Bing Translator

I’ve rearranged the slideout sidebar a little; tightened up the text a little so more will fit (I might customize the styling a little to make it even tighter). I also added a bing translator widget; slide out the bar, press the translate button, and a small floating popup will appear. Click down to choose a language to translate to. I don’t know how good the translation is, but I thought this might be useful.

The post Bing Translator appeared first on 'net work.

UK spies sued over phone data collection scheme already banned in US

In an effort to put an end to the bulk data collection of phone records and other large datasets from millions of people, campaign group Privacy International has filed a complaint with a U.K. court.The complaint was filed with the U.K. Investigatory Powers Tribunal, which deals with claims against U.K. intelligence agencies, including the country’s Government Communications Headquarters (GCHQ). It is meant to put an end to bulk data collection that was already banned in the U.S.Last Tuesday, the U.S. Senate passed the USA Freedom Actwhich put a stop to the old U.S. National Security Agency’s (NSA) bulk collection of domestic telephone records, restoring a limited telephone records program.To read this article in full or to leave a comment, please click here

Five network trends challenging the enterprise

As cloud computing, big data and the deployment of mega-scale data centers accelerates, organizations need to continually recalibrate and evolve the network. This challenge has led to the development of new technologies and standards designed to increase and optimize network capacity, security and flexibility, all while keeping a lid on cost. Here are the top five trends as we see them:* Rapid Adoption of 802.11ac. Tablets and smartphones are becoming ubiquitous in the workplace. As the number of mobile devices and the deployment of cloud-based enterprise services continues to scale at a dramatic rate, the keepers of the network must reconsider how they provision, secure and control enterprise computing resources and information access.To read this article in full or to leave a comment, please click here

Five network trends challenging the enterprise

As cloud computing, big data and the deployment of mega-scale data centers accelerates, organizations need to continually recalibrate and evolve the network. This challenge has led to the development of new technologies and standards designed to increase and optimize network capacity, security and flexibility, all while keeping a lid on cost. Here are the top five trends as we see them:

* Rapid Adoption of 802.11ac. Tablets and smartphones are becoming ubiquitous in the workplace. As the number of mobile devices and the deployment of cloud-based enterprise services continues to scale at a dramatic rate, the keepers of the network must reconsider how they provision, secure and control enterprise computing resources and information access.

To read this article in full or to leave a comment, please click here

New products of the week 06.08.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Gluware 2.0 SD-WAN Orchestration PlatformKey features: Gluware 2.0 is the intelligent orchestration platform designed to unlock the potential of Software-Defined Wide Area Networks (SD-WAN) for enterprise networks and operations teams across the services lifecycle. More info.To read this article in full or to leave a comment, please click here

How to train your Surface Pro 3: Tips, tricks, hacks

Surface Pro 3 tipsWe’ve collected several tips for Microsoft’s popular tablet computer. Most are useful or interesting, one is kind of silly, and another is a nearly literal hack to the Surface Pro 3. Enjoy!Train Surface Pro 3 to better recognize your handwriting The Surface Pro 3 has software that’s already set to learn your handwriting when using the Surface Pen, for converting your written notes to typed text. If you use the tablet a lot for note taking, though, then you should run the Handwriting Personalization program and take a moment to train it to improve its recognition of what you write. There are two ways to do this: by writing specific characters and words you want it to recognize, or following the program as it instructs you to write out sentences or characters (letters, numbers, symbols) that it assigns you.To read this article in full or to leave a comment, please click here

5 low-cost Wi-Fi stumblers and analyzers

Stumblers and analyzersWi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when checking channel usage. They’re also needed for Wi-Fi site surveys and for security audits to look for rogue or misconfigured APs. Each of these five tools gives you the basic wireless details of nearby APs, including SSIDs, signal strength, channels, MAC addresses, and security status. Most can also reveal “hidden” or non-broadcasted SSIDs. Some offer additional functionality, such raw 802.11 packet capturing, frame statistics, performance testing, and map-based surveying. (Read the full product review.)To read this article in full or to leave a comment, please click here

5 Wi-Fi stumblers and analyzers for less than $100

Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when simply checking channel usage on the wireless bands. They’re also needed for Wi-Fi site surveys during the network design and deployment phases, as well as for security audits to look for rogue or misconfigured access points.To read this article in full or to leave a comment, please click here(Insider Story)

Let’s Revisit The Aruba Networks Acquisition

Aruba-HP-LogoBack in February, I wrote a piece entitled “HP Buying Aruba?”. In that post, I provided some context around why I thought HP buying Aruba could end up being a bad idea. I also mentioned in that post that I hoped HP did right by Aruba’s customer base and didn’t put the corporate handcuffs on them.

After several months and many conversations with HP, Aruba, and my peers, I have a different take. I am not 100% ready to back off from my concerns though. The acquisition has closed. The deal is done. However, it is too early in the process to be certain of much of anything regarding the future state of Aruba, its products, and its ability to execute as they have in the past. Let’s just say I am about 75% headed in the opposite direction of my initial concerns.

This past week, I was fortunate enough to attend HP Discover in Las Vegas. HP paid for my travel and expenses for HP Discover. For that, I thank them and I can definitively tell you that I was not pressured into writing anything as a result of this trip. As luck would have it, Aruba Continue reading

Cisco Announces New CCNA and CCNP IoT Cloud Certifications, Could a CCIE Cloud be on the Horizon?

