John Cavanaugh
Cary, North Carolina, United States
6K followers
500+ connections
About
Articles by John
-
Connectivity Matters: Networking for Pandemics
Connectivity Matters: Networking for Pandemics
By John Cavanaugh
Activity
-
Cloud Field Day 20 I will be an onsite delegate at Cloud Field Day 20, June 12-14. (West Coast timezone, 2 full days + 1/2 day Friday.) It may well…
Cloud Field Day 20 I will be an onsite delegate at Cloud Field Day 20, June 12-14. (West Coast timezone, 2 full days + 1/2 day Friday.) It may well…
Liked by John Cavanaugh
-
President Joe Biden’s campaign on Tuesday showed up outside former President Donald Trump’s New York City criminal hush money trial with actor Robert…
President Joe Biden’s campaign on Tuesday showed up outside former President Donald Trump’s New York City criminal hush money trial with actor Robert…
Liked by John Cavanaugh
Experience & Education
Licenses & Certifications
Publications
-
How to secure NetOps initiatives using Agile methodology
SearchNetworking by TechTarget
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking, and security teams working together.
-
5 steps to conduct network penetration testing
SearchNetworking by TechTarget
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests.
-
How to secure remote access for WFH employees in 4 steps
SearchNetworking by TechTarget
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers.
-
SASE challenges include network security roles, product choice
SearchNetworking by TechTarget
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges.
-
Top 5 SASE use cases balance network connectivity, security
SearchNetworking by TechTarget
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options.
-
How SASE convergence affects network and security roles
SearchSecurity by TechTarget
Most enterprises have siloed departments, but SASE's convergence of network and security functions could disrupt those constructs and drive more communication between teams.
-
With SASE, security and networking tech come together
SearchNetworking by TechTarget
SD-WAN, SASE or some combination of the two -- which approach will deliver the best and most secure network connectivity in your organization going forward?
-
Why networks should apply security by design principles
TechTarget SearchNetworking
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design
-
How to build a resilient network design
TechTarget
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design.
-
How to secure remote access for WFH employees
TechTarget; SearchNetworking
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers.
-
Best practices to maintain VPN security
TechTarget
Enterprises looking to maintain VPN security should focus on proper endpoint security and authentication, VPN server security and documentation for security policies.
-
Compare 3 DDoS mitigation strategies for enterprise networks
TechTarget
Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service.
-
3 approaches for how to prevent DDoS attacks on networks
TechTarget
DDoS attacks on networks can result in devastating and expensive damage for organizations. Learn three ways to prevent and respond to DDoS attacks to keep company networks secure.
-
Tips to improve network security visibility
TechTarget
Network security visibility can be tricky, especially with the range of products available. These tips help teams pinpoint potential vulnerabilities and gauge the tools they need.
Patents
-
Method for transmitting IP routes to prioritize convergence
Issued US 8737406
An improved technique for distributing routing information that allows routes to be prioritized such that information associated with higher priority routes is sent in update messages ahead of information associated with lower priority routes, thereby enabling the higher priority routes to converge faster than the lower priority routes. In the preferred embodiment of the invention a route policy map that associates routes with priorities is defined. The policy map is then applied to the routes…
An improved technique for distributing routing information that allows routes to be prioritized such that information associated with higher priority routes is sent in update messages ahead of information associated with lower priority routes, thereby enabling the higher priority routes to converge faster than the lower priority routes. In the preferred embodiment of the invention a route policy map that associates routes with priorities is defined. The policy map is then applied to the routes to prioritize the routes. Update messages are then generated using the priority information and the route information contained in the update messages is organized such that route information associated with higher priority routes is placed ahead of route information associated with lower priority routes.
