2014 Recap and 2015 Goals

When I started this post, the following mental image popped into my head, and I found it an apt description of 2014:

Oh well…..let’s give this a try anyways.

2014 Recap

I’ll list off the goals I set in my post one year ago, and reflect upon how they were pursued in 2014:

Write Code – I knew when I made this goal that it was going to be hard to quantify; I just knew that writing code was something I had been passionate about. Though I have always maintained this skillset in some form or another, I knew I wanted more, and a year ago, I made the goal of increasing my involvement with software development.

In 2014 I made two more contributions to OpenDaylight, specifically pertaining to the Unit Testing and Integration Testing efforts of the OVSDB project (much thanks to Madhu Venugopal and Dave Tucker for their unrelenting patience while I stumbled through Junit fundamentals). I also did a lot of work on various projects, like Ansible and Schprokits extensions, as well as standalone projects, all of which are Continue reading

2014 Recap and 2015 Goals

When I started this post, the following mental image popped into my head, and I found it an apt description of 2014: Doing the year-end recap post. 2014 was all: pic.twitter.com/aXtC2sjN8l — Matt Oswalt (@Mierdin) December 30, 2014 Oh well…..let’s give this a try anyways. 2014 Recap I’ll list off the goals I set in my post one year ago, and reflect upon how they were pursued in 2014:

2014 Recap and 2015 Goals

When I started this post, the following mental image popped into my head, and I found it an apt description of 2014: Doing the year-end recap post. 2014 was all: pic.twitter.com/aXtC2sjN8l — Matt Oswalt (@Mierdin) December 30, 2014 Oh well…..let’s give this a try anyways. 2014 Recap I’ll list off the goals I set in my post one year ago, and reflect upon how they were pursued in 2014:

2014 End of Year Blog Statistics

Although I wasn’t actively blogging this year, I’ve still been tracking views on the site and keeping an eye on number of visitors. I am looking forward to blogging again in 2015 so I wanted to collect the 2014 viewership statistics so I had something to compare to at the end of 2015.

Despite the lack of new content, I’m pretty happy that people are reading the existing articles and continue to post comments and email me questions. Please keep them coming!

Here are the year-over-year statistics for Jan 1 2014 – Dec 30 2014.

Overall YoY comparison:

2014_overall_stats

Once again these stats are courtesy of Google Analytics. If you compare this chart to the 2013 equivalent, you’ll see that Google has changed some of the metric names. Visits are now called Sessions and Unique Visitors are now Users. And like last year’s chart, the first number in gray is the current year’s number, the second number the previous year.

While the number of Users and Sessions grew at a slower rate than in 2013, they still grew! Very cool.

2014_new_vs_returning_visitor

As was the case in 2013, the users visiting the site are primarily made up of brand new visitors. It Continue reading

A Single Architect for Your Network

I finally got around to reading The Mythical Man Month (MMM), a famous book on large-scale software development projects (think operating systems) written in 1975, revised in 1995, and still strikingly relevant today in the neighboring field of building and managing massive networks.  While multiple points land directly on those of us working on massive […]

Author information

Keith Tokash

Keith Tokash

Keith Tokash, CCIE (R&S) #21236, began his career in 1999, and has spent the last decade running around large content and small ISP networks. He spends his spare time with his newborn son, on the mat at the local Jiu-Jitsu gym, and trying to keep his fat yap shut.

The post A Single Architect for Your Network appeared first on Packet Pushers Podcast and was written by Keith Tokash.

Q And A Should Include The E

The IT world is cyclical for sure. I’ve seen trends and topics repeating themselves over and over again in my relatively short time here. I find it interesting that we keep solving similar problems over and over again. I also find it fascinating that this particular issue leads to the reason why blogs are so important.

Any Questions?

Questions abound in IT. It’s the nature of the industry. However, it’s not just new questions that we create when technology leaps past us. We keep asking the same questions over and over again. This is the field of study that created the FAQ, remember?

In recent memory, I find the same questions being asked over and over again:

  • What is SDN?
  • How can SDN help me?
  • What makes this different from what we’ve done before?

You’ve probably asked those very same questions. Perhaps you found the answers you were looking for. Perhaps you’re still trying to figure it out. The problem is that those questions are still being asked. The industry should have evolved to the point where the simple questions have been answered with simple answers. Complex questions, or those questions that need more in-depth Continue reading

Risky Business #349

There’s nothing like taking a 12 hour road trip to help get caught up on podcasts. Even though I have a few more to go, I am feeling pretty accomplished with my progress.