As many of you have heard by now, Cisco has announced their new CCNA Cloud and CCNP Cloud certifications. These certifications are designed to be a focus-based around their “Internet of Things” (IoT) concept, which will also play into the “Internet of Everything” (IoE) transformation that we’ll see happening over the next several years. In addition to Cisco, so many other companies are participating in the IoT concept, at a minimum, the companies listed here.

As a quick summary, the IoT definition refers to the endpoints, devices, and networks that connect to the internet, whereas their IoE definition is more of a “tied in system” that brings networked devices, and endpoints (IoT) together into a much larger solution that will allow the ability to connect people, places, and things in a much more relevant and valuable way than ever imagined. IoE brings people, processes, data, and the connected devices together to form – essentially, in my own words “a connected world”.

For a visual explanation, check out this slideshow and video (which I love) developed by Cisco.

Top IoT Trends and Their Impact on the Internet of Everything

Cisco’s Internet of Everything | Circle Story

As I read into Cisco’s Continue reading

So You Need ISSU on Your ToR switch? Really?

During the Cumulus Linux presentation Dinesh Dutt had at Data Center Fabrics webinar, someone asked an unexpected question: “Do you have In-Service Software Upgrade (ISSU) on Cumulus Linux” and we both went like “What? Why?

Dinesh is an honest engineer and answered: “No, we don’t do it” with absolutely no hesitation, but we both kept wondering, “Why exactly would you want to do that?

Read more ...

Considering On-Call Pay

Let’s say you’ve been offered a new job. $70k base salary, with up to $20k per year extra for on-call duties. Great! $90k! That’s $10k more than my salary now! Sign me up!

Wait a minute. Not so fast.

Years ago I received some good advice: Treat your on-call payment as a separate item. Don’t consider it as part of your base salary. This is because you need to be paid properly both for doing your job, and for the inconvenience of being on-call.

Evaluate the base salary for what it is: Your salary for doing your day-to-day job. Ignoring the on-call part, did they offer you enough money for the role? Is it a good match for your experience?

Separately decide if the on-call payment is enough to justify being on-call. Does it represent a fair payment for the extra work?

Why does this matter? A few reasons:

  • Being on-call has a big impact on your life, and you need to be properly paid for it.
  • You still need to get paid properly for the job you do Monday-Friday.
  • On-call payments will vary. Your job role could change. Maybe the team gets bigger, and you go on-call less often. Now you’re earning Continue reading

WWDC 2015 Rumors: What to expect from Apple

Tomorrow at 10 A.M Pacific Time, Tim Cook and his trusted cadre of lieutenants will take the stage at Moscone West in San Francisco where they will show us what the company has been working on over the last 12 months.When it comes to Apple related announcements, WWDC is undoubtedly one of the most exciting events of the year. Per usual, there's been a steady stream of rumors pointing to what we can expect to see from Apple tomorrow. To help you get acquainted with what some of the announcements may touch on, below is a broad overview of what Apple will likely touch on during tomorrow's highly anticipated presentation.iOS 9To read this article in full or to leave a comment, please click here

iPhone 7 rumor rollup: Feeling left out at Apple WWDC, but design concepts cheer us up

The world of Apple prognosticators expect a Beats-infused streaming music service, support for native Apple Watch apps and a first look at iOS 9 at this week’s Worldwide Developers’ Conference. But iPhone 6S or iPhone 7 are expected to gain nary a mention by Apple big shots at the annual San Francisco confab.Sure, iOS advances in Version 9 will be directly applicable to iPhone users, but who knows, Apple might be on to iOS 10 by the time its next iPhone surfaces. Enter the iPhone concept designs Deviant Art iPhone 7 design concept: Home button is nowhere to be seenTo read this article in full or to leave a comment, please click here

PQ Show 51 – LightCyber Magna Active Breach Detection – Sponsored

LightCyber Magna Active Breach Detection automatically detects active attackers by identifying the anomalous operational behaviors sourced from compromised hosts in your network. By focusing on actual attack behaviors, and not technical artifacts like signatures, Magna provides accurate breach indicators and eliminates excessive false positives.

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 3M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post PQ Show 51 – LightCyber Magna Active Breach Detection – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.

Cloonix network simulator updated to version 26

The Cloonix development team released an update to Cloonix version 26 in May 2015. An important addition in version 26 is a greatly expanded and improved Cloonix user guide.

Cloonixv26-002

The new version also changes the user interface, adds a new LAN type, and eliminates the t2t device. It also includes updated guest virtual machines.

User interface changes

In Cloonix Version 26, the user interface eliminates the tool bar and makes all graph objects available via a right-click drop-down menu.

Right-click to access the virtual network object menu

Right-click to access the virtual network object menu

Also, the different LAN types are no longer available as separate objects. They are configured in the KVM configuration window.

Cloonix v26 KVM configuration window

Cloonix v26 KVM configuration window

Installing Cloonix v26

The only change to the install procedure is a some new prerequisite software packages that must be installed to support compilation.

You can install pre-compiled binaries or compile Cloonix from source code. I prefer to compile it. The source code and the precompiled binaries are on the Cloonix Software page.

To compile the source code on Xubuntu 14.04, I followed the procedure documented in the Cloonix install documentation.

We will install Cloonix v26 in our Home directory. Download and unpack the source code.

$ Continue reading