SDN: Evolution in the horizon by Mr.Ken Maina of Dimension Data

Software Defined Networking (SDN) is among the hottest networking topics today and this technology promises to transform flexibility and cost profiles of IP networks together with the careers of the people within it.

Networks for a long time have required manual configuration and changes for expression of traffic policies. Most network functionalities as we know and use are implemented in a dedicated appliance that run the control, data and management planes. Key characteristics of this model is vendor lock-in to proprietary hardware, slow innovation of network functionalities, poor scaling and heavy provisioning and management overhead. SDN offers a departure from the old ways to whole new world of possibilities.

SDN offers decoupling of the control from the data plane that will centralize and simplify control of the network, make networks programmable and more agile, and create opportunities for policy-driven supervision and more automation.

Topics of discussion during the show:

· An introduction to SDN and its architecture
· What this technological shift means to engineers and end customers
· Key industry market players and use cases

————————————————————

To join the training session

————————————————————
  1. point your browser to this URL:  https://www.anymeeting.com/273-639-424
  2. Enter your email address,organization, job title and location
  3. Click log in

New Threats, New Tactics. Don’t be in the Dark, by Willys Wendoh and David Kaimenyi

The dark underworld of data security is constantly evolving. Once considered the realm of hotshot hackers and loners, today’s security threat is more likely to come from a mature, well-organized cybercrime underground. You can’t see these threats, but you don’t have to stay in the dark.
This webinar reviews Juniper Data Center Solutions, like WebApp Secure, Firefly Host, Firefly Perimeter. Know how you can track, trap and learn about attackers as they attempt to enter restricted areas. Control their movements and upload info about them to a global database—destroying their ability to launch further attacks.
On Thursday 11 September 2014, join Willys Wendoh and David Kaimenyi of Westcon africa as they expound and encourage a radical shift in how we think and approach security threats in the current enterprise networks deployments.

————————————————————

To join the training session

————————————————————
  1. point your browser to either of these URL’s: https://www.anymeeting.com/938-825-801?rslt=0fd8d49b-7b69-4335-89ea-18b29e19b2b6  or https://www.anymeeting.com/938-825-801 or http://www.anymeeting.com/oewxahueqtdlu
  2. Enter your email address and location
  3. Click log in
NB:If asked for a code,  kindly use: 584 0854#

Securing Your DNS

How do you:
  • Prevent unauthorized zone transfers from accessing the Domain Name Server (DNS) database (called a “zone” file),
  • Reduce the exposure to DNS content corruption through either dynamic updates to the zone file or “cache pollution” (also called DNS spoofing or cache poisoning),
  • Identify tools for checking the zone files and delegations for correct entries, and
  • Identify other useful DNS resources.
On thursday 28th of Augast, kindly join Godwin Poriot  as he takes us through this training session.
This Topic  provides DNS operators, “hostmasters”, with suggestions and techniques for securing and improving the operation of their servers. It also guides them to useful tool and information resources. This topic has no applicability to networks that are not using DNS for host name resolution.
Improperly configured DNS servers generally slow or prevent proper connection of client application to their intended servers. Improper configuration can also lead to blocked and possibly miss-delivered e-mail, the “hijacking” of web sites or other services, and in the extreme, the root or administrative compromise of the system on which DNS is running. The services provided by the cooperative operation of DNS servers worldwide are necessary for the proper function of the Internet and for Intranets as well.
————————————————————
To join the training session
————————————————————
  1. Go to https://www.anymeeting.com/280-920-576?rslt=0af1b905-da41-4ced-9224-f28f72039ce7
  2. Enter your email  address
  3. RSVP by clicking YES
  4. Click on the play button.

We Hope to see you there

Network Engineers With A New Set Of Tools

In the recent past we have always mailed you on technical events, webinars or even just a small talk conversation on tech related topics.
Because we are not always about work. we want to have something more outgoing.We would like to know each other beyond the work environment. We in fact would like to interact not only as professionals but as friends. We have decided to invite you to a different kind of meet up. The tools required will automatically dictate the skill desired.
We invite you for a koroga on the 26th of April 2014, to come make use of  :
  • A sufuria (Cooking pot)
  • kijiko (Spoon) and
  • viungo vya kupika (African spices)
Let us share our diversity in culture, tribe, food and music .
We hope to see you there.!!!!
The koroga will be at Azalea ­Caribea Bar and Restaurant. We believe that this is a secure and neutral location. Directions are in the attached document: Yaya Centre to Azalea-Caribea Bar and Restaurant
Kindly RSVP on EventBrite here:https://www.eventbrite.com/e/eanog-koroga-tickets-11298946453?ref=estw

Note: All tools will be provided on site.

Latency: The Silent Killer

Physical latency is one of the least understood but
important properties of modern network infrastructure.  This
webinar will attempt to define latency, characterise it at all
major points in the end-to-end network and provide techniques
operators can use to mitigate latency in modern systems towards
the goal of providing a better QoS for end-users.  It provides a
broad general overview of conceptual arguments useful for
minimising latency with reference to specific implementations
where necessary.  The goal of the webinar is to get EANOG members
to start thinking about optimising latency as we move to a world
of local content.
Please join:

Dr.Ripduman Sohan, Director of Research, Angani Ltd.

