Episode 6 – What I Wish I Had Known

In this episode of Network Collective, the panel takes some time to acknowledge some of the lessons they have learned along the way, and share what from them they wish they had known when they were starting out. Topics range from mentorship, study, technical specialization, job selection, and more. Guest for this episode are Daniel Dib, Denise Donohue, Lindsay Hill, and Mathew Norwood.


Denise Donohue
Guest
Matthew Norwood
Guest
Lindsay Hill
Guest
Daniel Dib
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 6 – What I Wish I Had Known appeared first on Network Collective.

Episode 6 – What I Wish I Had Known

In this episode of Network Collective, the panel takes some time to acknowledge some of the lessons they have learned along the way, and share what from them they wish they had known when they were starting out. Topics range from mentorship, study, technical specialization, job selection, and more. Guest for this episode are Daniel Dib, Denise Donohue, Lindsay Hill, and Mathew Norwood.


Denise Donohue
Guest
Matthew Norwood
Guest
Lindsay Hill
Guest
Daniel Dib
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 6 – What I Wish I Had Known appeared first on Network Collective.

OpenVPN 2.3.17 on OpenBSD 6.0

On Jun 21, the OpenVPN team released an update for the 2.3.x and 2.4.x branches that resolved some newly discovered security vulnerabilities. The OpenVPN team recommends that users “upgrade to OpenVPN 2.4.3 or 2.3.17 as soon as possible". OpenBSD 6.0-which was released Sep 1 2016 and is still receiving security updates to the base system as per OpenBSD's policy-shipped with a package for OpenVPN 2.3.11. Below you will find a patch and instructions for using the ports system to upgrade to version 2.

Your Docker Agenda for Cisco Live 2017 – Booth #2900B

The Docker team is headed to Las Vegas next week for Cisco Live – visit our booth #2900B to learn more about Docker Enterprise Edition and our integration with Cisco UCS, Contiv and the Cisco Validated Designs available for modern container deployments at enterprise scale. Docker and Cisco formed a partnership earlier this year to bring validated and supported solutions for the enterprise.

Docker at Cisco Live

Whether you are containerizing legacy apps to accelerate datacenter refresh or planning your first microservices application, Docker and Cisco deliver integrated solutions that have been tested to perform at scale – up to thousands of containers.

Add these Docker sessions to your schedule:

Tuesday, Jun 27, 1:20 pm – 1:30pm | Cloud Education Zone 
Title: Maximize ROI by Modernizing Traditional Apps with Docker and Cisco 

Tuesday, Jun 27, 3:30 pm – 4:30 pm | Level 3, South Seas A
Title: Containers and Microservices to Accelerate your Digital Business
Session ID: PSOCLD-1225
Learn how the Cisco Datacenter and Cloud portfolio and Docker Enterprise Edition are modernizing traditional apps and delivering new microservices to enable digital transformation in the enterprise.

Thursday, Jun 29, 12:40 pm – 12:50 pm | Datacenter & Cloud Education Zone
Title: Docker Enterprise Edition Continue reading

Trend: Colocation facilities provide tools to manage data center infrastructure

Enterprises understand the advantages of colocation, but they also know that entrusting mission-critical infrastructure to third-party data centers means giving up some control over their servers.Data center Infrastructure Management (DCIM) tools can provide colocation customers with transparency into their data center's operations, to verify that providers are fulfilling the terms of their Service Level Agreements. A DCIM platform gives customers a "single pane of glass" to view the status of their IT infrastructure."Today, more colocation providers are offering their customers access to DCIM portals," explains Rhonda Ascierto, Research Director for Data centers and Critical Infrastructure at 451 Research. "Customers want to see how well a colocation facility is operating, not just rely on the SLA. A DCIM tool gives the customer visibility into data center operations, and assurance that the colocation provider is meeting their obligations."To read this article in full or to leave a comment, please click here

Trend: Colocation facilities provide tools to manage data center infrastructure

Enterprises understand the advantages of colocation, but they also know that entrusting mission-critical infrastructure to third-party data centers means giving up some control over their servers.Data center Infrastructure Management (DCIM) tools can provide colocation customers with transparency into their data center's operations, to verify that providers are fulfilling the terms of their Service Level Agreements. A DCIM platform gives customers a "single pane of glass" to view the status of their IT infrastructure."Today, more colocation providers are offering their customers access to DCIM portals," explains Rhonda Ascierto, Research Director for Data centers and Critical Infrastructure at 451 Research. "Customers want to see how well a colocation facility is operating, not just rely on the SLA. A DCIM tool gives the customer visibility into data center operations, and assurance that the colocation provider is meeting their obligations."To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

Casing The HPC Market Is Hard, And Getting Harder

Markets are always changing. Sometimes information technology is replaced by a new thing, and sometimes it morphs from one thing to another so gradually that is just becomes computing or networking or storage as we know it. For instance, in the broadest sense, all infrastructure will be cloudy, even if it is bare metal machines or those using containers or heavier server virtualization. In a similar way, in the future all high performance computing may largely be a kind of artificial intelligence, bearing little resemblance to the crunch-heavy simulations we are used to.

It has taken two decades for cloud

Casing The HPC Market Is Hard, And Getting Harder was written by Timothy Prickett Morgan at The Next Platform.

Subscription Defined Networking

Cisco’s big announcement this week ahead of Cisco Live was their new Intent-based Networking push. This new portfolio does include new switching platforms in the guise of the Catalyst 9000 series, but the majority of the innovation is coming in the software layer. Articles released so far tout the ability of the network to sense context, provide additional security based on advanced heuristics, and more. But the one thing that seems to be getting little publicity is the way you’re going to be paying for software going forward.

The Bottom Line

Cisco licensing has always been an all-or-nothing affair for the most part. You buy a switch and you have two options – basic L2 switching or everything the switch supports. Routers are similar. Through the early 15.x releases, Cisco routers could be loaded with an advanced image that ran every service imaginable. Those early 15.x releases gave us some attempts at role-based licensing for packet, voice, and security device routers. However, those efforts were rolled back due to customer response.

Shockingly, voice licensing has been the most progressive part of Cisco’s licensing model for a while now. CallManager 4.x didn’t even bother. Hook things up and Continue reading