Inside a hyperscale data center (how different is it?)

A hyperscale cloud data center looks different from an enterprise data center, or even a large hosting provider. The problems they face are different from the problems you face. And your approach to everything from how you choose a site to how you manage power to how long you keep servers is not their approach.To read this article in full or to leave a comment, please click here(Insider Story)

Inside a hyperscale data center (how different is it?)

A hyperscale cloud data center looks different from an enterprise data center, or even a large hosting provider. The problems they face are different from the problems you face. And your approach to everything from how you choose a site to how you manage power to how long you keep servers is not their approach.To read this article in full or to leave a comment, please click here(Insider Story)

Microsoft: Windows 0-day exposed by Google is being exploited by Russian DNC hackers

Microsoft issued a warning about the APT group most commonly known as “Fancy Bear,” or APT 28, and how it is exploiting the zero-day disclosed by Google on Halloween.Microsoft agreed that the zero-day is being actively exploited and pointed a finger of blame at a hacking group that is believed to be tied to the Russian government; the same group is believed to be responsible for hacks that resulted in data breaches at the Democratic National Committee and the Clinton campaign.Microsoft does not call the APT group “Fancy Bear” as its codename for the threat group is STRONTIUM. Terry Myerson, executive vice president of Microsoft’s Windows and Devices Group, wrote:To read this article in full or to leave a comment, please click here

Microsoft: Windows 0-day exposed by Google is being exploited by Russian DNC hackers

Microsoft issued a warning about the APT group most commonly known as “Fancy Bear,” or APT 28, and how it is exploiting the zero-day disclosed by Google on Halloween.Microsoft agreed that the zero-day is being actively exploited and pointed a finger of blame at a hacking group that is believed to be tied to the Russian government; the same group is believed to be responsible for hacks which resulted in data breaches at the Democratic National Committee and the Clinton campaign.Microsoft does not call the APT group “Fancy Bear” as its codename for the threat group is STRONTIUM. Terry Myerson, executive VP of Microsoft’s Windows and Devices Group, wrote:To read this article in full or to leave a comment, please click here

LinkedIn aims to take the guesswork out of salary negotiations

Discussing salaries at work can be tricky. LinkedIn is trying to take the guesswork out of calculating fair compensation by giving users the ability to view aggregate data about salary trends by profession. The new LinkedIn Salary service will show users of the enterprise social network a graph of the total compensation for a particular title in a particular location. For example, they could look up how much a software engineer makes in New York City. (Spoiler alert: it's a lot of money.) After that, it's possible to further slice and dice the data, to see differences in pay between different industries, levels of education, and even degree field.To read this article in full or to leave a comment, please click here

CCDE In-Depth: The New CCDE Book of Orhan Ergun Is Available

Finally, I have published my new CCDE book titled CCDE In-Depth. The much-awaited book is available in three version: PDF, Kindle and Paperback versions. You can purchase the PDF version directly from this website. And if you need the Kindle and Paperback version, it is available on Amazon. Why This Book Is the Best for CCDE […]

The post CCDE In-Depth: The New CCDE Book of Orhan Ergun Is Available appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

The new MacBook Pro isn’t just a laptop, it’s a strategy shift

There was a time when differentiating between Apple’s pro and consumer lines was easy. Even after Apple stopped painting its entry-level Macs with candy-flavored colors, there was always a clear separation between the machines meant for professionals and the ones for everyone else. They didn’t just look the part, they delivered the power, performance and features the majority of people didn’t need but pros demanded (and could afford).As the first major revision in more than 4 years, Apple’s new notebooks seem to tick off the right boxes. They’re fast. They have improved retina displays. They’re fitted with the latest expansion ports. The 15-incher is powerful enough to drive a pair of 5K displays. And that’s before we get to the svelte and powerful Touch Bar.To read this article in full or to leave a comment, please click here

Cryptography

How Does Internet Work - We know what is networking

If you want to send or store data and be sure it is safe from being intercepted, you will use Cryptography. Cryptography uses chipper as mathematical virtual lock to make data scrambled so that is not understandable if intercepted by unauthorized third parties. There are different cryptography techniques, some of them are: encryption, hashing, and steganography. Cryptography can be differentiated by usage of different key types: Symmetric Key Encryption Asymmetric Key Encryption Symmetric Key Encryption is sometimes known as Secret Key Cryptography. Main characteristic of this type of cryptography is the same key usage in encryption and decryption of transferred

