CCIE Benefits – What are they?

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
Now that I have passed the CCIE Lab exam people are asking me “What are the CCIE benefits?” As for tangible benefits to me personally they are in no particular order: I can now go to the CCIE Apparel store and purchase my CCIE Leather Jacket and other clothing with my CCIE digits on them […]

Post taken from CCIE Blog

Original post CCIE Benefits – What are they?

Docker Global Hack Day #3 Starts Next Week!

Docker Global Hack Day is on Wednesday, September 16th through Monday, September 21st! Submit Your Hack Ideas! or check out already submitted hack ideas! Three Docker Global Hack Day hackers – Nicolas De Loof, Willy Kuo, and Chia-Chi Chang – share their thoughts on participating in … Continued

Grab your new credit card and get ready to dip your chip

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you live in the United States and you have a credit card, chances are high your bank recently sent you a new card with an embedded smart chip. Banks and other card issuers are scurrying to put chip-enabled credit cards in their customers' hands. Debits cards, too. These cards are critical for a new security system for card-based payments that will go into effect in the U.S. soon.In the lingo of the payments industry, the new cards are called EMV cards. EMV is an open set of specifications for smart cards and other acceptance devices such as smart phones and fobs. EMV stands for Europay, MasterCard and Visa, which are the three companies that developed the standard in 1994. Today the EMV standard is managed by EMVCo LLC, which has six member organizations – American Express, Discover, JCB, MasterCard, UnionPay and Visa – and dozens of EMVCo associates. EMVCo makes decisions on a consensus basis to assure card infrastructure uniformity throughout the world.To read this article in full or to leave a comment, please click here

Even the FBI is worried about Internet of Things security

Dave Newman Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors and analysts about looming security threats. Now you can add the FBI to that list of those cautioning enthusiasts.The Bureau this week issued a public service announcement regarding cybercrime opportunities posed by the connecting of all sorts of data-enabled devices, from medical gear to entertainment gadgets, to the Internet.To read this article in full or to leave a comment, please click here

PlexxiPulse—Reflections on VMworld

VMworld was buzzing last week. I was impressed by the focus on delivering solutions that help accelerate the deployment of workloads this year—a definite shift from years past. It was great to see demonstrations of solutions in action and the impact they have on their customers. There were a few things that made an impression on me at the show that I included in a blog post earlier this week. Were you at the show in San Francisco last week? What were your key takeaways?

Below please find a few of our top picks for our favorite news articles of the week. Enjoy!

Business 2 Community: The Future of Networking Will Be Written By the Leaders
By Jim Rapoza
One of my favorite bands of all time is The Clash, and a famous quote attributed to their late band leader Joe Strummer is that “the future is unwritten.” And in most cases that is very true. For example, few people in 2005 could have successfully predicted many of the trends and realities of today, whether in the everyday world or in the realm of technology. But while the future may be unwritten, sometimes we do have a pretty good Continue reading

Website hackers hijack Google webmaster tools to prolong infections

Hackers who compromise websites are also increasingly verifying themselves as the owners of those properties in Google's Search Console. Under certain circumstances this could allow them to remain undetected longer than they otherwise would be, researchers warn.The Google Search Console, formerly known as the Google Webmaster Tools, is a very useful service for administrators to understand how their websites perform in search results.In addition to providing analytics about search queries and traffic, it also allows webmasters to submit new content for crawling and to receive alerts when Google detects malware or spam issues on their websites.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For September 11th, 2015

Hey, it's HighScalability time:


Need a challenge? Solve the code on this 17.5 feet tall 11,000 year old wooden statue!

  • $100 million: amount Popcorn could have made from criminal business offers; 3.2-gigapixel: World’s Most Powerful Digital Camera; $17.3 trillion: US GDP in 2014;  700 million: Facebook time series database data points added per minute; 300PB: Facebook data stored in Hive; 5,000: Airbnb EC2 instances.

  • Quotable Quotes:
    • @jimmydivvy: NASA: Decade long flight across the solar system. Arrives within 72 seconds of predicted. No errors. Me: undefined is not a function
    • Packet Pushers~ Everyone has IOPS now. We are heading towards invisible consumption being the big deal going forward. 
    • Randy Medlin: Gonna drop $1000+ on a giant iPad, $100 on a stylus, then whine endlessly about $4.99 drawing apps.
    • Anonymous: Circuit Breaker + Real-time Monitoring + Recovery = Resiliency
    • Astrid Atkinson: I used to get paged awake at two in the morning. You go from zero to Google is down. That’s a lot to wake up to.
    • Todd Waters~ In 1979, 200MB weighed 30 lbs and took up the space of a washing machine
    • Todd Waters~ CERN spends more compute Continue reading

‘Unidentified adapter in my lab’

Spoiler alert: We’re pretty sure we know what this is pictured above – entirely thanks to Reddit – and you will, too, if you don’t stop reading this.A user of the Reddit forum dedicated to networking, r/networking, asks: “We found an adapter and we aren’t sure what type of connection the male end is. Can any of you identify this for me?” Here are a couple more close-up views: Imgur Imgur It didn’t take long for a consensus to emerge: “My guess is (it’s) a PCMCIA Ethernet card adapter.”To read this article in full or to leave a comment, please click here

Kuala Lumpur, Malaysia: CloudFlare’s 45th data center

Kuala Lumpur joins the CloudFlare network as our 45th global point of presence (PoP). While this latest deployment comes only a day after the announcement of our expansion in Berlin (back-to-back!), it's been a long three years since we last crossed a new border in Asia. Kuala Lumpur expands our presence in the Asia-Pacific region to nine PoPs: Kuala Lumpur, Seoul, Tokyo, Osaka, Hong Kong, Singapore, Sydney, Melbourne and Auckland.

