcp client default-router distance 20
ip address dhcp

The distance commands above assign the AD of the DHCP-assigned default route. Without these directives the distance would be 254 in each VRF. They're modified here because we'll be using the distance to select the preferred internet path when both ISPs are available.

Next, let's keep track of whether or not the internet is working via each provider. In this case I'm pinging 8.8.8.8 via both paths, but this health check can be whatever makes sense for your situation. So, Continue reading

Kafka Wakes Up And Is Metamorphosed Into A Database

Sometimes a database is like a collection of wax tablets that you can stack and sort through to update, and these days, sometimes it is more like a river that has a shape defined by its geography but it is constantly changing and flowing and that flow, more than anything else, defines the information that drives the business. There is no time to persist it, organize it, and then query it.

In this case, embedding a database right in that stream makes good sense, and that is precisely what Confluent, the company that has commercialized Apache Kafka, which is a

Kafka Wakes Up And Is Metamorphosed Into A Database was written by Timothy Prickett Morgan at The Next Platform.

Easy data storage services are like fast food

Recently I made the (unfortunate) decision to eat at a particular fast-food establishment. For the sake of this story, let’s call it Shmurger Shming.I didn’t eat at The Shming because the food tastes amazing. Nor did I choose to ingest those Shmurgers because I thought it was, in any way, healthy for me. In fact, I knew full well that eating them would cause not insignificant amounts of gastronomical distress.Which begs the question: Why, on this green Earth, would I make that decision? Why would I do that to myself?Simple. It was convenient, there was very little up-front investment (in time and money), and it was food. Technically. In other words, I was lazy.To read this article in full or to leave a comment, please click here

Easy data storage services are like fast food

Recently I made the (unfortunate) decision to eat at a particular fast-food establishment. For the sake of this story, let’s call it Shmurger Shming.I didn’t eat at The Shming because the food tastes amazing. Nor did I choose to ingest those Shmurgers because I thought it was, in any way, healthy for me. In fact, I knew full well that eating them would cause not insignificant amounts of gastronomical distress.Which begs the question: Why, on this green Earth, would I make that decision? Why would I do that to myself?Simple. It was convenient, there was very little up-front investment (in time and money), and it was food. Technically. In other words, I was lazy.To read this article in full or to leave a comment, please click here

History Of Networking – Juliusz Chroboczek – Babel Routing Protocol

Babel is a relatively new routing protocol when compared to some of the more well established options, but due to some of its design considerations, it is very well suited for routing on distributed mesh networks. Babel’s creator, Juliusz Chroboczek, joins the Network Collective team in discussing how Babel came about, some of the design decisions when creating it, and what the future looks like for this emerging technology.


Juliusz Chroboczek
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Juliusz Chroboczek – Babel Routing Protocol appeared first on Network Collective.

History Of Networking – Juliusz Chroboczek – Babel Routing Protocol

Babel is a relatively new routing protocol when compared to some of the more well established options, but due to some of its design considerations, it is very well suited for routing on distributed mesh networks. Babel’s creator, Juliusz Chroboczek, joins the Network Collective team in discussing how Babel came about, some of the design decisions when creating it, and what the future looks like for this emerging technology.


Juliusz Chroboczek
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Juliusz Chroboczek – Babel Routing Protocol appeared first on Network Collective.

Cisco’s IWAN isn’t dead

Earlier this month, Cisco completed the acquisition of SD-WAN vendor Viptela, which it had announced in early May.The companies’ recent news sparked several rumors about the fate of Cisco’s Intelligent WAN (IWAN), with publications writing such articles as “Is the End Near for Cisco’s IWAN?” and “Cisco’s Viptela acquisition could mean IWAN is dying or dead.” The content of the articles isn’t quite as aggressive as the headlines, but the articles have led to a number of misconceptions about what Cisco will do with its SD-WAN solution.To read this article in full or to leave a comment, please click here

Cisco’s IWAN isn’t dead

Earlier this month, Cisco completed the acquisition of SD-WAN vendor Viptela, which it had announced in early May.The companies’ recent news sparked several rumors about the fate of Cisco’s Intelligent WAN (IWAN), with publications writing such articles as “Is the End Near for Cisco’s IWAN?” and “Cisco’s Viptela acquisition could mean IWAN is dying or dead.” The content of the articles isn’t quite as aggressive as the headlines, but the articles have led to a number of misconceptions about what Cisco will do with its SD-WAN solution.To read this article in full or to leave a comment, please click here

