Search

Home > Packet Pushers - Network Break > Network Break 24
Podcast: Packet Pushers - Network Break
Episode:

Network Break 24

Category: Technology
Duration: 00:34:05
Publish Date: 2014-12-15 09:53:52
Description:


It s time for the Network Break! Sit back, grab a coffee, and join us for an analysis of the latest IT news, vendor moves and new product announcements. We ll separate the signal from the noise–or at least make some noise of our own.


http://blogs.cisco.com/news/protecting-innovation

The heart of our action regards Arista s deliberate inclusion in its products of 12 discrete and important Cisco features covered by 14 different U.S. patents. All of these features are being used by Cisco currently and in products we ship to our customers. None of the implementations are incorporated in industry standards. They were patented by individuals who worked for Cisco and are now at Arista, or who at Cisco worked with executives who are now at Arista. These Cisco-created features and implementations are incorporated by Arista in their entirety into Arista s products.


GCHQ s jihad on tech firms can only fail | Technology | The Guardian

The current solution is to route everything past US lawyers. A policeman in Oxford or Bogota or Cairo who wants electronic evidence from a US firm has to file a request under a mutual legal assistance treaty (MLAT), which is scrutinised by both countries authorities and by the service provider s lawyers. This can take ages; the US Justice Department has a backlog that Congress won t give it the money to clear.


Statement on Internet Confidentiality | Internet Architecture Board

Newly designed protocols should prefer encryption to cleartext operation. There may be exceptions to this default, but it is important to recognize that protocols do not operate in isolation. Information leaked by one protocol can be made part of a more substantial body of information by cross-correlation of traffic observation. There are protocols which may as a result require encryption on the Internet even when it would not be a requirement for that protocol operating in isolation.

Vested interestes led by Cisco and Service Providers are determined to intercept your traffic and sell you personal details to the highest bidder regardless of intent or purpose.


Juniper Whips Out Knife, Slices Off Security Products

it will jettison the FireFly Host, WebApp Secure and DDoS Secure products from 2015, though current customers will continue to receive support .


Friday News Analysis: Rumors Around Juniper s Security Products Ethan Banks on Networking


Juniper Offers White-Box Switch
http://searchnetworking.techtarget.com/news/2240235938/Juniper-offers-branded-white-box-switch

Sounds like you still have to pay Juniper for the JunOS license, even if you replace the OS with something else.


More Pain Ahead for HP and Other Big IT Vendors: Enterprise Cloud Use Set to Skyrocket in 2015 Kurt Marko
http://www.forbes.com/sites/kurtmarko/2014/12/02/enterprise-cloud-use-skyrocketing/

HP needs to replace every dollar of lost hardware revenue with over two dollars of services to generate the same profit. The cloud isn t just disruptive to established business models, it s eating through the profits of big, established IT hardware and software vendors like a biblical swarm of locust.


Cisco Makes Big Analytics Push | Light Reading

Vendors are moving moved past the implement SDN in products phase and starting to deliver new business uses and use cases

Announcing Connected Analytics for IoE


The post Network Break 24 appeared first on Packet Pushers.

Total Play: 0

Some more Podcasts by Packet Pushers

2K+ Episodes
Packet Pushe .. 80+     3
1K+ Episodes
Packet Pushe .. 20+     3