The unceasing arms-race between cyber attackers and cyber defenders has gained unprecedented levels of sophistication and complication. As defenders adopt new detection and response tools, attackers develop various techniques and methods to bypass those mechanisms. And deception is one of the most effective weapons on both sides of the game.
Deception techniques have traditionally been among the favorite methods in the attackers’ arsenal. Surprise and uncertainty provide the attacker with an inherent advantage over the defender, who cannot predict the attacker’s next move. Rather surprisingly, however, the broken symmetry can also be utilized by the defender.
To read this article in full or to leave a comment, please click here
In my last article, I talked about how Fibre Channel, as a technology, has probably peaked. It’s not dead, but I think we’re seeing the beginning of a slow decline. Fibre Channel’s long goodbye is caused by a number of factors (that mostly aren’t related to Fibre Channel itself), including explosive growth in non-block storage, scale-out storage, and interopability issues.
But rather than diss Fibre Channel, in this article I’m going to talk about the advantages of Fibre Channel has over IP/Ethernet storage (and talk about why the often-talked about advantages aren’t really advantages).
Fibre Channel’s benefits have nothing to do with buffer to buffer credits, the larger MTU (2048 bytes), its speed, or even its lossless nature. Instead, Fibre Channel’s (very legitimate) advantages are mostly non-technical in nature.
When you build a Fibre Channel-based SAN, there’s no optimization that needs to be done: Fibre Channel comes out of the box optimized for storage (SCSI) traffic. There are settings you can tweak, but most of the time there’s nothing that needs to be done other than set port modes and setup zoning. The same is true for the host HBAs. While there are some Continue reading
ETSI NFV descends on the Big Apple for NFV #12
EMC announces layoffs during the New Years' holiday.
It is my privilege to return as a delegate for Network Field Day 11 in Silicon Valley on January 20-22. You can find full details on the event at Tech Field Day page which lists the vendors and delegates in full. Lots of familiar faces and a few new ones.
The post Network Field Day 11 and Meetups in the Valley appeared first on EtherealMind.
Chapter by chapter Sergey Ignatchenko is putting together a wonderful book on the Development and Deployment of Massively Multiplayer Games, though it has much broader applicability than games. Here's a recent chapter from his book.
[Enter Juliet]
Hamlet:
Thou art as sweet as the sum of the sum of Romeo and his horse and his black cat! Speak thy mind!
[Exit Juliet]
Our Classical Deployment Architecture (especially if you do use FSMs) is not bad, and it will work, but there is still quite a bit of room for improvement for most of the games out there. More specifically, we can add another row of servers in front of the Game Servers, as shown on Fig VI.8:
A public cloud is excellent for running ephemeral NFV labs.
Among all the skills I hear network engineers talk about, two that are often underrated are writing skills and graphics skills. There is some small slice of the networking world that is serious about writing (though I often think we make too big of a production out of writing, getting wrapped around tools and process instead of focusing on actual writing), but graphics is one area the we really don’t talk about a lot. After all, I’m an engineer, not a graphic designer, right? Or maybe — I’ve always heard I should be a master of one skill, rather than a jack of all trades…
Diane, over at Data Center Mix, has a great post up on four ways being an artist has helped her sell data center products. There are some great ideas in there, but as someone with formal training in graphic design (in a distant past I can barely remember any longer), I wanted to add a few thoughts about graphics skills as a network engineer.
She begins with this thought: a picture is worth a thousand words. I’m never quite certain this is actually true in every case (Charles Dickens in cartoon format doesn’t sound very Continue reading
For the purpose of high availability, critical locations of company A – a customer of VPN service provider – is connected to two different carriers. However, this connectivity requires an important design consideration. Figure-1 In the network design shown above, customer AS 64512 is connected to two different providers: AS100 and AS200. Since this site is critical to the […]
The post Dual Carrier MPLS VPN Design appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.