iPexpert’s Newest “CCIE Wall of Fame” Additions 8/17/2015

Please join us in congratulating the following iPexpert students who have passed their CCIE lab!

This Week’s CCIE Success Stories

  • Alemneh Nigussi, CCIE #28272 (Data Center)
    (He’s a 3x CCIE! He also has Voice and Routing/Switching.)
  • K.G. Pramod, CCIE #49662 (Data Center)
  • Mohamed Ahmed Ali, CCIE #34760 (Security)
  • Muhammad Adil, CCIE #49605 (Data Center)

We Want to Hear From You!

Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!

New products of the week 08.17.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Absolute Data and Device Security adds Microsoft SCCM and SIEM integrationKey features: Absolute has introduced new security functionality that extends IT oversight to include Microsoft SCCM and SIEM integration. More info.To read this article in full or to leave a comment, please click here

New products of the week 08.17.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Absolute Data and Device Security adds Microsoft SCCM and SIEM integrationKey features: Absolute has introduced new security functionality that extends IT oversight to include Microsoft SCCM and SIEM integration. More info.To read this article in full or to leave a comment, please click here

War Stories: ITIL Process vs Practice

Our irregular War Stories returns, with a story about a network I worked on with strict change control, but high technical debt. What should have been a simple fix became far more pain than it should have been. Lesson learned: next time just leave things alone. I’m sure the ITIL true believers loved their process, but did they realise it stopped people fixing problems?

A classic problem: Duplex mismatch

I spotted a duplex mismatch with one of the services I was responsible for. Throughput was low, and the NIC was showing late collisions. Classic mismatch. Should be an easy enough fix, right? Whoa there son. This is an ITIL shop. No changes without an approved change request!

Logging Changes: An Exercise in Frustration

Change policy at this company was for a lead time for one week for most systems, or two weeks for some ‘important’ systems. Changes had to be submitted and approved before the deadline. There was no reason for the delay. Nothing happened during those two weeks, there was no extra review, you just had to wait, because that was the process.

This company had a Change Management system built on top of a main-frame application. Seriously? Yes, seriously. But it was Continue reading

Italian teen finds two zero-day vulnerabilities in OS X

An Italian teenager has found two zero-day vulnerabilities in Apple’s OS X operating system that could be used to gain remote access to a computer.The finding comes after Apple patched last week a local privilege escalation vulnerability that was used by some miscreants to load questionable programs onto computers.Luca Todesco, 18, posted details of the exploit he developed on GitHub. The exploit uses two bugs to cause a memory corruption in OS X’s kernel, he wrote via email.To read this article in full or to leave a comment, please click here

Software upgrade could be cause of US airline disruption

A computer glitch that disrupted airline traffic in some parts of the U.S. over the weekend was possibly the result of a software upgrade, the Federal Aviation Administration said Sunday.The agency, which had earlier described a problem in its “automation system” as the cause of the disruption, said the problem could be possibly traced to a recent software upgrade at a high-altitude radar facility in Leesburg, Virginia.The upgrade was designed to provide additional tools for controllers, the agency said. While the FAA and its system contractor complete their assessment, the new features have been disabled.The agency said that there was no indication that the disruption was related to any inherent problems with the En Route Automation Modernization system, which it claims has had a greater than 99.99 availability rate since it was completed nationwide earlier this year. ERAM replaced the 40-year-old En Route Host computer and backup system used at 20 FAA Air Route Traffic Control Centers nationwide.To read this article in full or to leave a comment, please click here

Time to Ditch the Definition of SDN

While at a stoplight looking at the random news feeds on Linkedin I ran across a post of a recent blog post by the ONF and the subsequent conversation where my friend Ivan Pepenlnjak commented in. So I threw in my two cents and quickly regretted it because Linkedin has an amazing ability to frustrate me as it updated the ... The post Time to Ditch the Definition of SDN appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Your Docker Agenda for LinuxCon

Docker and containers are making a big splash in Seattle next week! LinuxCon runs from Monday, August 17 through Wednesday, August 19 but there are plenty of co-located events during the week including ContainerCon, MesosCon and the Linux Plumbers Conference. … Continued

Disclaimer

No Warranties This website is provided “as is” without any representations or warranties, express or implied. The Owner makes no representations or warranties in relation to this website or the information and materials provided on this website. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this website's information is solely at reader's own risk. Limitations of Liability The Owner will not be liable to you (whether under the law of contact, the law of torts or otherwise) in relation to the contents of, or use of, or otherwise in connection with, this website:

Privacy Policy

This site is privately owned and operated and has no corporate or commercial interests. If you choose to post a comment on this site, any information you provide — most importantly your email address — remains private and is not shared with any third-party. All information you provide when posting a comment is used only for facilitating your interaction with the site or for displaying as part of your public comment on the site.

About

About the Site Hi! I'm Joel Knight and this is my personal home on the web. I use this site as a platform for expressing my ideas, knowledge, and tools related to Information Technology. The opinions and information expressed on this site — aside from the comments posted by others — are mine and not necessarily those of my employers, past or present. My current employer is Amazon Web Services, Canada.

AT&T a closer partner of NSA than previously known, Snowden docs show

A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency’s Internet spying activities than was previously known.AT&T has been by far the most critical telecom player in the NSA’s surveillance efforts and its willing participation in mass spying on both foreign and U.S. citizens has apparently been crucial in helping the U.S. agency take advantage of bulk record collection laws, according to a joint report in ProPublica and the New York Times.To read this article in full or to leave a comment, please click here

AT&T a closer partner of NSA than previously known, Snowden docs show

A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency’s Internet spying activities than was previously known.AT&T has been by far the most critical telecom player in the NSA’s surveillance efforts and its willing participation in mass spying on both foreign and U.S. citizens has apparently been crucial in helping the U.S. agency take advantage of bulk record collection laws, according to a joint report in ProPublica and the New York Times.To read this article in full or to leave a comment, please click here