Bitcoin started as a transparent open source currency that provided anonymity. It also provided advantages over traditional currency. Bitcoin is not bound to any organization or country. It is a peer-to-peer trading currency, so it is not subject to financial institutions such as banks, merchants, or payment gateways. A Bitcoin, in almost every way, is like real currency coins that you can.
Cisco, at the RSA 2014 Conference in San Francisco announced they are committed to the open source community and would continue to support Snort and ClamAV open source projects (I did not see anything on the Razorback project). Additionally, Cisco unveiled a new open source initiative called Open App ID. Open App ID will allow the open source community to contribute code to identify applications.
(This blog posting was written with the understanding that the reader already understands how standard LISP operates from a control and data plane perspective.) Overview For those who have looked into LISP Extended Subnet Mode (ESM), we have all come to the realization that it is a great leap in technology but not quite ready for prime time. Cisco will be releasing LISP Multihop ESM during.
The future of security must reach beyond the capability of an appliance. There are too many attack vectors that are continuously changing to detect with a silo solution. It basically comes down to this …. there are only so many signatures that can be checked against as well as behavior algorithms that can be put in place before you must let traffic pass. Odds are, a malicious attacker.
Management of security devices is a critical function for maintaining the best performance and being aware of security related events. Cisco has released their second generation of ASA, which includes new management options. This post will cover the new management interface and compare it to the previous options. Cisco next generation ASA Here is the quick and dirty on Cisco’s next generation.
Overview BYOD is all the rage lately so it is imparative for us to be able to get it working properly. One environment that I found particularly challenging was getting Central Web Authentication working with FlexConnect and locally switched WLANs. In this article I will step through a working configuration from both the ISE (Identity Services Engine) and WLC (Wireless LAN Controller).
Organizations are replacing their Stateful firewalls with Next-Generation firewalls (NGFW) and Next-Generation Intrusion Prevention systems (NGIPS). Most traditional firewalls are nothing more than packet filters that keep track of who initiated the traffic to automatically allow response traffic back to originator. IPS vendors such as Sourcefire and McAfee (Intel Security) are rapidly.
MPLS Multicast Routing (IOS) Here are my notes for configuring multicast in an MPLS environment from a recent training. This will be broken down into four major sections with output samples for each configuration step and validation: MPLS in the Core Multicast between the PE/CE Multicast Distribution Tree Final Validations and Test BASIC TOPOLOGY MPLS IN THE CORE Core.
I was recently asked to present a Brighttalk Webinar on Software Defined Networks (SDN) and Network Virtualization. Apparently there is a fair amount of confusion around these two concepts. You can view the presentation at www.brighttalk.com, and search for my name. I only had 45 minutes to do the presentation, so obviously I had to leave a lot out. That being said, I wanted to.
5D optical memory in nanostructured quartz glass could lead to unlimited lifetime data storage The image shows the digital data recorded into 5-D optical data storage. (Picture: Eurekalert.org) Using nanostructured glass, scientists at the University of Southampton have, for the first time, experimentally demonstrated the recording and retrieval processes of five dimensional digital.