2 reasons to migrate off of Microsoft Exchange Server

A few weeks back, I wrote that “choosing Microsoft Windows for your organization should get you fired.”It’s a statement that, while certainly a bit on the inflammatory side, I completely stand by—mostly due to the known insecure nature of running Windows as a server operating system.What I didn’t do was give specific examples of what to move your existing Windows-based infrastructure to. Sure, the obvious answer for most SysAdmins is simply “migrate the servers over to Linux.” But what about specific server applications that your organization might already rely upon? That’s a whole other can of worms.To read this article in full or to leave a comment, please click here

2 reasons to migrate off of Microsoft Exchange Server

A few weeks back, I wrote that “choosing Microsoft Windows for your organization should get you fired.”It’s a statement that, while certainly a bit on the inflammatory side, I completely stand by—mostly due to the known insecure nature of running Windows as a server operating system.What I didn’t do was give specific examples of what to move your existing Windows-based infrastructure to. Sure, the obvious answer for most SysAdmins is simply “migrate the servers over to Linux.” But what about specific server applications that your organization might already rely upon? That’s a whole other can of worms.To read this article in full or to leave a comment, please click here

Get $100 off Amazon Echo When You Buy 2 Right Now – Deal Alert

Put 2 Echo devices in your cart and Amazon will credit you back $100 right now, effectively pricing each one at $129.99 vs. the typical $179.99 list price. But you'll have to use a special code at checkout, to activate the discount: ECHO2PACK. Amazon Echo is a hands-free speaker you control with your voice. Echo connects to the Alexa Voice Service to play music, provide information, news, sports scores, weather, and more—instantly. All you have to do is ask. Echo has seven microphones and beam forming technology so it can hear you from across the room—even while music is playing. Echo is also an expertly tuned speaker that can fill any room with 360° immersive sound. When you want to use Echo, just say the wake word “Alexa” and Echo responds instantly. If you have more than one Echo or Echo Dot, Alexa responds intelligently from the Echo you're closest to with ESP (Echo Spatial Perception), so it makes a lot of sense to pick up 2 right now with this discount.  See the Amazon Echo on Amazon.To read this article in full or to leave a comment, please click here

The Trials And Tribulations Of IBM Systems

IBM is a bit of an enigma these days. It has the art – some would say black magic – of financial engineering down pat, and its system engineering is still quite good. Big Blue talks about all of the right things for modern computing platforms, although it speaks a slightly different dialect because the company still thinks that it is the one setting the pace, and therefore coining the terms, rather than chasing markets that others are blazing. And it just can’t seem to grow revenues, even after tens of billions of dollars in acquisitions and internal investments over

The Trials And Tribulations Of IBM Systems was written by Timothy Prickett Morgan at The Next Platform.

Docker Spearheads OCI Release of v1.0 Runtime and Image Format Specifications

Today marks an important milestone for the Open Container Initiative (OCI) with the release of the OCI v1.0 runtime and image specifications – a journey that Docker has been central in driving and navigating over the last two years. It has been our goal to provide low-level standards as building blocks for the community, customers and the broader industry. To understand the significance of this milestone, let’s take a look at the history of Docker’s growth and progress in developing industry-standard container technologies.

The History of Docker Runtime and Image Donations to the OCI

Docker’s image format and container runtime quickly emerged as the de facto standard following its release as an open source project in 2013. We recognized the importance of turning it over to a neutral governance body to fuel innovation and prevent fragmentation in the industry. Working together with a broad group of container technologists and industry leaders, the Open Container Project was formed to create a set of container standards and was launched under the auspices of the Linux Foundation in June 2015 at DockerCon. It became the Open Container Initiative (OCI) as the project evolved that Summer.

Docker contributed runc, a reference implementation for the Continue reading

Demystifying the Open Container Initiative (OCI) Specifications

The Open Container Initiative (OCI) announced the completion of the first versions of the container runtime and image specifications this week. The OCI is an effort under the auspices of the Linux Foundation to develop specifications and standards to support container solutions. A lot of effort has gone into the building of these specifications over the past two years. With that in mind, let’s take a look at some of the myths that have arisen over the past two years.

OCI

Myth #1: The OCI is a replacement for Docker

Standards are important, but they are far from a complete production platform. Take for example, the World Wide Web. It  has evolved over the last 25 years and was built on core dependable standards like TCP/IP, HTTP and HTML. Using TCP/IP as an example, when enterprises coalesced around TCP/IP as a common protocol, it fueled the growth of routers and in particular – Cisco. However, Cisco became a leader in its market by focusing on differentiated features on its routing platform. We believe the parallel exists with the OCI specifications and Docker.

