[player] This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have coffee break. Show Links Cisco’s 3 Commandments – Drew’s take on Chambers’ CLUS keynote Cisco […]
The post Coffee Break Show 9 appeared first on Packet Pushers.
This is “The Coffee Break”. A podcast on state of the networking business where we discuss vendors moves and news, analysis on product and positioning, and look at the business of networking. In the time it takes to have coffee break. Show Links Cisco’s 3 Commandments – Drew’s take on Chambers’ CLUS keynote Cisco Faces […]
The post Coffee Break Show 9 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
Having been in this industry longer than I care to think about (I cut my teeth in operations and systems programming on mainframes and early Intel 8080-based ‘microcomputers’), I’ve seen a few technology innovations that were truly disruptive and some that claimed to be but ultimately morphed into something else or were relegated to a niche (remember the Infiniband ‘revolution’ in the early 2000s?). Software defined networking and network functions virtualization clearly threaten to upset the status quo, which in this case, is the vast ecosystem of hardware-based switched and routed networks, and the network equipment manufacturers who build the gear. Cisco, arguably, has the most to lose, but potentially, the most to win also.
In Peter Burrows’ recent Bloomberg article, reflecting how SDN has become mainstream news, he points out that the existing market for switches and routers is growing at the very modest rate of three percent a year. While this business is the lifeblood of companies like Cisco, Juniper, Alcatel-Lucent and Huawei, it is becoming commoditized with downward price pressure and diminishing technological differentiation. These players can certainly Continue reading
Takeaway - Corsa Networks is focussed on provided a hardware data plane for SDN WAN use cases.
The post Briefing: Corsa Technology appeared first on EtherealMind.
This article at Seeking Alpha shows that John Chambers sold more than 30% his Cisco shares last month and is just one of 8 other executives who sold significant numbers of shares in the last month.
The post Response: John Chambers sold more than 30% of his Cisco shares in last month. Heavy sales from others. Thats not good. appeared first on EtherealMind.
Couple days ago I made an interesting talk about Video Traffic over Internet. Sales engineer goes to company and he claims that Video traffic can be carried over Internet without any problem. This is of course wrong and to understand why I have to explain some technical concepts. Main take away from this article is […]
The post Video over Internet appeared first on Packet Pushers Podcast and was written by Orhan Ergun.
This year I have worked on a number of projects and most of them had no planning while others had very little. The planning phase of a project is the most critical part of a project. Planning can not only make or break a project, but your reputation as well. If a project doesn’t go […]
The post Planning a Project Before Your Execution appeared first on Packet Pushers Podcast and was written by Charles Galler.
I'm be in San Francisco next week and available of meetings and #BeerOclocks
The post Lets Meet: Travelling in San Francisco Jun16-22, 2014 appeared first on EtherealMind.
You might be asking yourself why a network engineer would be concerning himself with a product like Chef. It’s a long story, but lets start by saying that my interest was first peaked when I heard that the new line of Cisco Nexus switches would have a integrated Chef client. I’ve known about Chef and Puppet for a long time, but I’ve never really sat down and looked to see how they worked. So rather than starting with Chef on Nexus, I thought it would be prudent to get some base experience with the application in a more ‘normal’ application.
So how does this fit into networking? I think we can all agree that data center networking can change. I’m carefully phrasing that statement by using the word ‘can’. If you don’t know it already, I don’t buy the ‘SDN will change everything you do’ line of thinking. In fact, I try as hard as I can not even to use the term SDN. Why? Because it’s far too vague of a term that can mean almost anything depending on you how you want to interpret it. Beyond being a Continue reading
After a few fat-fingered attempts to get the password entered, i realised I had locked myself out of a new Space installation. There’s only one user at that stage – ‘super’. And now I’ve locked the account. Damn.
To unlock this, you will need to go on the console and enter debug mode. This means you need to know the admin and maintenance mode passwords. Assuming you do, do the following:
mysql> use build_db
Database changed
mysql> select * from USER_IP_ADDRESS;
+--------+--------------+---------------------+--------------+----------+---------+
| id | ipAddress | ipLockedTime | failureCount | isLocked | user_id |
+--------+--------------+---------------------+--------------+----------+---------+
| 229377 | 172.20.45.85 | 2014-06-11 16:29:07 | 0 | 1 | 610 |
+--------+--------------+---------------------+--------------+----------+---------+
1 row in set (0.00 sec)
Update the table to make isLocked 0:
mysql> update USER_IP_ADDRESS set isLocked=0;
Query OK, 1 row affected (0.08 sec)
Rows matched: 1 Changed: 1 Warnings: 0
mysql> select * from USER_IP_ADDRESS;
+--------+--------------+---------------------+--------------+----------+---------+
| id | ipAddress | ipLockedTime | failureCount | isLocked | user_id |
+--------+--------------+---------------------+--------------+----------+---------+
| 229377 | 172.20.45.85 | 2014-06-11 16:29:07 | 0 | 0 | 610 |
+--------+--------------+---------------------+--------------+----------+---------+
1 row in set (0.00 sec)
mysql> quit
This post will be the first in a series that examine what I think are some of the powerful security capabilities of the VMware NSX platform and the implications to the data center network architecture. In this post we’ll look at the concepts of Zero Trust (as opposed to Trust Zones), and virtualization-centric grouping (as opposed to network-centric grouping).
