iPhone still king of enterprise mobile as usage skyrockets, study finds

Apple’s iPhones and iPads are still the most-used mobile devices in the enterprise, even as the market expands at high speed, according to a Citrix mobile analytics report released this morning. The study found that the total number of enterprise mobile devices in use rose by 72% over the course of the past year. A little less than two out of three of every business-focused mobile device runs iOS. Apple’s numbers are highest in Asia and the Americas, at 67% each, and slightly lower in Europe and the Middle East, at 57%. + ALSO ON NETWORK WORLD:Microsoft CEO Nadella joins Ballmer and Gates in making silly predictions + 18 ways to get the most out of Android 5.0 +To read this article in full or to leave a comment, please click here

iPhone still king of enterprise mobile as usage skyrockets, study finds

Apple’s iPhones and iPads are still the most-used mobile devices in the enterprise, even as the market expands at high speed, according to a Citrix mobile analytics report released this morning. The study found that the total number of enterprise mobile devices in use rose by 72% over the course of the past year. A little less than two out of three of every business-focused mobile device runs iOS. Apple’s numbers are highest in Asia and the Americas, at 67% each, and slightly lower in Europe and the Middle East, at 57%. + ALSO ON NETWORK WORLD:Microsoft CEO Nadella joins Ballmer and Gates in making silly predictions + 18 ways to get the most out of Android 5.0 +To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, February 10

Qualcomm pays up to end investigation in ChinaThe Chinese goverment has fined chip-maker Qualcomm about US$975 billion for abusing its dominant position in the market, including overcharging local mobile device manufacturers. Qualcomm’s Snapdragon chips go into many smartphones, and its wireless technology is licensed for use in a majority of 3G, 4G and LTE modems; renegotiated deals with Chinese handset makers should allow them to offer even cheaper smartphones to undercut competitors at the low end of that market.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, February 10

Qualcomm pays up to end investigation in ChinaThe Chinese goverment has fined chip-maker Qualcomm about US$975 billion for abusing its dominant position in the market, including overcharging local mobile device manufacturers. Qualcomm’s Snapdragon chips go into many smartphones, and its wireless technology is licensed for use in a majority of 3G, 4G and LTE modems; renegotiated deals with Chinese handset makers should allow them to offer even cheaper smartphones to undercut competitors at the low end of that market.To read this article in full or to leave a comment, please click here

HTIRW: The IETF Draft Process

In our deeper investigations of the IETF as a “sample standards body” in this (apparently forever running) series on how the Internet really works, let’s take a look at the IETF standards process. This is a rather sanitized, informal review — I may leave out some steps, or describe things in a way that doesn’t […]

Author information

Russ White

Principal Engineer at Ericsson

Russ White has scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, nibbled and noodled at a lot of networks, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, and his author page on Amazon.

The post HTIRW: The IETF Draft Process appeared first on Packet Pushers Podcast and was written by Russ White.

Kubernetes 101 – The constructs

In our last post, we got our base lab up and running.  In this post, I’d like to walk us through the four main constructs that Kubernetes uses.  Kubernetes defines these constructs through configuration files which can be either YAML or JSON.  Let’s walk through each construct so we can define it, show possible configurations, and lastly an example of how it works on our lab cluster.

Pods
Pods are the basic deployment unit in Kubernetes.  A pod consists of one or more containers.  Recall that Kubernetes is a container cluster management solution.  It concerns itself with workload placement not individual container placement.  Kubernetes defines a pod as a group of ‘closely related containers’.  Some people would go as far as saying a pod is a single application.  I’m hesitant of that definition since it it seems too broad.  I think what it really boils down to is grouping containers together that make sense.  From a network point of view, a pod has a single IP address.  Multiple containers that run in a pod all share that common network name space.  This also means that containers Continue reading

As Wi-Fi calls come to smartphones, networks get ready to carry them

Wi-Fi may carry many voice calls within the next few years, but the technology required to make those calls is still young in some ways.Mobile subscribers have been talking and doing video chats over Wi-Fi for a long time using Internet-based services such as Skype. Now carriers are offering ways to call up friends and family over wireless LANs using their regular phone numbers.Wi-Fi calling made a splash last year when the iPhone 6 came out with the capability, though a number of Android and other devices also have it. T-Mobile USA and Sprint both allow Wi-Fi calling with selected smartphones. AT&T and Verizon, as well as EE in the UK, plan to follow.To read this article in full or to leave a comment, please click here

