Worth Reading: Trademarking hashtags
The post Worth Reading: Trademarking hashtags appeared first on 'net work.
The post Worth Reading: Trademarking hashtags appeared first on 'net work.
Take a Network Break! We serve up a bounty of tech news, including Microsoft's influence over hardware players, Cisco's big reorganization, a new Citrix appliance & more.
The post Network Break 80: Microsoft Moves Markets, Cisco Reorganizes appeared first on Packet Pushers.
Take a Network Break! We serve up a bounty of tech news, including Microsoft's influence over hardware players, Cisco's big reorganization, a new Citrix appliance & more.
The post Network Break 80: Microsoft Moves Markets, Cisco Reorganizes appeared first on Packet Pushers.
So you’ve spent time asking what, observing the network as a system, and considering what has actually been done in the past. And you’ve spent time asking why, trying to figure out the purpose (or lack of purpose) behind the configuration and design choices made in the past. You’ve followed the design mindset to this point, so now you can jump in and make like a wrecking ball (or a bull in a china shop), changing things so they’re better, and the new requirements you have can fit right in. Right?
Wrong.
As an example, I want to take you back to another part of a story I told here about my early days in the networking world. Before losing the war over Banyan Vines, I actually encountered an obstacle that should have been telling—but I was too much of a noob at the time to recognize it for the warning it really was. At the time, I had written a short paper comparing Vines to Netware; the paper was, perhaps, ten pages long, and I thought it did a pretty good job of comparing the two network operating systems. Heck, I’d even put together a page showing how Vines Continue reading
It's selling the unit for less than it paid for it.
Change control isn’t so bad. With the underlying goal of risk mitigation, good change control can save a network engineer from the dreaded resume generating event we sweat over during cutovers. Change management frameworks such as ITIL layer an element of bureaucracy over network operations to provide a basis for a quantitative approach to IT […]
The post Change Control: Embrace the Red Tape appeared first on Packet Pushers.
Change control isn’t so bad. With the underlying goal of risk mitigation, good change control can save a network engineer from the dreaded resume generating event we sweat over during cutovers. Change management frameworks such as ITIL layer an element of bureaucracy over network operations to provide a basis for a quantitative approach to IT […]
The post Change Control: Embrace the Red Tape appeared first on Packet Pushers.
Ecomp would be the mother of SDN open source groups.
We’ve recently added video streaming service to Mail.Ru Cloud. Development started with contemplating the new feature as an all-purpose “Swiss Army knife” that would both play files of any format and work on any device with the Cloud available. Video content uploaded to the Cloud mostly falls into one of the two categories: “movies/series” and “users’ videos”. The latter are the videos that users shoot with their phones and cameras, and these videos are most versatile in terms of formats and codecs. For many reasons, it is often a problem to watch these videos on other end-user devices without prior normalization: a required codec is missing, or the file size is too big to download, or whatever.
In this article, I’ll go into detail to explain how video playback works in Mail.Ru Cloud, and how we made the Cloud player “omnivorous” and ensured support on a maximum number of end-user devices.
The post Worth Reading: Building a (human) network, part 2 appeared first on 'net work.
This week’s comedy gold was listening to a conversation emanating from a nearby inhabitant of our corporate cube accomodations, where one of my colleagues, Bob, was explaining to another coworker, George, the reasoning behind the decision to deploy firewalls to a particular new location.
Roughly summarized, the argument was this:
George, deploying a firewall is like having sex.
(No; I confess I had not anticipated ever typing that particular sentence, and I hope I never have to type it again.)
When you want to have sex, you decide whether you want a baby, and thus you choose whether or not to use contraception. If you don’t use contraception, while there’s no guarantee that a baby will arrive, there’s a real good chance that it will, so don’t be surprised if it does. Contraception isn’t perfect, but it at least reduces the likelihood of having a baby.
I confess I was laughing hard as I listened to the explanation because it’s an inspired analogy. However, buried somewhere in my subconscious was an Australian voice saying something like All these security products are a waste of money. It’s cheaper to save the money you would have spent, deal with a breach Continue reading
Network assurance saves you time, money and keeps you away from implementation sweats. Learn more with CA Technologies' Tim Diep.