The announcement is a major change in Cisco Security strategy and perspective and, I think, a promising step forward: From a strategic standpoint, we will focus on a “threat-centric” security model moving forward – meaning that we will put a heavier focus on the threats themselves versus policy or controls. Given the fast-changing threat landscape, […]
Can you imagine focussing so much on the performance of a single application, spending so much time and resources on the problem that eventually you conclude that the problem is happening inside the switch. Well, clearly Facebook has the luxury in this article where they talk about what drives their open networking strategy: A few […]
Ethan Banks is cranking out a series of blog posts on Enterprise QoS. He tells me that so far it has 15 parts. Here is the first post Enterprise QoS Part 01 – What is QoS, what does it do, and why do network engineers hate it?. And you can see the entire series of […]
Although yet to be confirmed, the Chaos Computer Club have been able to circumvent the fingerprint reader on an iPhone.
Big Deal. Big Hoopy Doo Deal. Golf Claps for the Kleva Kids.
Let me explain. The idea of retina or finger print scanning for any serious security application has long been discredited but not for the reasons that most people expect.
Bruce Schneier has been reviewing documents from Snowden and believes that all security platforms have been compromised by governments : Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent […]
Response: Three Bits of Advice From Discussing the Impact of VMware’s NSX at VMworld | IT Connection Blogs
This article from Mike Fratto at Current Analysis is great observation. Here is my view on the core topic: Networking vendors need to embrace homogeneity—that’s my first bit of advice—and present the most homogenous network to the virtual environment they can. By being homogenous, enterprises can swap out networking with far less disruption than having […]
While attending Cisco Live USA this year, Amy Lewis put me in the head lock and refused to let me go until I agreed to appear in a video for the current series of Engineers Unplugged. Clearly, you can’t say no in this situation. I chose my current topic of interest to talk about ( […]
Here is a set of packages for Sublime Text that do some really neat syntax checking and configuration acceleration. Great work from Richee!
I can’t remember where I found the link to this presentation that was given at DefCon21 called “The White Hat’s Dilemma”. It’s touches on issues of personal integrity when acting in an IT security position. Well worth five minutes to page through the 35 slides and be thoughtful. Source: <a target=”_blank” href=”http://unhandled.com” […]
I was commissioned by GigaOmPro to write a report on “SDN Challenges in Large Scale Deployments”. I spoke with a number of network and virtualization engineers about their perspectives on SDN, the challenges they faced and how they would use Software Defined Networking in their data centres. It was evident during the research phase is that many people are not clear on what Overlay Networking is and just how deeply Overlay Networking will change Data Centre architecture and especially the nature of the networking and security domains.