Back in the summer of 2017, my book ‘Mastering Python Networking‘ by Packt Publishing was released, fulfilling a life-long goal of mine to become a published author (if you are interested in the background, content, and thoughts behind the book, you can check out Packet Pusher Priority Queue 135). It’s been an unbelievable ride since…
Companies don’t care about you. It’s up to you have a plan B for your career if plan A goes off the rails.
In October 2018, I heard a presentation from Cisco about the future of ACI. The presentation was entitled “ACI Anywhere.” The idea was to talk through how Cisco is expanding ACI’s footprint from the data center to other locations, including the cloud. The Cloud APIC was the most interesting part of the ACI Anywhere vision…
IT Security costs too much, paying fines is much cheaper
Cisco Nexus switches are running Linux under the hood for a while, but until Nexus 9K and updated code for Nexus 3K it was not easily accessible. It has changed in recent versions though and now you can have all the power of Linux, if you wanted it of course. How do I access Linux…
Don’t let vendors sell you FUD and waste your money. Consider your risk and mitigations.
Cato Networks has announced a new SD-WAN appliance and new features to extend service availability in the event of device failures, network changes, and even the loss of Cato’s private network.
Nyansa, which monitors user experience for IT operations, has a new feature that lets willing customers unmask anonymized performance metrics to share with one another to facilitate collaboration and peer-to-peer learning.
Got questions about SD-WAN? Sign up for an online summit November 7th and 8th to learn about how to deploy branches more quickly, improve user experience, bolster security, and more. Hear from industry experts, analysts, and the Packet Pushers at this free event.
Introduction to DNS over HTTPS (DOH)
Juniper Networks believes that a new multicloud world creates an opportunity to lure enterprises with the promise of operational consistency: using Juniper software and automation to enforce uniform policies and security controls on premises and across public clouds.
Supply chain safety is more than just implants
Unsurprisingly, Enterprise IT is preventing good encryption because their security devices suck
Deep dive into compromising firmware on Supermicro BMC
One element of the US Govt is supporting vendors in denying the Bloomberg article
A big article from Bloomberg claiming that certain custom manufactured models of Super Micro servers shipped with hardware implants of a company (Elemental) that was offering services to US Security agencies. This company was later sold to Amazon and sold services to a company later acquired by Apple for the Siri voice product. Bloomberg published a…
Seems everyone wants to move to the cloud but, should they move? It’s the classic answer: it depends. What workloads, projects and companies are best for the cloud? Certain companies and projects were designed for the cloud and others are not. To start off I was going to give a definition of what the cloud…
Join the Packet Pushers and special guests for Virtual Design Clinic 2, a live mini-conference that’s online and absolutely free. Learn from deep-dive tech presentations and get your networking questions answered. Sign up now to reserve your place.
After panel session about the value of security, Simon said that we need more operations and better people operating the security that we already have. Thats one of Greg’s hot button issues so he got him in front of the camera to get a bit deeper on how Secrutiny does this and the sort results…
The money’s good. Most everything else isn’t. How much more are you willing to take at this job?
The problems begin when people don’t have imposter syndrome.
Juniper has announced a new software package, Contrail Edge Cloud, that targets service providers and telcos building out edge nodes to support existing and new applications. The package bundles software from Juniper and Red Hat for networking, compute, orchestration, and security.
Docker is not known for superior out-of-the-box security. By default, Docker management code and also code inside Docker containers is running as root. Read on to learn how to deal with these facts if you want to leverage Docker on a management server.
WLAN vendor Mist says it has enhanced its machine learning capabilities to improve anomaly detection, and has boosted the number of natural language queries its virtual assistant can respond to.
Geoff Huston asks the questions that other people don’t