Earlier this month, many of the world’s biggest cloud-service providers quietly cooperated to update the open-source Xen hypervisor software. What wasn’t publicly revealed until after the update was safely completed, however, was that it actually was a carefully coordinated operation
My story to get certified in Juniper, this was a mixed combination of failure and success.
In 2010 I got the opportunity to work as a Juniper partner, where certification is essential to introduce yourself. However I had done Cisco certification before I started my professional carrier so I had no focus to work and certify in Juniper. At that time I had taken three certification exams (JNCIA-Junos, JNCIA-ER, and JNCI
The transformation of DevOps practices into network operations (NetOps) is not as straightforward as the adoption of DevOps practices in the virtualized server environment. The rigid operational environments and resource limitations on network devices make it much harder to carve out a test network from a production network than it is to spin up test virtual machines (VMs) on a production compute server. Despite thes
Private clouds are transforming IT organizations and an increasing number of enterprises are embracing the opportunities cloud computing provides. For those companies looking to embark on a journey to the cloud, Jonathan Davidson’s session entitled, “Lock In. Or Look Forward.” addressed how companies can avoid vendor lock-in when choosing a cloud infrastructure vendor; the value of openness, intelligence and best-i
Human trafficking has become one of the world’s most lucrative and despicable criminal enterprises, and the San Francisco Bay Area is a known hotspot. Because relatively little is known about the nature and scope of the problem in Silicon Valley, Juniper Networks Foundation Fund and Silicon Valley Community Foundation partnered to commission a first-of-its-kind study of human trafficking in the two-county region. T
There are barbwires, blockades, mine fields, and serious military presence at this 4-kilometer wide, 250-kilometer long strip fo DMZ between the two Koreas, to make sure that there is no unwanted trespassing. But since the 1970s, 4 underground infiltration tunnels have been discovered that went under the DMZ from North Korea to South Korea. Perimeter-based security is like the DMZ but you also need to prevent the dam
As a Chief Information Security Officer, I get a lot of questions about the cyber security threats and what worries me most. I field questions about Anonymous, geo-political hackers, cyber-extortionists, malware, and the like.
I’ve written before about how SDN and NFV will be catalysts for huge amounts of change and benefits in the telecoms industry. From a network infrastructure perspective SDN and NFV will most likely be one of the biggest changes I’ll see during my career. Though, recent comments from Deutsche Telekom highlight some of the risks from moving to NFV showing that we are probably past the peak of expectation and entering th
It’s Microsoft Patch Tuesday! In the October edition there are 8 updates; three are marked "Critical" and five are rated "Important". A total of 24 vulnerabilities were fixed over 8 bulletins this month. One of the Critical update MS14-056 is an all version Internet Explorer (IE 6 to 11) patch. This single update resolves 14 CVE's (Common Vulnerability and Exposure).
Earlier this month, many of the world’s biggest cloud-service providers quietly cooperated to update the open-source Xen hypervisor software. What wasn’t publicly revealed until after the update was safely completed, however, was that it actually was a carefully coordinated operation intended to head off a major security breach, as identified in the Xen patch advisory.
I learned computer networking flow / concepts through Juniper CLI. Well I appeared to become specialist and BANG it was not piece of cake. . I am currently studying JNCIP-SEC and I plan to appear for JNCIP-SP and JNCIE. I have taken Juniper STRM & Junos Space classes. From a guy sitting in the market I tell you honestly it’s a GO.
Every second company is going on network based apps and corporate VPNs all across the
The moment personal photos of Jennifer Lawrence, Kim Kardashian and other celebrities were leaked from iCloud it became global breaking news and suddenly everyone had questions and opinions about cloud security.
When I first met Juniper I was confused like Alice in Wonderland. I was pure "Cisco" person and never met any other vendor. It was 3 years ago. I worked that time with MX routers and I didn't like them. It was painful to collect information.
After some time I changed my employer and moved to another ISP. In my team we worked with Cisco and other router, but Juniper devices weren't there. I wasn't satisfied we did
It all started with Cisco. It was my engineering days when I first learnt about how things worked in network domain. The technologies fascinated me and I started developing interest in it. It was then suggested by one of my professors to take CCNA course. I researched about the course and joined a renowned training institute during my college days.
As days passed my engineering days came to an end and so did my CCNA