No boomerangs allowed

One of the difficulties of delivering content locally in certain parts of Asia (and in many other parts of the world for that matter) is that certain ISPs only connect with other ISPs in the same local Internet ecosystem outside of their national borders. In the absence of domestic interconnection, a request (e.g. an e-mail or web request) from one local ISP to another "boomerangs" outside of the national border before it is ultimately delivered to another local ISP. If you live or travel in certain parts of Asia, this is one of the leading culprits for why the web feels slow. The lack of a domestic and central interconnection point also makes it challenging for networks like CloudFlare, both Continue reading

PCAP or it didn’t happen…. The t-shirt!

front
Some days I don’t know why I do things… But last night I was playing around with creating a PCAP meme when my friend Josh Kittle said he’d be interested in a t-shirt like that. I got to thinking about it and realized some network engineers out there also might enjoy something like this, so I fired up a campaign on teespring!

Let me know what you think, I may do other shirts in the future as this was fun to work on. If you have any ideas you don’t plan on using, let me know and I might work on developing them.

Oh, and since Jay Franklin had to have an IPv6 shirt… I also launched another version with an IPv6 packet capture, and the #IPv6 hashtag on the back.

ipv6-shirt

Click one of the shirts to see them on teespring…

The post PCAP or it didn’t happen…. The t-shirt! appeared first on Router Jockey.

Challenges around Operationalizing Threat Intelligence

When it comes to threat intelligence, there seem to be two primary focus areas in play:  The threat intelligence data itself and the legislative rhetoric around threat intelligence sharing (i.e. CISA, CISPA, etc.).  What’s missing?  The answer to a basic question:  How do organizations get actual value out of threat intelligence data and threat intelligence sharing in a meaningful way?As it turns out, the answer to this question isn’t obvious and many enterprises continue to struggle as they seek to “operationalize” threat intelligence.  In a recently published ESG research report titled, Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices, ESG surveyed 304 cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees), and asked them to rate themselves in terms of their ability to operationalize threat intelligence (note: I am an ESG employee).  The data indicates that:To read this article in full or to leave a comment, please click here

QOTW: Outsourcing Memory

Culture is more than the aggregate of what Google describes as “the world’s information.” It’s more than what can be reduced to binary code and uploaded onto the Net. To remain vital, culture must be renewed in the minds of the members of every generation. Outsource memory, and culture withers.Nicolas Carr, The Shallows

LinkedInTwitterGoogle+FacebookPinterest

The post QOTW: Outsourcing Memory appeared first on 'net work.

Easily provision Windows instances in AWS with Ansible

Untitled_designMYTH: using Ansible to do fully-automated provisioning of Windows instances in AWS is difficult, because WinRM is not enabled by default on Amazon’s Windows AMIs, and the admin password is not known at startup.

I’d like to bust this myth once and for all. As an Ansible Solutions Architect, I often see users going to great lengths to solve both of these problems. The solutions I’ve encountered in the field have ranged from “minor maintenance hassle” to “major code-smell”, and are usually completely unnecessary; an obscure EC2 feature called User Data can replace them all. In a post on my personal blog, I demonstrate a basic use of this feature to manually provision Windows instances that are Ansible-ready on first boot, using unmodified Amazon-provided AMIs. A follow-up post expands that technique into a fully-automated provisioning sample. Try it yourself to see how easy it is to quickly spin up and configure Windows instances for any need, using only Ansible!

New iPhone 6S could let Sprint network shine

LAS VEGAS -- Apple gave Sprint a little gift this week with the new iPhone 6S in the form of faster wireless speeds via a technology called carrier aggregation.The only problem is that Sprint is just at the beginning of rolling out carrier aggregation capability nationwide, a process expected to take place over the next two years. Just this week, Sprint announced the technology's availability in Denver.To read this article in full or to leave a comment, please click here

MIT scores worst in cybersecurity

In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report released today, SecurityScorecard analyzed the educational institutions based on web application security, network security, endpoint security, IP reputation, patching, and other security indicators.SecurityScorecard's chief research officer Alex Heid said they have a feeling that MIT's low scores were due in part to its cybersecurity research efforts.MORE ON CSO: What is wrong with this picture? The NEW clean desk test "They do their own malware research," he said. "They run honeypots. They're running TOR exit nodes."To read this article in full or to leave a comment, please click here