Let’s Meet in Zurich or Heidelberg

I’ll be speaking at two conferences in March: SDN event in Zurich organized by fantastic Gabi Gerber, and the best boutique security conference – Troopers 15 in Heidelberg. If you’ll be attending one of these events, just grab me, drag me to the nearest coffee table, and throw some interesting questions my way ;) … and if you happen to be near one of these locations, let me know and we might figure out how to meet somewhere.

Read more ...

Blessay: Enterprise IT Comes Last In Technology Innovation

There was a time when Enterprise IT defined the future of computing. Laptops were designed for corporate consumption first and the best software was sold to enterprise for business use. The other markets for computers was “home users” who were offered cheap, low quality and low performance versions of corporate computers. IT was critical to the […]


The post Blessay: Enterprise IT Comes Last In Technology Innovation appeared first on EtherealMind.

Friends May Come and Go…

We overuse the word “friend” in our world — especially the technical world. We tend to call anyone we’ve ever met a friend. In this environment, friends come and go almost constantly, flowing through our lives like the leaves in a brisk fall wind. The depth to which Facebook and LinkedIn dive into our personal relationships — reminding us of birthdays, telling us who’s having a work anniversary, telling us when we should say the right thing at the right time to keep the “friendship” alive and current. But this somehow robs the concept of friendship out of, well, friendship. There’s no sacrifice, not even any effort — you have to question the value of “friendship” on these terms. It almost seems that social networking has made us less social, and less attuned to real friendship.

How do we live in this world?

I would first suggest reviving the concept of being intentional about friendship. Rather than just letting people fall into and out of our lives, we need, particularly as engineers, to decide to hold on to some friends, to intentionally make these people a fixture in our lives. We need to be careful not to make these choices Continue reading

IDG Contributor Network: Dark fiber should fill residential broadband holes

With broadband speeds newly defined as starting at 25 Mbps, as opposed to the archaic 4 Mbps definition, what happens if you now no longer have residential broadband? And what do you do if, to add insult to injury, your ISP ups its prices?Well, the answer is that you pretty much do nothing. There isn't anything you can do. The ISP, in most cases, has a monopoly — a duopoly at best. If you want uncapped Internet, however jerky the video, you've got to use that hard-wired ISP.But that might soon be changing. The reason: dark fiber.Dark fiber is the term coined for private fiber networks often used for financial transactions. They're usually networks that are not owned by telcos and cable companies.To read this article in full or to leave a comment, please click here

Why the SteelApp sale is a win-win for Brocade and Riverbed

Last week, Brocade announced its intent to purchase the SteelApp product line from Riverbed for an undisclosed amount of cash. SteelApp is a virtual application delivery controller and competes most often with the likes of F5 and Citrix. Formerly known as Stingray, SteelApp came to Riverbed in the acquisition of UK-based Zeus, who pioneered the virtual ADC market. On paper, the acquisition made sense for Riverbed, as Zeus had solutions that optimized the performance of applications with a data center solution and Riverbed was a vendor that optimizes application performance over the wide area network.However, although the business unit had some early success when it was dropped into the Riverbed channel, it never really became a meaningful part of Riverbed's revenue stream. Now, after almost four years, SteelApp will become part of Brocade's business.To read this article in full or to leave a comment, please click here

How network admins can survive SDN

With the advent of SDN, there’s been a lot of speculation about the future of the network administrator.Some doomsayers predict the network admin will be obsolete as network virtualization becomes the responsibility of the server or systems admin already in charge of server virtualization. Or that as SDN applications take on more network intelligence in order to program what network resources they need, the application developers might take over the role of network admin.To read this article in full or to leave a comment, please click here

Installing Golang IDE Support in Intellij

I have always preferred Intellij Community Edition IDE for Java, Bash, Python, Node and anything else I have needed, including recently C/C++ which is pretty slick. The plus is I can hang on to key-mappings, syntax color and general workflow all in a ubiquitous dev environment. There are some good IDE options for Go and of course support for the ... The post Installing Golang IDE Support in Intellij appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Nested Virtualization

A typical Network Virtualization demo is difficult as you need quite some hypervisor hosts to run some VMs on and interconnect them using Overlays. I solve this using nested virtualization. This means that I run a hypervisor running on another. This gives me the flexibility that my physical nodes, or “hypervisor underlay” if you will, can scale easily and I’m independent of them.

My physical cluster consists of 2 nodes running ESXi with vCenter. On top of that I’m running 4 other ESXi hosts divided in 2 “virtual” clusters and 4 KVM hosts as Contrail Compute Nodes.

How does this work?

This technology works using Intel’s VT-x (which is hardware assisted virtualization) and EPT (to virtualise memory allocations). This combination works since the “Nehalem” archnested1itecture (released 2008). The technology is ported to the more “Desktop” oriented CPU’s as well, so there is a good chance your notebook supports it as well. Since the Haswell architecture the nested virtualization works even better as Intel now supports VMCS Shadowing for nested VMs, which creates a data structure in memory per VM (and now supports nested VMs as well, which used to be a software effort).

Memory is the biggest burden in these Continue reading

Cisco Live in San Diego – Will You Make It?

“Make it” was one of the first singles released by the the band Aerosmith. Since then these guys have been rocking away for about 40 years. What does this have to do with Cisco Live? Aerosmith will be the band playing at the Customer Appreciation Event (CAE). A good time is pretty much guaranteed. Aerosmith knows how to entertain a crowd.

