Cisco Shrinks in Switching, Routing and DC
Cisco shrinking overall ~2% per quarter. 10% down in routing, 5% down in switching, 4% down in DC. Increases dividend, investors happy. Cisco reported $11.6 billion in revenue for Q2 2017 on February...
View ArticleFrequently Asked Questions: Submarine Cables 101
Useful background information on oceanic cabling from Telegeogrphy. I’ve been involved with TeleGeography’s research on submarine cables since 2000. Over the years I’ve fielded numermous questions...
View ArticleResearch: The Business Bene ts of Automation and Orchestration – Cisco
Whitepaper from Cisco SPBU that nicely sums the advantages of orchestration and automation. Although its focussed on the service provider market, you could easily use this for an Enterprise proposal...
View ArticleResponse: IETF RFC 8033 Proportional Integral Controller Enhanced (PIE)
Proportional Integral Controller Enhanced (PIE) is another active queue management algorithm for dropping packets. Similar to RED, PIE randomly drops an incoming packet at the onset of congestion....
View ArticleResponse: Cisco’s Identity Crisis: Complexity, Pride, and SD-WAN
An excellent post from Eyvonne Sharp highlights one of Cisco’s weakest areas, its enduring passion for too many products, too many options, too much complexity: With that in mind consider Cisco, a...
View ArticleMy ITIL Experience In An Org Chart
Some time back, someone challenged me to explain how ITIL impacted my workflow. The diagram is largely inspired by my time working for a Top 5 IT Consultancy which was utterly convinced that more...
View ArticleVideo: Disk Drop
I do sometimes miss the old days of having a ‘private office’ (aka computer room) to play with stuff. Link: Disk Drop – YouTube – The post Video: Disk Drop appeared first on EtherealMind.
View ArticleCisco equipment Comprehsively Pwned by US Government
Tough day for Cisco. A large number of Cisco software releases and devices were comprehensively pwned by US Gov spy agencies. This isn’t surprising, thats what they are supposed to do but now the...
View ArticleVideo: “…You can either be a farmer, or join a politically motivated global...
Funny and insightful. Maybe. Jake Davis, former Anonymous and LulzSec hacker, shares his hacker journey while exploring just what makes hackers tick… “…You can either be a farmer, or join a politically...
View ArticleHuman Infrastructure And Always Planning to Quit and Move On
I did a video for “Speak With A Geek” where I sat down with David Sparks where I talk about approaching your career in a similar fashion to approaching your technology. Your value to the business is...
View ArticleVideo: Software Secures the World
Martin Casado doesn’t have a proper job since he left VMware. This gives him times to think deeply about the future of IT security as part of his role of wasting investors money at A16Z and considering...
View ArticleGoogle takes Symantec to the woodshed for mis-issuing 30,000 HTTPS certs...
Its become clear that the only way to improve security of certificate authorities is to follow through on threats. Symantec has been delinquent since 2012 in securing their processes and software. We...
View ArticleCisco IOS and IOS XE Software Cluster Management Protocol Remote Code...
Serious and easily exploited flaws in older Cisco IOS software. Commonly used, but old, switches used for Campus and SME Data Centres. Serious problem. Thoughts: Demonstrates how older Cisco devices...
View ArticleResponse: AT&T Joins The Linux Foundation as a Platinum Member
Once upon a time its was all vendors in the Linux Foundation. The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration, today announced that AT&T has...
View ArticleResearch: Toward new possibilities in threat management – PWC
Report derived from annual Global State of Information Security® performed by PWC. Good for managers and executives who can ‘t speak technology to introduce them to the ideas around cloud-based data...
View ArticleOpinion: Why You Will Never Be Better Than Automation
Michelin starred restaurants are serving Nespresso coffee . Why ? Because automation produces a consistent coffee. With sufficient quality inputs (coffee, machine etc), you will achieve a better...
View ArticleRFC 8114 IPv4 Multicast over IPv6 Multicast. Ouch.
While most people are getting excited about ‘cloud’ there are multi-billion dollar businesses working on upgrading their networks to early-2000’s level technology. This proposed standard complexifies a...
View ArticleResearch: The Security Impact of HTTPS Interception
The use of TLS interception by outbound proxy servers is causing serious problems in updating the TLS standard to Version 1.3. At the same time, middlebox and antivirus products increasingly intercept...
View ArticleResponse: Employee Burnout Is a Problem with the Company, Not the Person
This is so obvious. The psychological and physical problems of burned-out employees, which cost an estimated $125 billion to $190 billion a year in healthcare spending in the U.S., are just the most...
View ArticleLoading Policy configuration in the Local file
You have been reading the Blue Coat forums and someone has given you a piece of config that you need to use. This post shows you how to load the config snippet Step 1 – Go to Configuration, Policy,...
View Article