38% off Dishonored 2 for XBox One, PS4 and PC – Deal Alert

Play your way in a world where mysticism and industry collide. Will you choose to play as Empress Emily Kaldwin or the royal protector, Corvo Attano? Will you make your way through the game unseen, make full use of its brutal combat system, or use a blend of both? How will you combine your character's unique set of powers, weapons and gadgets to eliminate your enemies? The story responds to your choices, leading to intriguing outcomes, as you play through each of the game's hand-crafted missions. Right now Dishonored 2 is discounted 38% down to $24.99, for the XBOX One, PS4 and PC versions. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Connected IoT is about to become cognitive IoT

Connected devices, also known as the Internet of Things (IoT), will transition to cognitive, predictive computing over the next 12 to 18 months, according to research firm Frost & Sullivan. IoT, overall, is also about to grow rapidly, the firm says. It predicts a 20.3% Compound Annual Growth Rate (CAGR) worldwide leading up to the year 2023. That will be a jump to 45.3 billion devices, up from 12.4 billion IoT devices in 2016, it claims.Cognitive computing, which is when a machine is programmed to simulate human thought processes, will partly drive that growth, along with further microelectronics development and “ubiquitous connectivity,” says Frost & Sullivan, a research and consulting firm that specializes in business disruption.To read this article in full or to leave a comment, please click here

IS-IS Overload Bit – Why IS-IS Overload bit is used ? What are the use cases ?

IS-IS Overload Bit – Why IS-IS Overload bit is used ? What are the use cases ?  In this post, I will explain the Overload bit which is an important feature of IS-IS routing protocol.   When a router which runs an IS-IS routing protocol have resource issue (CPU, Memory), device shouldn’t receive network traffic. […]

The post IS-IS Overload Bit – Why IS-IS Overload bit is used ? What are the use cases ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: How IoT data exchange services will impact IoT development

While the rapid development of the Internet of Things (IoT) has many investors and innovators enamored with hardware development so they can churn out millions of their own IoT-connected devices, wise industry insiders are uncovering the true IoT goldmine: data exchange services. Data sharing, exchanging and selling is rapidly coming to define the IoT market more than anything else, and investors are quickly hopping on board to cash in on this new phenomenon.So how exactly are the industry leaders of tomorrow tapping into data exchange services to fuel their success? How will recent developments in data exchange services impact IoT development, and what steps should sensible IoT developers take now to capitalize on them?To read this article in full or to leave a comment, please click here

IDG Contributor Network: How IoT data exchange services will impact IoT development

While the rapid development of the Internet of Things (IoT) has many investors and innovators enamored with hardware development so they can churn out millions of their own IoT-connected devices, wise industry insiders are uncovering the true IoT goldmine: data exchange services. Data sharing, exchanging and selling is rapidly coming to define the IoT market more than anything else, and investors are quickly hopping on board to cash in on this new phenomenon.So how exactly are the industry leaders of tomorrow tapping into data exchange services to fuel their success? How will recent developments in data exchange services impact IoT development, and what steps should sensible IoT developers take now to capitalize on them?To read this article in full or to leave a comment, please click here

A Brief Look at VMware’s Three Cloud Approaches

I’m at VMworld 2017 this week (obviously, based on my tweets and blog posts), and in the general sessions Monday and yesterday VMware made a big deal about how VMware is approaching cloud computing and cloud services. However, as I’ve been talking to other attendees, it’s become clear to me that many people don’t understand the three-pronged approach VMware is taking.

I should start out by saying that this post hasn’t been officially reviewed by VMware (none of my stuff is) and may not align with the “approved” marketing approach, so keep that in mind. This is just me speaking.

As I see it, the three cloud approaches are as follows:

  1. Private cloud
  2. VMware Cloud on AWS
  3. VMware Cloud Services for native cloud workloads

The first option (private cloud) is, I think, pretty much self-explanatory. VMware is offering VMware Cloud Foundation to help streamline some of the infrastructure management in this space, and then the VMware SDDC stack (vSphere, vSAN, and NSX) are layered on top. Couple that with a cloud management platform/automation platform such as OpenStack (VIO would be a good option) or vRealize Automation, and you have a private cloud. (I’m glossing over a few details, but you Continue reading

Automation Tools in Building Network Automation Solutions Online Course

A network engineer interested in attending the Building Network Automation Solutions online course sent me this question:

Does the course cover only Ansible, or does it also cover other automation tools like Python?

The course focuses on how you’d build a network automation solution. Selecting the best tool for the job is obviously one of the major challenges, and so one of the self-study modules describes various automation tools and where you could use them to build a full-blown solution.

Read more ...