Cisco says network spending still hampered by economic jitters

Economic uncertainty is still putting a damper on some network spending, and that won't change in the next few months, Cisco Systems said Wednesday.The dominant networking vendor reported slightly higher sales for the three months ended April 30 but said enterprises remained cautious about replacing LANs that still work. That continues a trend the company identified in February, the last time it posted financial results.MORE ON NETWORK WORLD: 15 more useful Cisco sites At that time, Cisco cited January's stock-market fluctuations. Stocks have regained ground since then, but orders for campus network gear haven’t rebounded, CEO Chuck Robbins said Wednesday. Overall switching revenue was down 3 percent in the quarter.To read this article in full or to leave a comment, please click here

Cisco says network spending still hampered by economic jitters

Economic uncertainty is still putting a damper on some network spending, and that won't change in the next few months, Cisco Systems said Wednesday.The dominant networking vendor reported slightly higher sales for the three months ended April 30 but said enterprises remained cautious about replacing LANs that still work. That continues a trend the company identified in February, the last time it posted financial results.MORE ON NETWORK WORLD: 15 more useful Cisco sites At that time, Cisco cited January's stock-market fluctuations. Stocks have regained ground since then, but orders for campus network gear haven’t rebounded, CEO Chuck Robbins said Wednesday. Overall switching revenue was down 3 percent in the quarter.To read this article in full or to leave a comment, please click here

Beyond Jenkins: 7 devops tools

The need for speed in the software development cycle has given rise to a number of valuable automation tools for developers. Chief among these tools are those aimed at facilitating the continuous integration and continuous delivery of software projects. Through these CI/CD tools, development teams can keep software up-to-date and quickly put it into production.Jenkins is among the best-known CI/CD systems, and it is fast becoming the engine for devops, managing the dev side. A key benefit of Jenkins is the wealth of plug-ins developed for it, providing capabilities that range from extending the number of version control systems Jenkins supports to accommodations for IBM mainframes. Spun out of the Hudson project first launched by Sun Microsystems, Jenkins recently hit Version 2, with improvements to its usability and security.To read this article in full or to leave a comment, please click here

How to monitor, measure, and manage your broadband consumption

Forget that bass; in the digital world, it’s all about that bandwidth. You’re paying your ISP for a given amount of bandwidth, but it’s up to you to manage how it’s consumed. Whether or not you have a data cap—and even if your data cap is high enough that you never bang into it—simply letting all the devices on your network engage in a battle for supremacy is a recipe for problems.You could experience poor video streaming, choppy VoIP calls, or debilitating lag in your online gaming sessions. And if you do have a data cap (and yes, they are evil), blowing through it can hit you in the pocketbook, expose you to throttling (where your ISP drastically, if temporarily, reduces your connection speed), or both.To read this article in full or to leave a comment, please click here

How to monitor, measure, and manage your broadband consumption

Forget that bass; in the digital world, it’s all about that bandwidth. You’re paying your ISP for a given amount of bandwidth, but it’s up to you to manage how it’s consumed. Whether or not you have a data cap—and even if your data cap is high enough that you never bang into it—simply letting all the devices on your network engage in a battle for supremacy is a recipe for problems.You could experience poor video streaming, choppy VoIP calls, or debilitating lag in your online gaming sessions. And if you do have a data cap (and yes, they are evil), blowing through it can hit you in the pocketbook, expose you to throttling (where your ISP drastically, if temporarily, reduces your connection speed), or both.To read this article in full or to leave a comment, please click here

Google dives into the future with a focus on A.I.

MOUNTAIN VIEW, Calif. -- With much of what Google announced during the first day of its I/O developer conference focused on helping users answer questions before they even think of them, artificial intelligence is proving critical for the company's strategy. "Google is betting the farm on artificial intelligence (A.I.) and they need to because Microsoft and Facebook aren't too far behind," said Patrick Moorhead, an analyst with Moor Insights & Strategy. "A.I. will determine the next-generation experience with all electronics. It essentially predicts what users want before they know they do. A.I. is the next big frontier, and Google has always been a pioneer in A.I."To read this article in full or to leave a comment, please click here

Top 10 ways to retain IT security talent

Keep ‘em aroundImage by MilitaryHealthWith the growing number of threats, it's vital for companies to hire — and retain — the best and brightest IT security employees. But, with IT hiring above the national average of 44 percent and the average employee tenure in the IT industry only being three years, employers need to explore new ways to not only attract talent, but avoid burnout and keep that coveted talent around.To read this article in full or to leave a comment, please click here(Insider Story)

No IoT without IPv6

Do you think the Internet of Things (IoT) will be the Next Big Thing? It can’t be. Not until we get past the real Next Big Thing: IPv6.Without the extensive global adoption and successful deployment of IPv6 as the primary version of the Internet Protocol, the IoT won’t be possible. In fact, the future of the Internet itself is at stake. Here are the five reasons why:1. The IoT will need more IP addresses than IPv4 can provide.According to Gartner’s estimate, by 2020 there will be more than 26 billion IoT devices connected to the Internet. Cisco is thinking even bigger; it has projected that there will be more than 50 billion devices connected to the Internet by 2020.To read this article in full or to leave a comment, please click here