Cisco ISLB Issue

Usually people are blogging on a certain topic because they want to share they knowledge with a certain protocol or product. Today I ll take another approach with that fact and I will actually do the exact opposite. I have an issue with ISLB which allows load balancing for my iSCSI sessions. Today I will elaborate […]

WLAN Capacity Planning: From Concept to Practice [Video]

Last week I presented at the Wireless LAN Professionals Conference (#WLPC) in Dallas, TX. The topic of my presentation was putting the concepts of WLAN capacity planning into practice.

Agenda:

  1. Factors of Network Performance (and why variable contention delay is critical to WLANs)
  2. Iterative WLAN Design Methodology
  3. Hands-On with the Revolution Wi-Fi Capacity Planner
  4. Real-World Example and Walkthrough (including tying capacity planning to RF planning)

The video is now available online:

 

If you would like a review of capacity planning concepts prior to watching the hands-on example, my presentation from last year's WLPC 2014 is also available online.


Cheers,
Andrew von Nagy

EIGRP Named Mode

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
EIGRP Named Mode or Multi-AF Mode is a new development in EIGRP starting in Version 15.x Its reason for being is to simplify the EIGRP configuration into one place, as previously with EIGRP classic version the configuration was between the interface and the global process which made it harder to see all the configuration relating... [Read More]

Post taken from CCIE Blog

Original post EIGRP Named Mode

Check Cisco ASA Connections with Nagios

Night time trafficOnce you’ve setup your Cisco ASA, you will want to monitor it to ensure that it’s operating normally. The plugin nm_check_asa_connections for Nagios, and compatible products, can warn your if the number of current connections gets too high. A very high connection count might indicate that there’s an attack under way on one of your servers, you have some hosts on your inside which are part of a botnet and is attacking someone else, or perhaps you’re just about to grow out of your current firewall and need an upgrade to a more powerful box.

Continue reading

Show 223 – Viptela and the Software Defined WAN

As the industry adoption of SDN gains rapid traction, the Wide Area Network is emerging as the leading use-case (read 2015 is all about SD-WAN). Aging architectures make the WAN the dinosaurs of enterprise infrastructure. While WAN optimization can address a short-term capacity problem, the bigger problems of high circuit costs, network rigidity and poor […]

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post Show 223 – Viptela and the Software Defined WAN appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Check Cisco ASA Connections with Nagios

Night time trafficOnce you’ve setup your Cisco ASA, you will want to monitor it to ensure that it’s operating normally. The plugin nm_check_asa_connections for Nagios, and compatible products, can warn your if the number of current connections gets too high. A very high connection count might indicate that there’s an attack under way on one of your servers, you have some hosts on your inside which are part of a botnet and is attacking someone else, or perhaps you’re just about to grow out of your current firewall and need an upgrade to a more powerful box.
Continue reading

Key questions to consider when evaluating hybrid cloud

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Hybrid cloud is the talk of IT, but to avoid costly, labor-intensive megaprojects you cannot escape, pay particular attention to minimizing implementation and management complexity. These questions will help you identify the best hybrid cloud architecture for your environment:

1. What are the top ways we will use our hybrid cloud in the next 12 to 18 months? 

In the midmarket, the No. 1 answer is disaster recovery (DR). A secondary data center for DR is a luxury most companies can not afford. Now, public cloud services have put DR within reach of virtually all organizations. The key is to identify the enabling technology that minimizes complexity, maximizes automation and does not overtax the IT staff. Easy cloud DR solutions exist today for midsized shops; don’t be lead into a heavy professional services project.

To read this article in full or to leave a comment, please click here

Debunking the myths about scale-up architectures

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads.

Today, much of the buzz is around scale-out architectures, which have been made popular by companies like Facebook and Google, because this architecture is commonly viewed as more cost-effective and “infinitely” scalable.

To read this article in full or to leave a comment, please click here