Cisco Security Report: 34% of Service Providers Lost Revenue from Attacks
Beware of destruction of service (DeOS) attacks.
Beware of destruction of service (DeOS) attacks.
Risk Management in Submarine Cable System Submarine networks carry over 99% of the world’s Intercontinental electronic communications traffic. There is misconception that Satellites carry data from continent to continent. If we ask anyone in the world, 95% of people give answer as satellites carry international traffic. This is absolutely wrong. The Internet, International […]
The post Risk Management in Submarine Cable Systems appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Hi folks, one of the many things that I’ve been working on behind the scenes has finally seen the light of day: Best Practices for Red Hat Virtualization 4. This takes over where the product documentation leaves off.What I mean by that is this:
The product documentation is (mostly) great about telling you “how” to do the many activities related to deploying Red Hat Virtualization.
This new document tells you “why” to do many of the activities related to deploying Red Hat Virtualization. It does NOT have code examples, but it DOES have lots of things to consider. Things like:
In other words, when you go to plan out your deployment, this is the document that you want to read before you paint yourself into a corner. Many of the items are best practices, like “don’t turn off SELinux”. Others are more considerations and implications, like “NAS or SAN”.
If this is something you’re interested in, you can download it here:
Best Practices for Red Hat Virtualization 4
Hope this helps,
Captain KVM
The post Best Practices for RHV Continue reading
Anycasting IP space has become quite a meme in the networking world in the last few years, with it being used sparsely in the past for UDP based services like DNS. Now it’s being used for TCP based services too,
The post Worth Reading: Identifying Intrusive Apps appeared first on rule 11 reader.
Quieter week as I'm travelling
The post IETF 99 Prague This Week appeared first on EtherealMind.
See how to configure a Cisco switch using Paramiko, a Python implementation of Secure Shell v2.
Digital transformation depends on the speed and agility provided by API-based ecosystems of cloud and DevOps.
Finally a group of engineers figured out it’s a good idea to make things less complex instead of heaping layers of complexity on top of already-complex kludges.
RFC 8196 specifies default values and extensions to IS-IS that make it a true plug-and-play routing protocol. I wonder when we’ll see it implemented now that everyone is obsessed with intent-based hype.
Report suggests a significant 5G backhaul market for optical networking.
Citrix, Netflix, Nike, Samsung, and Coca-Cola are customers.
Several SD-WAN vendors have joined MEF.
The governing board will provide leadership on the code and technical direction.