Aero - new version LOGO copy

The CAE will take place at Petco Park, the home of the San Diego Padres. This photo shows the arena in the evening, looks quite spectacular to me.

Petco-Park-Photo1000x1000 (3)

Cisco Live is much more than just having fun though. If you want to make it in the IT industry, there is a lot to gain by going to Cisco Live. Here are some of my reason why I want to go:

  • Stay on top of new technologies – Where is ACI going?
  • Dip my toes into other technologies that I find interesting
  • Gain deep level knowledge of platforms or features that will benefit me and my customers
  • Go to sessions that will aid me on my certification path
  • Connect with people!
  • Learn a lot while having fun at the same time!
  • Learn from the experience of others

When you are Continue reading

Unified/Seamless MPLS

In this post I would like to highlight a relative new (to me) application of MPLS called Unified MPLS.
The goal of Unified MPLS is to separate your network into individual segments of IGP’s in order to keep your core network as simple as possible while still maintaining an end-to-end LSP for regular MPLS applications such as L3 VPN’s.

What we are doing is simply to put Route Reflectors into the forwarding path and changing the next-hop’s along the way, essentially stiching together the final LSP.
Along with that we are using BGP to signal a label value to maintain the LSP from one end of the network to the other without the use of LDP between IGP’s.

Take a look at the topology that we will be using to demonstrate this feature:

Unified-MPLS-Topology

In this topology we have a simplified layout of a service provider. We have a core network consisting of R3, R4 and R5 along with distribution networks on the right and left of the core. R2 and R3 is in the left distribution and R5 and R6 is in the right hand side one.

We have an MPLS L3VPN customer connected consisting of R1 in one site Continue reading

STP Notes for CCDE

These are my study notes for CCDE based on “CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1, Fifth Edition” and “Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide: (CCDP ARCH 642-874), Third Edition“, “INE – Understanding MSTP” and “Spanning Tree Design Guidelines for Cisco NX-OS Software and Virtual PortChannels“. This post is not meant to cover STP and all its aspects, it’s a summary of key concepts and design aspects of running STP.

STP

STP was originally defined in IEEE 802.1D and improvements were defined in amendments to the standard. RSTP was defined in amendment 802.1w and MSTP was defined in 802.1s. The latest 802.1D-2004 standard does not include “legacy STP”, it covers RSTP. MSTP was integrated into 802.1Q-2005 and later revisions.

STP has two types of BPDUs: Configuration BPDUs and Topology Change Notification BPDUs. To handle topology change, there are two flags in the Configuration BPDU: Topology Change Acknowledgment flag and Topology Change flag.

MessageAge is an estimation of the age of BPDU since it was generated by root, root sends it with an age of 0 and other switches increment this Continue reading

Away from WordPress to Jekyll on Github

Recently I seriously considered shutting down the blog. I wasn't writing as often as I wanted. It was costing money to keep up, the free services...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

IT Security Skills Anyone Can and Should Learn

I’ve been teaching IT security awareness for several years and I try to get those in attendance of the classes to learn some basic IT security skills. These basic skills build on each other and there is some cross over, but ultimately this blended set of security skills can help anyone stay safe online. As with any sport you always start by learning the fundamentals, and while no one skill can get you into the game or keep you safe online, they can definitely make you ready for either.

Physical Security

failed-physical_security

With free Wi-Fi available in coffee shops and many fast food restaurants I constantly see people leaving their devices unattended and this lapse can allow someone to walk off with the device unnoticed. Think about your device and the amount of data it may contain.  The device may have your whole world stored on it! If someone takes your laptop, tablet, or phone it is so much more than having the device stolen, but the data it contains. Besides this Wi-Fi example other scenarios to pay attention to your device is when going through airport security or leaving the device in plain site while stored in the car. Continue reading

Finding Older Articles While The Blog is Migrated

If you hadn't noticed, the Revolution Wi-Fi website was recently migrated from Blogger to Squarespace. While I like the new look on the website, some of the features on the old site aren't yet replicated on the new site. Additionally, cached web search results still point to old URLs causing "webpage not found" errors from Google and others.

If you're looking for older blog posts or pages, you have two options:

  1. Go to the old website still at http://www.revolutionwifi.blogspot.com
    OR
  2. Add the "/revolutionwifi/" directory into URL address for any blog post
    Example:
    http://revolutionwifi.net/2013/05/apple-ios-fast-roaming-with-aerohive-wi.html
    Becomes:
    http://revolutionwifi.net/revolutionwifi/2013/05/apple-ios-fast-roaming-with-aerohive-wi.html

Additionally, all of the categorized article topics are available on the old website at http://revolutionwifi.net/revolutionwifi/p/article-archives-by-topic.html

Finally, I've fixed all of the old URL links embedded within blog posts that were broken right after the blog migration due to the different directory structure. Ugh! But I've fixed this now... so all good there :)

I will also be adding Search and Categories to the new website once I have time. Thanks for your patience while I complete this work!

Cheers,
Andrew von Nagy

Away from WordPress to Jekyll on Github

Recently I seriously considered shutting down the blog. I wasn’t writing as often as I wanted. It was costing money to keep up, the free services are really sub-par from what I’ve experienced. It...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Away from WordPress to Jekyll on Github

Recently I seriously considered shutting down the blog. I wasn’t writing as often as I wanted. It was costing money to keep up, the free services are really sub-par from what I’ve experienced. It...

[[ Summary content only, you can read everything now, just visit the site for full story ]]