Docker is a complete production platform for developing, distributing, securing and orchestrating container-based solutions. The OCI specification is used Continue reading

Tools for TE with EIGRP

In response to my article about what would cause a directly connected route to be overridden, Matt Love (@showflogi) made a good observation:

What Matt is saying is that longest prefix match (LPM) is a mechanism that can be used to steer traffic around the network in order to meet a technical or business need. This type of traffic steering is called traffic engineering (TE).

LPM refers to how route lookups work on a Layer 3 device: the longest, most-specific match is always chosen. Like I explained in the prior post, if the routing table contains 10.10.10.0/24 and 10.10.10.64/26, the latter route will be used to forward traffic to 10.10.10.100 (as an example) because a /26 is longer (ie, has a longer prefix length) and is therefore more specific. We can use this behavior to direct traffic towards 10.10.10.100 over a specific interface or via a specific path (ie, a path with Continue reading

Nominate a Women Or Girl for an EqualsInTech Award!

Know an amazing woman or girl in tech who’s working for access, skills, or leadership? Why not shine the light on them and nominate them for an EqualsInTech Award!

Equals is an initiative delivered by a committed partnership of ITU, UN Women, GSMA, ITC, and UN University joined by the Internet Society and over 20 corporate leaders, governments, non-profit organizations, communities, and individuals around the world working together to bridge the digital gender divide – by bringing women to tech, and tech to women.

Ms. Joyce Dogniez

Off The Cuff – Engineering In The Enterprise

Is engineering talent disappearing from the enterprise? Our panel thinks so, and has a conversation about the implications for both businesses and individuals. This episode was recorded at Cisco Live 2017 in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Denise Donohue
Guest
Mike Zsiga
Guest
Daniel Dib
Guest
Jeff Fry
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Engineering In The Enterprise appeared first on Network Collective.

Off The Cuff – Engineering In The Enterprise

Is engineering talent disappearing from the enterprise? Our panel thinks so, and has a conversation about the implications for both businesses and individuals. This episode was recorded at Cisco Live 2017 in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Denise Donohue
Guest
Mike Zsiga
Guest
Daniel Dib
Guest
Jeff Fry
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Engineering In The Enterprise appeared first on Network Collective.

Using Geolocation in Firepower Access Control Policies

The use of geolocation is fairly obvious in monitoring networks with Firepower Management Center. What may be less obvious is that Continents and Countries can also be specified as the source or destination of connections in an Access Control Policy. Basically, this geographical information becomes one more match criteria that can be used to identify traffic for a block or allow action.

To get to this capability, open the Access Control Policy that is in use by the Firepower device. Within the policy, open or create an applicable rule. On the network tab (where you configure the source and destination addresses) a Geolocation tab can also be found. Clicking on this tab exposes Continents and Countries. These can be added as sources and/or destinations.

ACPGEO

Note to reader: All Firepower content can be accessed by clicking here (or choosing Firepower from the menu at the top of the page).

As can be seen in the diagram above, I am creating a rule to block traffic to France. Before I save and deploy the policy changes to the device, I will confirm reachability to an IP address that exists in that part of Europe.

Last login: Mon Jul 17 11:48:29 on ttys000
PAULS:~ pauls$  Continue reading

Tools for TE with EIGRP

In response to my article about what would cause a directly connected route to be overridden, Matt Love (@showflogi) made a good observation:

What Matt is saying is that longest prefix match (LPM) is a mechanism that can be used to steer traffic around the network in order to meet a technical or business need. This type of traffic steering is called traffic engineering (TE).

Bluetooth Mesh takes aim at enterprise IoT, but hasn’t taken flight

The mesh networking features introduced to Bluetooth this week are designed to make the technology more appealing for enterprise IoT use. A lot depends, however, on which enterprise use case you’re talking about.Put simply, Bluetooth Mesh is a new technology that lets Bluetooth endpoints form networks among themselves, instead of having a central hub do the processing and sending all the instructions. That’s a big advantage since it overcomes the limited range inherent to the technology – as long as an endpoint is close enough to at least one other endpoint, it’s connected to the rest of the network, too.It’s a big change for the technology, according to Farpoint Group principal and Network World contributor Craig Mathias.To read this article in full or to leave a comment, please click here