Cisco Live – News About the Customer Appreciation Event (CAE)

Cisco Live takes place in Las Vegas between the 10th and 14th of July this year. Every Live event, Cisco holds a customer appreciation event (CAE) in an arena close by the conference center. Last year we saw an amazing performance from Aerosmith hosted in San Diego. The year before that, Imagine Dragons put on a show in San Francisco.

This years event will be hosted at the T-Mobile Arena on the Las Vegas strip. This is a very new arena that opened on April, 6, just days ago. The pictures below show renderings of the arena.

T-Mobile-rendering-1
T-Mobile-rendering-1
T-Mobile-rendering-2
T-Mobile-rendering-2
T-Mobile Arena® will be the destination in Las Vegas for live events – from amazing music acts to thrilling sporting events – it will set a new standard for what entertainment means in the city that does it best. The 20,000-seat T-Mobile Arena ® will host exciting, world-class events with something for everyone – from UFC, boxing, hockey, basketball and professional bull riding to high-profile awards shows and top-name concerts.

Cisco is not only holding their CAE there. The arena also uses Cisco technology called Cisco StadiumVision which is an innovative digital content distribution system. The system is used to centrally manage and Continue reading

Cisco Live 2016 Las Vegas

logoI’m presenting at two sessions this year at Cisco Live: BRKRST-3014, Policy, Complexity, and Modern Control Planes on Thursday afternoon, and TECCCDE-3005, The Cisco Certified Design Expert, on Sunday afternoon. If you’re attending, feel free to look me up—when I’m not speaking, I’m generally hanging out at Cisco Press, at the Certification Lounge, or just walking around the show floor.

LinkedInTwitterGoogle+FacebookPinterest

The post Cisco Live 2016 Las Vegas appeared first on 'net work.

iPhone 7 Rumor Rollup: No more swearing; Plus-size exclusive; new design concept

Now that Apple is officially in its 40s, you might think the company would settle down a bit and douse all those silly rumors about iPhone 7 smartphones and so forth. But no, it looks like the Apple rumor mill isn’t hitting any sort of midlife crisis.Exclusive to 5.5-inch iPhone 7 Plus? Fretting has already begun, and now has intensified, that the much anticipated dual-lens camera Apple is believed to be working on will only be available in the 5.5-inch iPhone 7 Plus model. And not everyone wants to lug around such a big iOS device (isn’t that part of the reason so many have ditched their portable digital cameras and just use their smartphones for picture taking now?).To read this article in full or to leave a comment, please click here

Sonic Pi: Realtime music creation for the Raspberry Pi (and more)

In my last post I discussed a Web-based programming environment for the Raspberry Pi. Today, for your further Raspberry Pi delectation, I have another RPi-compatible programming tool but this it’s rather more specific: It’s called Sonic Pi and it’s for programming music in real time.Created by Sam Aaron at the University of Cambridge Computer Laboratory, Sonic Pi is a free, open source, live coding synthesizer released under the MIT License. Better still, it not only runs on the Raspberry Pi as its name suggests, it also runs on Windows, Linux, and OS X.To read this article in full or to leave a comment, please click here

Devil is the details: Dirty little secrets of the Internet of Things

Where is IoT going in the long run?... To cash in on the treasure trove of “everything it knows about you,” data collected over the long term, at least it is according to a post on Medium about the “dirty little secret” of the Internet of Things.A company can only sell so many devices, but still needs to make money, so the article suggests the “sinister” reason why companies “want to internet-connect your entire house” is to collect every little bit of data about you and turn it into profit. Although the post was likely inspired in part by the continued fallout of Nest’s decision to brick Revolv hubs, there could a IoT company eventually looking for a way to monetize on “if you listen to music while having sex.”To read this article in full or to leave a comment, please click here

Devil is the details: Dirty little secrets of the Internet of Things

Where is IoT going in the long run?... To cash in on the treasure trove of “everything it knows about you,” data collected over the long term, at least it is according to a post on Medium about the “dirty little secret” of the Internet of Things.A company can only sell so many devices, but still needs to make money, so the article suggests the “sinister” reason why companies “want to internet-connect your entire house” is to collect every little bit of data about you and turn it into profit. Although the post was likely inspired in part by the continued fallout of Nest’s decision to brick Revolv hubs, there could a IoT company eventually looking for a way to monetize on “if you listen to music while having sex.”To read this article in full or to leave a comment, please click here

Docker network visibility demonstration

The 2 minute live demonstration shows how the open source Host sFlow agent can be used to efficiently monitor Docker networking in production environments. The demonstration shows real-time tracking of 30Gbit/s traffic flows using less than 1% of a single processor core.

