Samsung enters the cloud market

For years those who track the cloud computing market have predicted consolidation. The market is young enough, promising enough, and the barriers to entry for companies that want a slice of this market are high enough that mergers and acquisitions are to be expected. Stephen Lawson At its 2016 developer conference in San Francisco this week, the company worked to get developers excited about its software and services as well as its hardware platforms.To read this article in full or to leave a comment, please click here

Gartner on doing business in China: Privacy? What’s that?

Tim Greene Jie Zhang NATIONAL HARBOR, Md. -- Jie Zhang says that as a child in China she played a game picking up marbles with chopsticks and performing the delicate task of carrying them to another room without dropping them. That’s what doing business in China is like for Westerners, she told a breakfast gathering today at Gartner’s Security and Risk Management Summit.They have to get used to long-standing customs and practices that violate some basic business principles respected outside of China and some new ones that deal specifically with technology.To read this article in full or to leave a comment, please click here

Gartner on doing business in China: Privacy? What’s that?

Tim Greene Jie Zhang NATIONAL HARBOR, Md. -- Jie Zhang says that as a child in China she played a game picking up marbles with chopsticks and performing the delicate task of carrying them to another room without dropping them. That’s what doing business in China is like for Westerners, she told a breakfast gathering today at Gartner’s Security and Risk Management Summit.They have to get used to long-standing customs and practices that violate some basic business principles respected outside of China and some new ones that deal specifically with technology.To read this article in full or to leave a comment, please click here

Help Docker’s Initiatives to Promote Tech Diversity Including Bump Up at DockerCon

Docker is actively working to improve opportunities for women and underrepresented minorities throughout the global ecosystem and promote diversity in the larger tech community.

We’re proud to have contributed close to $100,000 in sponsorships, scholarships and complementary tickets to DockerCon. In addition to these funds, the Docker Team has launched and supports several ongoing initiatives with like-minded partners. Continue reading

Cisco Tetration: The timing is right for Cisco to jump into analytics

Cisco has always been a master at picking the right adjacent markets to move into at the right time, and it often becomes one of the leaders in that space. Think of the impact the company has had in telephony, blade servers and security—to name just a few.This week at an event with a lot of pomp and circumstance that included CEO Chuck Robbins, Cisco announced it is moving into the analytics market. At first glance, one might ask what the heck Cisco is doing in analytics.The timing for Cisco is right, though. Many of the building blocks of the digital enterprise—technologies such as Internet of Things, cloud computing, mobility and security are network centric today. By harnessing network data, Cisco can provide data and insights that another vendor could not. To read this article in full or to leave a comment, please click here

Cisco Tetration: The timing is right for Cisco to jump into analytics

Cisco has always been a master at picking the right adjacent markets to move into at the right time, and it often becomes one of the leaders in that space. Think of the impact the company has had in telephony, blade servers and security—to name just a few.This week at an event with a lot of pomp and circumstance that included CEO Chuck Robbins, Cisco announced it is moving into the analytics market. At first glance, one might ask what the heck Cisco is doing in analytics.The timing for Cisco is right, though. Many of the building blocks of the digital enterprise—technologies such as Internet of Things, cloud computing, mobility and security are network centric today. By harnessing network data, Cisco can provide data and insights that another vendor could not. To read this article in full or to leave a comment, please click here

IDG Contributor Network: 4 things you can do on a mainframe—without knowing how to use a mainframe

Remember when you got your driver’s license? That was a pretty big day. Now imagine that as the person at the DMV handed you your card, he or she also slipped you permits to operate a boat, drive a motorcycle and fly the Space Shuttle. Sounds crazy, right? Yet it’s happening in the world of mainframes every day thanks to new tools that make it possible to program and manage big iron in just about any language and on any platform. Even five years ago it would have been inconceivable for this to happen. If you wanted to use a mainframe, you had to know COBOL. That’s all fine and good—if you graduated from college in 1978. But what about the next generation of mainframers? How were they supposed to use computers that required users to know a language that wasn’t even taught in most computer science programs anymore?To read this article in full or to leave a comment, please click here

IDG Contributor Network: 4 things you can do on a mainframe—without knowing how to use a mainframe

Remember when you got your driver’s license? That was a pretty big day. Now imagine that as the person at the DMV handed you your card, he or she also slipped you permits to operate a boat, drive a motorcycle and fly the Space Shuttle. Sounds crazy, right? Yet it’s happening in the world of mainframes every day thanks to new tools that make it possible to program and manage big iron in just about any language and on any platform. Even five years ago it would have been inconceivable for this to happen. If you wanted to use a mainframe, you had to know COBOL. That’s all fine and good—if you graduated from college in 1978. But what about the next generation of mainframers? How were they supposed to use computers that required users to know a language that wasn’t even taught in most computer science programs anymore?To read this article in full or to leave a comment, please click here

Basics: Is there always a feasible successor in EIGRP ?

Question : Is there always a feasible successor in EIGRP ? Background: An operational route is passive. If the path is lost, the router examines the topology table to find an FS. If there is an FS, it is placed in the routing table; otherwise, the router queries its neighbors, sending the route into active mode. Answer: There has to […]

The post Basics: Is there always a feasible successor in EIGRP ? appeared first on EtherealMind.

Random Notes From My Third CPOC

I was lucky enough (volunteering for very challenging work is luck, right? ?) to finish my third tour through Cisco CPOC last wcpoceek. CPOC is Cisco’s Customer Proof of Concept facility where customer’s can bring their network design, build it in Cisco’s lab, and beat the hell out of it. CPOC has tons of network and compute gear, all the right testing tools and processes, and excellent work areas that cater to collaborative work and information sharing. It’s also staffed by very senior and experienced engineers.