Cryptography

Race issues emerge as a challenge for tech companies like Uber, Facebook

Lawmakers on Tuesday objected to a Facebook feature that allows advertisers to target housing ads to exclude certain racial and ethnic groups from promotions and marketing.In another race-related development that affects tech companies, the National Bureau of Economic Research in Cambridge, Massachusetts, said a study had indicated a pattern of discrimination by drivers of ride hailing apps against both African Americans and women.“We are writing to express our deep concerns with reports that Facebook’s 'Ethnic Affinities' advertising customization feature allows for advertisers to exclude specific racial and ethnic groups when placing housing advertisements,” Congresswoman Robin Kelly, a Democrat from Illinois, G.K. Butterfield, chairman of the Congressional Black Caucus, and two other representatives wrote in a letter to Facebook CEO Mark Zuckerberg.To read this article in full or to leave a comment, please click here

Breaking News: I’m a Vendor Shill

Got this comment on my Network Automation RFP Requirements blog post:

Looks like you are paid shill for Brocade based on the quote earlier in your blog "The Pass/Fail information included below was collected to the best of my knowledge with extensive help from Jason Edelman, Nick Buraglio, David Barroso and several Brocade engineers (THANK YOU!)."

Hooray, one more accolade to add to my list of accomplishments. And now for a few more details:

Read more ...

Novelty seeking and networking

You’re seated in a restaurant you’ve never visited before, and the waiter hands you the menu. As you scan the items, do you look for something familiar you know you’ll like? Or do you want something you’ve never tried before?People respond differently to new situations and opportunities, sometimes with opposite reactions. “Better safe than sorry,” caution some, while others urge, “Nothing ventured, nothing gained.”Such reactions, engrained deep in our temperament, are described by psychologist and neuroscientists as our degree of “novelty seeking.” The trait is associated with positive aspects like curiosity and negative aspects like impulsivity. It follows a normal distribution in the population, and scientific research even suggests a genetic basis, which makes sense considering our species has sought novelty strongly enough to inhabit almost every part of the planet and beyond.To read this article in full or to leave a comment, please click here

Cisco says it’ll make IoT safe because it owns the network

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.“The internet as we know it today, and the network that you operate, will not work for the internet of things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco on Tuesday. “We can solve that problem because we own the network.”To read this article in full or to leave a comment, please click here

Cisco says it’ll make IoT safe because it owns the network

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.“The internet as we know it today, and the network that you operate, will not work for the internet of things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco on Tuesday. “We can solve that problem because we own the network.”To read this article in full or to leave a comment, please click here

Cisco says it’ll make IoT safe because it owns the network

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising greater ease of use and security as enterprises prepare to deploy potentially millions of connected objects.Thanks to a dominant position in Internet Protocol networks, Cisco can do what no other company can: Change networks that were not designed for IoT in order to pave the way for a proliferation of devices, said Rowan Trollope, senior vice president and general manager of the IoT & Applications Group.“The internet as we know it today, and the network that you operate, will not work for the internet of things,” Trollope said in a keynote presentation at the Cisco Partner Summit in San Francisco on Tuesday. “We can solve that problem because we own the network.”To read this article in full or to leave a comment, please click here

Police across the globe crackdown on darknet marketplaces

Law enforcement agencies across the globe staged a crackdown on so-called darknet web sites last week, targeting marchants and thousands of customers who were looking to obtain illegal drugs and goods.From Oct.22 to the 28th, the agencies took action against merchants and customers that used these sites for illicit items, U.S. Immigration and Customs Enforcement said in a statement on Monday.Unlike other websites, these underground marketplaces reside within the darknet -- a sort of parallel internet accessible to visitors via anonymizing software like Tor. While the software has legitimate uses, such as safeguarding communications in authoritarian countries, it has been adopted for more illicit means.To read this article in full or to leave a comment, please click here

Police across the globe crackdown on darknet marketplaces

Law enforcement agencies across the globe staged a crackdown on so-called darknet web sites last week, targeting marchants and thousands of customers who were looking to obtain illegal drugs and goods.From Oct.22 to the 28th, the agencies took action against merchants and customers that used these sites for illicit items, U.S. Immigration and Customs Enforcement said in a statement on Monday.Unlike other websites, these underground marketplaces reside within the darknet -- a sort of parallel internet accessible to visitors via anonymizing software like Tor. While the software has legitimate uses, such as safeguarding communications in authoritarian countries, it has been adopted for more illicit means.To read this article in full or to leave a comment, please click here

Cisco Drives Density With S Series Storage Server

Getting the ratio of compute to storage right is not something that is easy within a single server design. Some workloads are wrestling with either more bits of data or heavier file types (like video), and the amount of capacity required per given unit of compute is much higher than can fit in a standard 2U machine with either a dozen large 3.5-inch drives or two dozen 2.5-inch drives.

To attack these use cases, Cisco Systems is tweaking a storage-dense machine it debuted two years ago, and equipping it with some of the System Link virtualization technologies that it created

Cisco Drives Density With S Series Storage Server was written by Timothy Prickett Morgan at The Next Platform.