Handbook Updates

As many might have noticed, the Routing-bits Handbook updates have been sparse, and activity on the Routing-Bits blog even more so. A variety of contributors have led to this stemming from piracy, work, life, family, and relocation. With this I find myself at a cross-roads looking at the future the Routing-Bits website and the RB […]

Google buildings evacuated after threat

Buildings were evacuated at Google’s headquarters in Mountain View, California, on Friday afternoon after a threat was made against the company.No one was injured and there was no damage to buildings, Mountain View police spokeswoman Katie Nelson said. The incident involved a few buildings, beginning around 3:30 p.m. and concluded shortly before 5 p.m. Both police and Google security responded.Google didn't immediately have more information to provide. Police didn't comment on the nature of the threat and said they responded out of caution.While the campuses of Silicon Valley companies aren’t normally considered terrorist targets on the scale of federal buildings or major sporting events, major companies like Google, Apple, and Facebook are prominent symbols of U.S. economic and cultural power.To read this article in full or to leave a comment, please click here

Google buildings evacuated after threat

Buildings were evacuated at Google’s headquarters in Mountain View, California, on Friday afternoon after a threat was made against the company.No one was injured and there was no damage to buildings, Mountain View police spokeswoman Katie Nelson said. The incident involved a few buildings, beginning around 3:30 p.m. and concluded shortly before 5 p.m. Both police and Google security responded.Google didn't immediately have more information to provide. Police didn't comment on the nature of the threat and said they responded out of caution.While the campuses of Silicon Valley companies aren’t normally considered terrorist targets on the scale of federal buildings or major sporting events, major companies like Google, Apple, and Facebook are prominent symbols of U.S. economic and cultural power.To read this article in full or to leave a comment, please click here

How to use cloud storage as primary storage

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

The cloud is the promised land when it comes to storage.  A recent 451 Research report said AWS and Azure will be two of the top five enterprise storage vendors by 2017 with AWS as number two overall.  But the challenge with using the cloud for primary storage is the latency between that storage and users/applications. To take advantage of the economics, scale, and durability of cloud storage, it will take a combination of caching, global deduplication, security, and global file locking to provide cloud storage with the performance and features organizations require. 

To read this article in full or to leave a comment, please click here

How to use cloud storage as primary storage

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.The cloud is the promised land when it comes to storage.  A recent 451 Research report said AWS and Azure will be two of the top five enterprise storage vendors by 2017 with AWS as number two overall.  But the challenge with using the cloud for primary storage is the latency between that storage and users/applications. To take advantage of the economics, scale, and durability of cloud storage, it will take a combination of caching, global deduplication, security, and global file locking to provide cloud storage with the performance and features organizations require. To read this article in full or to leave a comment, please click here

How to improve network monitoring

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

I’m an aerospace engineer by degree and an IT executive by practice. Early in my career, I worked on missile hardware and simulators with some of the smartest minds at Marshall Space Flight Center in Huntsville, AL. An adage from those days still drives me today: “Better is the evil of good enough.”

In rocket science, an astronaut’s life is literally in the balance with every engineering decision. Being perfect is mission critical. But along the way, NASA engineers realized while perfection is important, it was not to be universally adopted, for several key reasons: It is very expensive, it draws out timelines, and it can result in extreme over-engineering.

To read this article in full or to leave a comment, please click here

How to improve network monitoring

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.I’m an aerospace engineer by degree and an IT executive by practice. Early in my career, I worked on missile hardware and simulators with some of the smartest minds at Marshall Space Flight Center in Huntsville, AL. An adage from those days still drives me today: “Better is the evil of good enough.”In rocket science, an astronaut’s life is literally in the balance with every engineering decision. Being perfect is mission critical. But along the way, NASA engineers realized while perfection is important, it was not to be universally adopted, for several key reasons: It is very expensive, it draws out timelines, and it can result in extreme over-engineering.To read this article in full or to leave a comment, please click here

Proposed US law would require tech companies to help defeat encryption

A proposal from two senior U.S. senators would force tech companies to give technical assistance to law enforcement agencies trying to break into smartphones and other encrypted devices.The draft bill, released Friday by Senators Richard Burr and Dianne Feinstein, would allow judges to order tech companies to comply with requests from the FBI and other law enforcement agencies to help them break into devices. Burr, a North Carolina Republican, is chairman of the Senate Intelligence Committee; Feinstein, from California, is the panel's senior Democrat."All persons receiving an authorized judicial order for information or data must provide, in a timely manner, responsive, intelligible information or data, or appropriate technical assistance," the draft bill says.To read this article in full or to leave a comment, please click here