How HR can bridge the tech inequality gap

Implementing cutting-edge technology is a concept no longer relegated to IT departments. And HR is no exception. In fact, 92 percent of HR workers cited in a recent study are currently using some type of HR analytics system. However, there is still a growing gap between the early adopters, and the more traditional departments that are slower to change, according to Steffen Maier, co-founder of Impraise -- a company that provides real-time employee feedback for HR -- and Tom Haak, partner at Crunchr -- a company that uses data analytics to create meaningful employee data.To read this article in full or to leave a comment, please click here

TeslaCrypt victims can now decrypt their files for free

Victims of the widespread TeslaCrypt ransomware are in luck: Security researchers have created a tool that can decrypt files affected by recent versions of the malicious program.Surprisingly, the TeslaCrypt creators themselves helped the researchers.TeslaCrypt first appeared in early 2015 and stood out by targeting game-related user content, such as save files and custom maps, in addition to personal documents and pictures -- 185 different file extensions in total.The program had some moderate success in the beginning, earning its creators $76,522 in less than two months. However, in April 2015, researchers from Cisco Systems discovered a flaw in the ransomware program that allowed them to create a decryption tool for some of its variants.To read this article in full or to leave a comment, please click here

TeslaCrypt victims can now decrypt their files for free

Victims of the widespread TeslaCrypt ransomware are in luck: Security researchers have created a tool that can decrypt files affected by recent versions of the malicious program.Surprisingly, the TeslaCrypt creators themselves helped the researchers.TeslaCrypt first appeared in early 2015 and stood out by targeting game-related user content, such as save files and custom maps, in addition to personal documents and pictures -- 185 different file extensions in total.The program had some moderate success in the beginning, earning its creators $76,522 in less than two months. However, in April 2015, researchers from Cisco Systems discovered a flaw in the ransomware program that allowed them to create a decryption tool for some of its variants.To read this article in full or to leave a comment, please click here

CIO’s guide to marketing automation software

"We are moving more and more towards a place where one-to-one relationships are going to be more the norm, even at mass scale," said Andy Markowitz, general manager of GE's performance marketing lab during a panel discussion at CES 2016.To read this article in full or to leave a comment, please click here(Insider Story)

How Flex Ciii Uses Ansible Tower for Benchmarking

flex-cii.png

We love stories about how Ansible Tower has solved problems and made work easier. Special thanks to Hugh Ma from Flex for sharing his story about Ansible Tower.

Here at Flex, our Ciii Rack Scale Platforms team regularly deploys Openstack and Ceph on large clusters with various SDN platforms. With repeated multi-rack deployment, validation, benchmarking and tear down, automation plays a crucial role in improving the agility of our operations. For a small automation team to support a large group of engineers working across 200+ servers, it is necessary to select the right tools to simplify deployment, test infrastructure installation, debugging, and results collection. This enables the team to focus on reference architecture designs, benchmark logic, and results analysis. 

Background

We had originally developed a python-based automation framework for our testing. Some of its tasks included configuring operating system and OpenStack settings through their APIs, launching test workloads, and parsing output. However, with a small team, upkeep of such a large code base and an increasing complexity of test parameters became tedious  We started looking at configuration management(CM) tools. We wanted a CM tool that was based on Python but easy for non-developers to use and straight-forward to troubleshoot. After building Continue reading

What is DFZ (Default Free Zone)?

In the context of the Internet and BGP routing, DFZ – commonly known as Default Free Zone – refers to the collections of all the public IPv4 BGP prefixes without default route on the global Internet. Most of the time, you hear full-route or full-Internet-route terms which are the same with Default Free Zone term. Having all BGP routes, […]

The post What is DFZ (Default Free Zone)? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Cloud28+ turns its cloud catalog into an enterprise app store

Cloud28+, the cloud services federation backed by Hewlett Packard Enterprise, now wants to help you install enterprise applications, not just choose them from its catalog. Although HPE is the driving force behind Cloud28+, the federation of independent software vendors, resellers and service providers now has 225 members, which are pushing to simplify cloud software deployment. The federation plans to open its new App Center for business later this summer, and will begin stocking its virtual shelves on June 7 with the opening of an App Onboarding Center. This will containerize workloads submitted by vendors and resellers and test them for compatibility, initially for free.To read this article in full or to leave a comment, please click here

78% off HooToo 3D VR Virtual Reality Headset – Deal Alert

This VR headset from HooToo averages 4 out of 5 stars on Amazon from over 280 customers (read reviews).  With a regular list price of $89.99, the 78% discount puts it at just $19.99. Load a film onto your phone, and then slide it into the headset to begin watching. Once strapped in, you can adjust the focal and pupil settings to get the perfect 3D image and protect against eye strain. The headset has been designed to maximize comfort by having a soft sponge casing around your eyes to lighten pressure on your face. Compatible with apps from the Apple App and Google Play Stores. Experience VR now on your own phone -- click over to Amazon to learn more and explore buying options.To read this article in full or to leave a comment, please click here