CCDE and CCAr Certificates – FAQ

CCDE is the de facto expert level, vendor neutral, and infrastructure network design certification in the industry.   I have been helping to CCDE community for a while through my packet pushers articles and podcasts. I started couple months before to write about network design and CCDE related articles on my blog http://orhanergun.net as well. […]

Author information

Orhan Ergun

Orhan Ergun, CCIE, CCDE, is a network architect mostly focused on service providers, data centers, virtualization and security.

He has more than 10 years in IT, and has worked on many network design and deployment projects. Host on the packetpushers community channel.
@OrhanErgunCCDE

The post CCDE and CCAr Certificates – FAQ appeared first on Packet Pushers Podcast and was written by Orhan Ergun.

Sensors and lasers will help Volvo’s self-driving cars stay on the road

A complex network of sensors, lasers and a cloud-based positioning system are part of a plan from Volvo Cars to have 100 self-driving cars on the road by 2017.Volvo’s project to put self-driving cars on the streets of Gothenburg is entering its second year. It aims to let ordinary people drive a car with an autopilot in normal traffic on public roads. On Thursday, Volvo gave some insights into the technology it will use to integrate self-driving cars into real traffic.“The key to success is combining sensors, computers and a chassis system in a clever way,” said Erik Coelingh, a technical specialist at Volvo.To read this article in full or to leave a comment, please click here

IoT network will look to the skies for better coverage

Wide-area wireless networks for connecting Internet of Things devices may go global through a partnership between hot IoT startup Sigfox and aerospace company Airbus.Sigfox builds long-range networks for devices such as sensors that need a wireless connection but are too small and power-constrained for cellular radios. Its networks use unlicensed frequencies and don't go more than a few hundred bits per second, but they cost as little as US$1 per connection, per year.The French company has now joined the Mustang Project, co-founded by Airbus Defence and Space and two R&D partners in France. The project plans to combine Sigfox's terrestrial networks with satellite coverage to achieve global coverage.To read this article in full or to leave a comment, please click here

IoT network will look to the skies for better coverage

Wide-area wireless networks for connecting Internet of Things devices may go global through a partnership between hot IoT startup Sigfox and aerospace company Airbus.Sigfox builds long-range networks for devices such as sensors that need a wireless connection but are too small and power-constrained for cellular radios. Its networks use unlicensed frequencies and don't go more than a few hundred bits per second, but they cost as little as US$1 per connection, per year.The French company has now joined the Mustang Project, co-founded by Airbus Defence and Space and two R&D partners in France. The project plans to combine Sigfox's terrestrial networks with satellite coverage to achieve global coverage.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Friday, February 20

Intelligence agencies may have your phone’s encryption keysBritish and American government agents hacked into SIM card maker Gemalto’s network to take smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide. That let the spy agencies monitor a vast swathe of the world’s mobile phone voice and data traffic, reported The Intercept. It’s the latest revelation from the trove of information leaked by former NSA analyst Edward Snowden.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Friday, February 20

Intelligence agencies may have your phone’s encryption keysBritish and American government agents hacked into SIM card maker Gemalto’s network to take smartphone encryption keys potentially used by customers of hundreds of mobile phone carriers worldwide. That let the spy agencies monitor a vast swathe of the world’s mobile phone voice and data traffic, reported The Intercept. It’s the latest revelation from the trove of information leaked by former NSA analyst Edward Snowden.To read this article in full or to leave a comment, please click here

11 portable power chargers that are dressed to impress

Looking good and working wellImage by ShutterstockOne sign of a successful technology is when manufacturers start considering how it looks as well as how it works. Take portable battery chargers: Once upon a time, they were clunky, heavy and came mostly in basic black; not exactly the kind of thing that you wanted to haul out during a business lunch (unless you needed to impress your guest with how seriously geeky you were).To read this article in full or to leave a comment, please click here

Is the Samsung Galaxy S6 about to become the coolest Android phone ever?

Gauging what a smartphone is going to look like before its released is sort of like solving one of those toss-up puzzles on Wheel of Fortune – the answer gets clearer the longer you wait.And the Samsung Galaxy S6 – probably the most-hyped smartphone being made by a company besides Apple – is no exception. While its release at the upcoming Mobile World Congress may yet provide a surprise or two, it seems fairly obvious that the Galaxy S6 will be a slick, metallic powerhouse of a device.+ ALSO ON NETWORK WORLD: Vendors lay groundwork for 5G with greener and faster mobile networks | Commercial spyware invades enterprises +To read this article in full or to leave a comment, please click here

RFC 7454: BGP Operations and Security

After almost exactly three years of struggles our BGP Operations and Security draft became RFC 7454 – a cluebat (as Gert Doering put it) you can use on your customers and peers to help them fix their BGP setup.