Note: Zero Trust as a guiding principle to enterprise wide security is inspired by Forrester’s “Zero Trust Network Architecture”.
We want to be able to secure all traffic in the data center without compromise to performance (user experience) or introducing unmanageable complexity. Most notably the proliferation of East-West traffic; we want to secure traffic between any two VMs, or between any VM and physical host, with the best possible security controls and visibility – per flow, per packet, stateful inspection with policy actions, and detailed logging – in a way that’s both economical to obtain and practical to deploy.
Until now, it hasn’t been possible (much less economically feasible or even practical) to directly connect every virtual machine to its own port on a firewall. Because of this, the Continue reading
This post will be the first in a series that examine what I think are some of the powerful security capabilities of the VMware NSX platform and the implications to the data center network architecture. In this post we’ll look at the concepts of Zero Trust (as opposed to Trust Zones), and virtualization-centric grouping (as opposed to network-centric grouping).
Note: Zero Trust as a guiding principle to enterprise wide security is inspired by Forrester’s “Zero Trust Network Architecture”.
We want to be able to secure all traffic in the data center without compromise to performance (user experience) or introducing unmanageable complexity. Most notably the proliferation of East-West traffic; we want to secure traffic between any two VMs, or between any VM and physical host, with the best possible security controls and visibility – per flow, per packet, stateful inspection with policy actions, and detailed logging – in a way that’s both economical to obtain and practical to deploy.
Until now, it hasn’t been possible (much less economically feasible or even practical) to directly connect every virtual machine to its own port on a firewall. Because of this, the Continue reading
This post will be the first in a series that examine what I think are some of the powerful security capabilities of the VMware NSX platform and the implications to the data center network architecture. In this post we’ll look at the concepts of Zero Trust (as opposed to Trust Zones), and virtualization-centric grouping (as opposed to network-centric grouping).
Note: Zero Trust as a guiding principle to enterprise wide security is inspired by Forrester’s “Zero Trust Network Architecture”.
We want to be able to secure all traffic in the data center without compromise to performance (user experience) or introducing unmanageable complexity. Most notably the proliferation of East-West traffic; we want to secure traffic between any two VMs, or between any VM and physical host, with the best possible security controls and visibility – per flow, per packet, stateful inspection with policy actions, and detailed logging – in a way that’s both economical to obtain and practical to deploy.
Until now, it hasn’t been possible (much less economically feasible or even practical) to directly connect every virtual machine to its own port on a firewall. Because of this, the Continue reading
I came across this infographic from Anna Vital of Funders and Founders and loved it. As relevant as some of it is, there is an obvious focus on running a startup and not working in IT. Because of that I thought it might be useful to do something similar around the ‘rules’ I work by; my workplace and career philosophy […]
The post The 24 Rules I Work By – Infographic appeared first on Packet Pushers Podcast and was written by Steven Iveson.
For the last 20 years, a “silicon moat” that has protected Cisco and other networking vendors from market competition. Arista was one of the first startups to embrace merchant silicon,open source software and a modern software development methodology to focus on core value like reliability and features.
The post Perspective on Arista IPO and Market Positioning appeared first on EtherealMind.
HP Discover is happening this week and have three announcements that I'm summarising here. They are Virtual Cloud Network (VCN), FlexFabric 7900 switch and a supporting package of consulting to implement cloud in your organisation.
The post Briefing: HP Helion, Virtual Cloud Networking, FlexFabric 7900, SDN and OpenStack at HP Discover appeared first on EtherealMind.
For best article visual quality, open Introduction and LAB tutorial of HP Helion Community Edition, the OpenStack based “cloud” system that can give you a personal cloud! directly at NetworkGeekStuff.
Hewlett-Packard (HP) is a long enterprise supporter of cloud technologies and early this year, they released publicly HP Helion Community Edition (CE). HP Helion is HP’s OpenStack based cloud system with which HP plans to provide value added services (both in sense of software and service) with the upcoming release of HP Helion Enterprise edition later this year. In this article, I plan to introduce you to the HP Helion CE, quickly guide you through the installation, basic operations and in the end get you a quick view on the OpenStack architecture in general.
For a long time HP has been providing cloud solution based on their internal Cloud Service Automation or “CSA” system to enterprise grade customers as part of their portfolio. I had access to several projects using this environment and although I still have mixed feelings about their effectiveness, they were a step in the right direction as classical (now called “legacy”) data-centers are loosing popularity to cloud and other automated systems. The Continue reading