This is the blog of Ronald Bartels that wanders on and off the subject of problem management (that is how it started), but it is best described by Ray who says this is Daddy's thoughts! Like the best music is from the Eighties and a wee dram helps in solving most inconveniences.
Cisco today announced that it is working to patch multiple products
that are affected by the recently CVE-2019-15126)
was announced yesterday by security researchers at ESET and can be
leveraged by an unauthenticated attacker to decrypt data frames captured
from a nearby vulnerable device.
disclosed Kr00k vulnerability in WiFi
chips from Broadcom and Cypress. The flaw (
Read the article over at Bleeping Computer over here.
There are several factors that should
be considered when implementing an SD-WAN solution. One of them is
network monitoring. In this post, we review some SD-WAN challenges and how network monitoring can help overcome them.
In a Software-Defined Wide Area Network
(SD-WAN), a branch router uses two or more network connections to
dynamically route traffic over one another based on its profile. For
example, real-time Voice-over-IP (VoIP) traffic is sent through a low
latency MPLS circuit, while high bandwidth applications that don’t
require low latency are routed over a broadband Internet connection.
Another benefit of SD-WAN routers is that traffic is dynamically
distributed between links, on a per-packet basis, based on links’
congestion, latency, and loss.
Teraco will complete work on the first phase of a
massive new expansion to its data centre campus in Isando, east of
Johannesburg, by the middle of the year and is looking to complete a
second phase by year-end.
Eight of the world's biggest technology service providers were hacked by
Chinese cyber spies in an elaborate and years-long invasion, Reuters
found. The invasion exploited weaknesses in those companies, their
customers, and the Western system of technological defense.