One podcast episode jumped out at me as particularly interesting. This was the Risky Business 2014 [year] in review episode. This episode has the most interesting excerpts and commentary for breaches throughout this year. Have a listen by following the link below.

Risky Business #349 — 2014 in review | Risky Business

Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may not reflect the position of past, present or future employers.

The post Risky Business #349 <– Wow, a LOT Happened in 2014 appeared first on PacketU.

Top 10 Network Management Blog Posts of 2014

Top 10 Network Management Blog Posts of 2014


by Steve Harriman, VP of Marketing - December 30, 2014

As the year winds down, we were interested to discover our most viewed blog posts of 2014, our inaugural year of the Knetwork Knowledge blog. Not surprisingly, the majority of articles concern SDN. From the rise of production deployments among service providers to management concerns to job security worries, SDN continues to alter the network landscape, attempting to assert its place as the disruptive technology it promises to be.

These top 10 articles present a good snapshot of SDN’s evolution this year as well as the network issues in general. Here they are in order of popularity (See also our short summary of each one below):

  1. SDN Deployments/Worries Rise Among Service Providers
  2. No, Software Defined Networking Will Not Doom Engineers
  3. First Impressions of the OpenDaylight Helium Release
  4. Network Management Challenges of 2014
  5. SDN Analytics & Orchestration from the 17th Annual SDN/MPLS Conference
  6. Okay, Maybe It IS the Network (Infographic)
  7. The Best Presentations on SDN Analytics and Wide Area Orchestration at SDN/MPLS 2014
  8. Necessity of Monitoring and Analytics in the SDN Era
  9. Netflix is using obfuscation to not pay their fair share!
  10. Continue reading

2014 End of Year Blog Statistics

Although I wasn't actively blogging this year, I've still been tracking views on the site and keeping an eye on number of visitors. I am looking forward to blogging again in 2015 so I wanted to collect the 2014 viewership statistics so I had something to compare to at the end of 2015.

Despite the lack of new content, I'm pretty happy that people are reading the existing articles and continue to post comments and email me questions. Please keep them coming!

PQ Show 39 – HP Networking – 3 Virtual Network Strategies Compared

HP Networking has three solutions for overlay or virtual networking in the Data Centre. Each solution meets different customer needs Show Notes HP Networking has three products for network virtualization and each product addresses different customers needs. NSX Federation – physical networking integrating with NSX Distributed Cloud Networking (DCN) Virtual Cloud Networking (VCN) NSX Federations […]

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post PQ Show 39 – HP Networking – 3 Virtual Network Strategies Compared appeared first on Packet Pushers Podcast and was written by Greg Ferro.

Private VLAN Trunks :: Pt. 2: The Secondary (isolated) Trunk

Picking up where we left off on the first series, I want to discuss the other trunking option that we have in regards to PVLAN trunks. We might need a quick review on our PVLAN structure before we begin, however:

vlan 100
private-vlan primary
private-vlan association 200-201
vlan 200
private-vlan community
vlan 201
private-vlan isolated

This second trunk type is actually called the secondary, or isolated trunk. Much like the promiscuous trunk, this one has a pretty specific purpose, and that is to flip the VLAN tag when a frame is traversing a trunk. This time however, rather than removing the secondary VLAN tag, and replacing it with the primary tag, we are going to be doing the opposite! Remember how we were doing it with the promiscuous trunk? What happened here is the node with MAC A ingresses and is placed in VLAN 200. However, when it needs to reach the L3 GW (the router), we have to remove the secondary VLAN tag and replace it with the primary VLAN ID of 100 (so that it will hit the proper sub-interface on the router).

20141118_01

The routers return traffic will naturally be in VLAN 100 based on the sub-interface configuration. But Continue reading

Vendor Marketing as a Security Risk – Badge Scans and Sign-up Attack Vectors

Many old-style marketing people believe that capturing your contact information is the first step in making a sale. But any capture of your personal information is also leaking critical security information about your organisation, technology and personnel that are perfect for reconnaisance.


The post Vendor Marketing as a Security Risk – Badge Scans and Sign-up Attack Vectors appeared first on EtherealMind.