On Thursday March 27th 2014 at 1500HRS (GMT +3) to gain more insight.


This virtual training will be on webex (see details below) and was initially targeted at the East African Network Operators Group (EANOG). Please forward the links to friends partners and anyone that might be interested. We expect a varied audience so it will be a great interaction.
——————————————————- 

To join the training session 

——————————————————- 

To join the training session on Thursday March 27, 2014  ,use the following credentials :

Session number: 206 669 186

1. Go to https://cisco.webex.com/ciscosales/k2/j.php?MTID=tff0a606efabe2269dc14bdb5287d208e 
2. Enter your name and email address. 

3. Enter the session password: eanog 

4. Click “Join Now”. 

5. Follow the instructions that appear on your screen. 

Slides for this presentation are available here : Network latency: The silent killer

iHub: State Of The Network

iHub is Nairobi’s Innovation Hub for the technology community. It is an open space for the technologists, investors, tech companies and hackers in the area.

The space is a tech community facility. Its focus is on young entrepreneurs, web and mobile phone programmers, designers and researchers.

It thus goes without saying, fast internet connection needs to be the least of any of the communities worries.

This Thursday, March 13 2014, join Mr. Paul Muchene at 1500hrs (GMT +3) as he talks about his experience on designing the network architecture at the innovation hub. He will cover:

  • What he does at the iHub
  • The iHub network
  • Challenges he encountered
  • The future of the iHub network

——————————————————- 
To join the training session 

——————————————————- 

1. Go to 
https://cisco.webex.com/ciscosales/k2/j.php?MTID=t6219be6252e8e098df9043a46b8366b0
2. Enter your name and email address (or registration ID). 

3. Enter the session password: eanog 

4. Click “Join Now”. 

5. Follow the instructions that appear on your screen. 



 

Internet Exchange Points & Migration

In many developing countries, poor connectivity between ISPs often results in the routing of local traffic over expensive international links simply to reach destinations within the country of origin.

IXPs offer many advantages, some of them are improving the quality of Internet services in a country by reducing the delays. IXPs also can be a convenient hub for hosting critical infrastructure within countries.

Data centre migration offers many challenges. Even more challenging is the Migration and creation of new IXP’s . This is an art mastered by few.

Join Barry Apundo Macharia as he talks about his experience of setting up and running the Kenya Internet Exchange Point.

This virtual training will be on webex (see details below) and was initially targeted at the East African Network Operators Group (EANOG). Please forward the links to friends partners and anyone that might be interested. We expect a varied audience so it will be a great interaction.

 

——————————————————-
To join the training session
——————————————————-

Date: Thursday, February 27, 2014
Time: 3:00 pm, Nairobi Time (Nairobi, GMT+03:00)  (You can join 15 minutes earlier)
Session number: 202 958 046
1. Go to: https://www.webex.com/login/attend-a-meeting
2. Enter your name and email address (or registration ID).
3. Enter the session password: eanog
4. Click “Join Now”.
5. Follow the instructions that appear on your screen.

Slides are available here:  Peering in Kenya

The Art of Network Architecture

How do you:  

  • Deepen interactions between business and technology in your organization and improve the effectiveness of those interactions
  • Face down challenges of complexity and cost in environments where the business changes faster than the network can
  • Frame the problem(s) and conceptualize the optimal network solution
  • Reflect operational realities, cost issues, and application support in your design
  • Fully leverage the benefits of modularity, hierarchy, and virtualization
  • Build networks that are more manageable and more resistant to security failures
  • Make better choices about topology, virtualization, and routing

 

Please join:

Melville Makokha | Systems Engineer  | Cisco Systems

John Gitau | Systems Engineer | Cisco Systems
Cyrus Ngaruiya | Technology lead (SP)| Dimension Data | CCIE#37227

As we seek to answer some of the questions above. We will be delivering ‘The Art of Network Architecture’ tomorrow from 3pm. This virtual training will be on webex (see details below) and was initially targeted at the East African Network Operators Group (EANOG). Please forward the links to friends partners and anyone that might be interested. We expect a varied audience so it will be a great interaction.

——————————————————-
To join the training session
——————————————————-

Date: Thursday, January 30, 2014
Time: 3:00 pm, Nairobi Time (Nairobi, GMT+03:00)  (You can join 15 minutes earlier)
Session number: 204 802 138
1. Go to https://cisco.webex.com/ciscosales/k2/j.php?ED=252801142&UID=0&HMAC=8c2a4fb31459e20a5005e95be586f1fce680aa1e&RT=MiMzNA%3D%3D.
2. Enter your name and email address (or registration ID).
3. Enter the session password: eanog 
4. Click “Join Now”.
5. Follow the instructions that appear on your screen.