Without Jerome Durand this document would probably remain forever stuck in the draft phase. It’s amazing how many hurdles one has to jump over to get something published within IETF. Thanks a million Jerome, you did a fantastic job!

TrueCrypt audit back on track after silence and uncertainty

An effort to search for cryptographic flaws in TrueCrypt, a popular disk encryption program, will resume even though the software was abandoned by its creators almost a year ago.For years TrueCrypt has been the go-to open-source tool for people looking to encrypt files on their computers, especially since it’s one of the few solutions to allow encrypting the OS volume.In October 2013, cryptography professor Matthew Green and security researcher Kenneth White launched a project to perform a professional security audit of TrueCrypt. This was partly prompted by the leaks from former U.S. National Security Agency contractor Edward Snowden that suggested the NSA was engaged in efforts to undermine encryption.To read this article in full or to leave a comment, please click here

Apple, Japan Display said to discuss new iPhone screen plant

Apple is in talks with iPhone screen maker Japan Display that could result in the construction of a new screen factory in Japan, Japanese media reported Friday.Apple would take on most of the ¥200 billion (US$1.6 billion) investment for the factory in Ishikawa Prefecture in central Japan, according to reports in Nikkan Kogyo Shimbun and Jiji Press, which did not name any sources.The plant in Hakusan City could begin operations in 2016, producing LCD panels for Apple and other manufacturers. But Apple is also in talks with other suppliers including Foxconn, and the situation is fluid, the reports said.To read this article in full or to leave a comment, please click here

Using sipcalc The Great and Powerful Subnet Calculator

In the CCNA days we all had to learn how to subnet and work with binary. This was either on paper or in your head if you were quick enough to do it. This really is an invaluable skill when speaking,...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Using sipcalc The Great and Powerful Subnet Calculator

In the CCNA days we all had to learn how to subnet and work with binary. This was either on paper or in your head if you were quick enough to do it. This really is an invaluable skill when speaking,...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Using sipcalc The Great and Powerful Subnet Calculator

In the CCNA days we all had to learn how to subnet and work with binary. This was either on paper or in your head if you were quick enough to do it. This really is an invaluable skill when speaking,...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Using sipcalc The Great and Powerful Subnet Calculator

In the CCNA days we all had to learn how to subnet and work with binary. This was either on paper or in your head if you were quick enough to do it. This really is an invaluable skill when speaking,...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Yahoo courts developers at its first mobile conference

Mobile users have become a vital part of Yahoo’s recovery effort, and on Thursday it tried to woo developers with new tools to help them build better apps using its services.The company held its first-ever mobile developer conference in San Francisco on Thursday, where it unveiled tools that help developers collect data about their apps and make money from them using Yahoo advertising services.Many of the tools come courtesy of Flurry, a mobile analytics and advertising company Yahoo acquired last year. Flurry now has more than 200,000 developers using it’s tools, Yahoo CEO Marissa Mayer said Thursday. Yahoo hopes to get even more developers on board by giving them new ways to see how their apps are performing and by baking Yahoo advertising options directly into Flurry.To read this article in full or to leave a comment, please click here

Android malware fakes phone shutdown to steal data

Next time you turn off your Android phone, you might want take the battery out just to be certain.Security vendor AVG has spotted a malicious program that fakes the sequence a user sees when they shut off their phone, giving it freedom to move around on the device and steal data.When someone presses the power button on a device, a fake dialog box is shown. The malware then mimics the shutdown animation and appears to be off, AVG’s mobile malware research team said in a blog post.“Although the screen is black, it is still on,” they said. “While the phone is in this state, the malware can make outgoing calls, take pictures and perform many other tasks without notifying the user.”To read this article in full or to leave a comment, please click here

Lenovo admits to Superfish screw-up, will release clean-up tool

Lenovo has admitted it “messed up badly” by pre-loading software on some consumer laptops that exposed users to possible attack, and said it will soon release a tool to remove it.“I have a bunch of very embarrassed engineers on my staff right now,” Lenovo CTO Peter Hortensius said in an interview Thursday. “They missed this.”Users have been complaining since September about the third-party program, called Superfish, which injects product recommendations into search results. But it only emerged Wednesday that the program also opens a serious security hole.To read this article in full or to leave a comment, please click here