Ixia Secures the Connected Car
Car connectivity is on the rise, but with that connectivity comes vulnerability. Ixia looks at how to secure access points into connected cars.
Car connectivity is on the rise, but with that connectivity comes vulnerability. Ixia looks at how to secure access points into connected cars.
Network Break analyzes Cisco's latest acquisitions, Verizon's IoT ambitions, Microsoft's failed bid for Mesosphere, a security bill that endangers privacy, and a new startup from an old NSA hand.
The post Network Break 60: Cisco’s Acquisitions, Verizon’s IoT Ambitions appeared first on Packet Pushers.
AT&T, Juniper, Charles Giancarlo, and HP are in the top 3.


Humble Inquiry: The Gentle Art of Asking Instead of Telling
Edgar H Schein
Edgar Schein says we have a cultural issue. We like to tell people what we think, rather than asking them what they’re trying to tell us. Overall, especially in the world of information technology, I tend to agree. To counter this problem, he suggests that we perfect the art of the humble inquiry — redirecting our thinking from the immediate solution that comes to mind, or even from the question that was asked, and trying to get to the what the person we’re talking to is actually asking.
He gives numerous examples throughout the book; perhaps my favorite is of the person who asked stopped their car while he was doing yard work to ask directions to a particular street. Rather than answering, he asked where they were trying to get to. They were, in fact, off course for their original plan, but he directed them down a different path that got them there faster than if they’d turned around and found their way back to that original path. This is a perfect example of asking returning a specific question with a larger question — an authentic Continue reading
As an Enterprise IT person you probably know that today is the day that HP splits into two companies and discards the “deadweight” of the $50 Billion PC and Printer business to “HP Inc” while the new Hewlett Packard Enterprise (HPE) company is expected to be leaner and more focussed on Webscale and Enterprise $50B […]
The post Its Hewlett Packard Enterprise Day appeared first on EtherealMind.
I got this question from one of my readers (and based on these comments he’s not the only one facing this challenge):
I was wondering if you can do a blog post on Cisco's new ASA 5585-X clustering. My company recently purchased a few of these with the intent to run their cross data center active/active firewalls but found out we cannot do this without OTV or a layer 2 DCI.
A while ago I expressed my opinion about these ideas, but it seems some people still don’t get it. However, a picture is worth a thousand words, so maybe this will work:
Read more ...End user WiFi monitoring complements standard network monitoring and can speed up problem detection and troubleshooting. NetBeez shares the top four use cases in wireless monitoring from the user perspective.
The post Four Use Cases for WiFi End User Monitoring appeared first on Packet Pushers.
In the below picture, where should you place an OSPF ABR (Area Border Router) to scale OSPF design ? Why ? Please share your thoughts in the comment box below. First 5 correct answers will get my CCDE Preparation Workbook for free. Please subscribe to email list so I can see your email address for communication.
The post OSPF Design Discussion appeared first on Network Design and Architecture.