Categories
The World of Information Technology
TEKSMARTIT
Cisco Acquires Sedonasys Systems to Offer More Advanced Network Automation Platform
IBM optimizes quantum computing controls and accelerates workloads by 120 times
Tesla stops accepting Bitcoin payments! Cryptocurrency price drops
The implications of neglecting IPv6 on your internet facing services
Tip: How to know the history of Windows 10 updates quickly
Basic MPLS Tutorial
What is IPv4 Subnetting?
What is AWS? Amazon Cloud Services
Cisco Acquires Sedonasys Systems to Offer More Advanced Network Automation Platform
Sedona NetFusion platform to be integrated into Cisco Crosswork portfolio Cisco announced on Tuesday (11) its intention to acquire Sedonasys Systems, a specialist in hierarchical controllers (HCO). Cisco is eyeing the NetFusion platform, which allows for multiple vendors, multi-domain automation, and software-defined networking. “HCO is the brain that enables transformation
Read More
IBM optimizes quantum computing controls and accelerates workloads by 120 times
Enhanced systems have reduced the amount of time per job run from 1,000 microseconds to 70 microseconds. IBM announced on Tuesday (11) that its team demonstrated an acceleration of 120 times in the simulation of molecules while seeking an acceleration 100 times faster. The company links the feat to a
Read More
Tesla stops accepting Bitcoin payments! Cryptocurrency price drops
Elon Musk has an “invisible power” to be able to appreciate or devalue virtual currencies. After announcing that it would be possible to buy a Tesla with Bitcoin, the currency soared and hit record highs. Now, Elon Musk has confirmed that it is no longer possible to buy Teslas with
Read More
The implications of neglecting IPv6 on your internet facing services
TL;DR: Managing the online exposure of systems can be difficult. Sometimes IPv6 network configurations get forgotten, leading to services unknowingly connected to the internet. We’ve been (very) slowly adopting IPv6 since its introduction in 1995. This added protocol version allows computer systems to be available in two different address spaces (IPv4
Read More
Tip: How to know the history of Windows 10 updates quickly
Over the years, and if all goes well, Windows 10 will receive updates. These bring the expected improvements and bug fixes. Of course associated are also the news and improved features. These are present, but the user loses control of what he installed and when he did it. Windows 10
Read More
Basic MPLS Tutorial
MPLS is a new forwarding mechanism called “label switching” in which packets are forwarded based onlabels. However, hosts are unaware about labeled packets so routers will need to add a label when entering“MPLS area” and remove that label after leaving there. The idea of label switching is to have only
Read More
What is IPv4 Subnetting?
The quick definition: Subnetting is the process of taking a network and splitting it into smaller networks, known as subnets. It’s used to free up more public IPv4 addresses and segment networks for security and easier management. A quick rundown of IP addresses and binary To understand subnetting, you should first understand
Read More
What is AWS? Amazon Cloud Services
What is Cloud Computing? Cloud computing is a term referred to storing and accessing data over the internet. It doesn’t store any data on the hard disk of your personal computer. In cloud computing, you can access data from a remote server. What is AWS? Amazon web service is a
Read More
MX Design: Warm Spare
Building redundant WAN routing and security services mitigates a critical single point of failure in mission-critical networks. If a single gateway fails, a standby unit can seamlessly continue servicing clients without disruption. There have been many proprietary and standards-based gateway redundancy protocols developed over the years to solve this problem.
Read More
Inside the Cisco Meraki MX
Built on Cisco Meraki’s award-winning cloud-managed architecture, the MX is the only 100% cloud-managed Unified Threat Management appliance. MX appliances self-provision, automatically pulling policies and configuration settings from the cloud. Powerful remote tools provide network-wide visibility and control, and enable administration without on-site networking expertise. Cloud services deliver seamless firmware and security signature updates, automatically establish site-to-site VPN
Read More
Translator