An Introductory Guide to Developing Fault-Tolerant Networks

In Greek mythology, the Titan Prometheus was chained to a rock. Every day, an eagle flew down and ate part of his liver. The organ regenerated during the night, replenishing the food source. The liver is one of the few organs in the human body that can spontaneously regenerate. Even more impressive, is the fact that while the liver is regenerating and fixing itself, it is still functional. The ancient Greeks knew of this capability and incorporated it to their mythology almost 3000 years ago.

read more

Online Credit Theft Happened to Me

Pling Pling!  You all know the tone when a new message arrives to your private mail inbox.

Recently, when this happened to me, I checked the message subject and was shocked right away. "Urgent: Please call me back!"  In our business world this kind of e-mail happens, but in this case the sender was my personal bank manager. In the last 10 years, I have never received a message like this from him.  I gave him a call and my manager told me that my wife’s credit card was compromised. An unknown person had used it for shopping at a sporting goods store in the US and to set up a VPN account to hide his criminal activities. 

read more

Networks Are Built to Be Up, But Often Are Not

I am constantly driving around town.  When I am lucky, there are no problems and I can easily get to my destination.  Rarely, there will be a scheduled event like a holiday parade or triathlon going through part of town requiring roads to be closed. Instead of trying to find an alternate path, I often end up turning around and going home. 

In between these two situations, I usually end up stuck in some traffic.  It may be the lunch time rush or the school bus is dropping off students after school.  This delays my journey, but I bear with the unforeseen circumstances and eventually make it where I was trying to get to.

read more

Best Practices for Hybrid Cloud/On-Premise Attack Mitigation

The cybersecurity industry keeps us all on our toes trying to follow up with solutions and breakthrough technologies – not only in advanced security capabilities, but also with state of the art methods of management and integration with other network security elements.

You want your security elements to play together in a well synchronized manner. You wouldn’t want to have to intervene to frequently make manual adjustments, would you?

read more

Application Availability is NOT Like Traveling in a Nor’Easter

Recently, I was trapped in the New York area due to a large snowstorm that we like to call a nor’easter. From midnight Thursday, January 21 until the evening of Sunday Jan 24 over a period of 68 hours, I had 5 or six flight cancellations, stayed in 3 different hotels, and ultimately went from LaGuardia to JFK to Newark to Philadelphia International airport by car/taxi/minivan.

read more

The Stadium of the Future Is Smart, But Is It Safe? How Hackers Could Target the Super Bowl – And How to Stop It

Levi’s Stadium is one of the most technologically advanced stadiums ever built.

It features 12,000 network ports, 1,200 access points, 1,700 beacons, and a DAS system, looking to accommodate an audience of 68,500 visitors. The stadium’s bandwidth capacity is 40Gbps (4x greater than the NFL stadium mandate put into place in 2015). Fans follow the game on 2,000 IPTVs.

read more

Is the Public Cloud the Ultimate Cyber-Attack Tool?

On January 2nd 2016, the BBC suffered from a cyber-attack that targeted all of its applications.  This attack resulted in unavailability for at least 3 hours.  It was also claimed that this DDoS Attack was over 600 Gbps – the largest DDoS attack ever recorded. The group claiming responsibility for the attack was New World Hackers and various articles have been published with one of the group members providing interviews about the incident. One of the main claims was that it was performed using Amazon by bypassing Amazon’s security measures and using administrative privileges.

read more

The Future of Application Delivery: Hyper-Convergence, Micro-Services AND On-Demand?

I am one of those people that like the concept of instant gratification when shopping.  I like that I can purchase something, and immediately hold it in my hands and use the item, whether it is a piece of technology or a cooking accessory.  This is not unlike what customers expect when they want to access an application on the network.

We live in a hyper-converged, micro-service driven, and on-demand world.  You may agree with that statement, but do we really understand what it means?

read more