I know it’s cliche and I know I’m biased because I have an @cisco.com email address, but I’ve truthfully never seen anything like CPOC before. And the customer’s I’ve worked with at CPOC haven’t either. It’s extremely gratifying to take something you built “on paper” and prove that it works; to take it to the next level and work those final kinks out that the paper design just didn’t account for.

If you want more information about CPOC, get in touch with me or leave a comment below. Or ask your Cisco SE (and if they don’t know, have them get in touch with me).

Anyways, on to the point of this Continue reading

Senate panel votes to weaken net neutrality rules

It's the issue that won't die: A Senate committee has voted to weaken the U.S. Federal Communications Commission's net neutrality rules.The Senate Commerce, Science, and Transportation Committee voted Wednesday to approve a bill that would exempt small broadband providers from rules requiring them to provide their customers with information about network performance, network management practices, and other issues.The rules are intended to give broadband customers data about actual speeds, compared to advertised speeds, and potentially controversial congestion management practices.The Senate bill, the Small Business Broadband Deployment Act, would still ensure "meaningful transparency for consumers" because older FCC rules requiring some disclosure of network management practices remain in place, said Senator John Thune, a South Dakota Republican and committee chairman.To read this article in full or to leave a comment, please click here

Senate panel votes to weaken net neutrality rules

It's the issue that won't die: A Senate committee has voted to weaken the U.S. Federal Communications Commission's net neutrality rules.The Senate Commerce, Science, and Transportation Committee voted Wednesday to approve a bill that would exempt small broadband providers from rules requiring them to provide their customers with information about network performance, network management practices, and other issues.The rules are intended to give broadband customers data about actual speeds, compared to advertised speeds, and potentially controversial congestion management practices.The Senate bill, the Small Business Broadband Deployment Act, would still ensure "meaningful transparency for consumers" because older FCC rules requiring some disclosure of network management practices remain in place, said Senator John Thune, a South Dakota Republican and committee chairman.To read this article in full or to leave a comment, please click here

Facebook, Google, Twitter sued by father of Paris terror victim

The use of social networks like Facebook, Twitter and Google’s YouTube by terrorist groups for propaganda, recruitment, fundraising and other activities has come into sharp focus recently. It seemed inevitable that these companies would at some point be blamed for the misuse of these forums and become targets of lawsuits from families of victims. A lawsuit filed in a federal court in California by the father of Nohemi Gonzalez, a victim of the Paris terror attack in November, charges that Twitter, Facebook and Google “have knowingly permitted the terrorist group ISIS [Islamic State group] to use their social networks as a tool for spreading extremist propaganda, raising funds and attracting new recruits.”To read this article in full or to leave a comment, please click here

Hack the hackers: Eavesdrop for intel on emerging threats

In a sea of vulnerabilities clamoring for attention, it’s almost impossible to know which IT security issues to address first. Vendor advisories provide a tried-and-true means for keeping on top of known attack vectors. But there’s a more expedient option: Eavesdrop on attackers themselves. Given their increasingly large attack surfaces, most organizations tie their vulnerability management cycle to vendor announcements. But initial disclosure of security vulnerabilities doesn’t always come from vendors, and waiting for official announcements can put you days, or even weeks, behind attackers, who discuss and share tutorials within hours of a vulnerability becoming known.To read this article in full or to leave a comment, please click here(Insider Story)

Hack the hackers: Eavesdrop for intel on emerging threats

In a sea of vulnerabilities clamoring for attention, it’s almost impossible to know which IT security issues to address first. Vendor advisories provide a tried-and-true means for keeping on top of known attack vectors. But there’s a more expedient option: Eavesdrop on attackers themselves.To read this article in full or to leave a comment, please click here(Insider Story)

How to prevent data from leaving with a departing employee

I’ll take thisImage by ThinkstockIt may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.To read this article in full or to leave a comment, please click here

Is open source a clear path to success for new grads?

It's the catch-22 every new college graduate faces when looking for his or her first job: You need experience or a portfolio of completed work to prove your competency to a potential employer, but it's hard to get that tangible proof of your skills without having had a job first.That's one of the major benefits of the open source world, says Heidi Ellis, professor and chair of Computer Science and Information Technology at Western New England University in Springfield, Mass.Ten years ago, as a visiting professor at Trinity College in Hartford, Conn., Ellis challenged her computer science students to use technology to solve some of the logistical and administrative problems than can hamper the effectiveness of humanitarian causes.To read this article in full or to leave a comment, please click here

The Case of the Failed IPv6 Ping – Part 2: The Solution

Put your detective hat on your head and your Network Detective badge on your lapel.   It is time to SOLVE for the Case of the Failed IPv6 Ping.

Review the Facts and Clues Again

Let’s review where we left off in our Part 1 of this case — “Case of the Failed IPv6 Ping – Part1: Facts and Clues“.  At the end of Part 1…..we were ON R1 and unable to ping the IPv6 address of our directly connected interface gig0/0/3, 2001:db8:14:1::1.

R1_only

As you recall the facts were as below. Interface up/up, OSPFv3 configured properly, proper IPv6 address configured on interface gig0/0/3.  Still, we cannot ping R1’s directly connected IPv6 address from anywhere including from R1 itself.

2nd_checkList_59523931

Totally confused.  Time to just stare at the list above, absorb the oddness, and think.

Wait one second!!!! “No valid route for destination” ???   Even the ping from R1 said that?

pingR1_2

That can’t be true“, I think to myself while I type show ipv6 route connected.

showipv6routeconnected

What the????….. Why don’t I have R1’s gig0/0/3 interface in the routing table? It is up/up and with the proper IPv6 address configured.  Now Continue reading