Other inventorsSee patent -
Evaluation of network data aggregation
Issued US 7,733,798
In one embodiment, a method includes receiving topology data that indicates multiple communication links and multiple intermediate network nodes in communication based on the communication links. The intermediate network nodes include multiple leaf nodes that terminate communications and multiple transit nodes that facilitate the passage of information between leaf nodes. Aggregation point data is also received, which indicates all aggregation points on the intermediate network nodes. An…
In one embodiment, a method includes receiving topology data that indicates multiple communication links and multiple intermediate network nodes in communication based on the communication links. The intermediate network nodes include multiple leaf nodes that terminate communications and multiple transit nodes that facilitate the passage of information between leaf nodes. Aggregation point data is also received, which indicates all aggregation points on the intermediate network nodes. An aggregation point is an interface between a network node and a communication link, through which is output data that is a combination of data received through multiple different interfaces upstream of the interface. A set of paths is determined for which each path in the set connects a different pair of leaf nodes. A measure of aggregation is determined based on a number of aggregated paths of the set of paths. An aggregated path passes through an aggregation point.
Other inventorsSee patent -
Methods and apparatus for network message traffic redirection
Issued US 7,409,712
Conventional methods of addressing a Distributed Denial of Service attack include taking the target node offline, and routing all traffic to an alternate countermeasure, or “sinkhole” router, therefore requiring substantial lag time to reconfigure the target router into the network. In a network, a system operator monitors a network for undesirable message traffic. Upon a notification of such undesirable message traffic, traffic is rerouted to a filter complex to separate undesirable traffic…
Conventional methods of addressing a Distributed Denial of Service attack include taking the target node offline, and routing all traffic to an alternate countermeasure, or “sinkhole” router, therefore requiring substantial lag time to reconfigure the target router into the network. In a network, a system operator monitors a network for undesirable message traffic. Upon a notification of such undesirable message traffic, traffic is rerouted to a filter complex to separate undesirable traffic. The filter complex establishes an alternate route using a second communications protocol, and uses the alternate route to redirect the desirable message traffic to the target node. The use of the second protocol avoids conflict between the redirected desirable traffic and the original, or first, protocol which now performs the reroute. In this manner, the filter complex employs a second alternate communications protocol to reroute and redirect desirable message traffic to the target node...
Other inventorsSee patent -
Method for testing congestion avoidance on high speed networks
Issued US 7,085,227
A method for testing congestion avoidance on a network by simulating transmission control protocol (TCP) streams. In one embodiment, one hundred TCP streams are initiated, wherein each TCP stream is operable to transmit data packets. A TCP stream comprises a current window size and a maximum window size. For each TCP stream, an unacknowledged traffic stream is initiated and directly tied to a referencing TCP stream and is controlled (e.g. rate limited) by the referenced TCP stream. This permits…
A method for testing congestion avoidance on a network by simulating transmission control protocol (TCP) streams. In one embodiment, one hundred TCP streams are initiated, wherein each TCP stream is operable to transmit data packets. A TCP stream comprises a current window size and a maximum window size. For each TCP stream, an unacknowledged traffic stream is initiated and directly tied to a referencing TCP stream and is controlled (e.g. rate limited) by the referenced TCP stream. This permits the companion unacknowledged traffic streams to be efficiently transmitted at high rates. In the event of congestion resulting in the dropping of packets from the traffic streams, each traffic stream will back off at the same rate. In one embodiment, an oversubscription factor is used to ensure network congestion causing the associated flow to decrease. The present invention provides for a method of testing congestion avoidance of a high speed network requiring only one processor.
Other inventorsSee patent
Recommendations received
1 person has recommended John
Join now to viewMore activity by John
-
I LAUGHED SO HARD I COULD BARELY BREATHE! A little morning humor to start your week! After I retired, my wife insisted that I accompany her on her…
I LAUGHED SO HARD I COULD BARELY BREATHE! A little morning humor to start your week! After I retired, my wife insisted that I accompany her on her…
Liked by John Cavanaugh
-
After a year of crazy hours and hard slog, we are officially coming out of stealth and launching the company. What a ride! But the journey is just…
After a year of crazy hours and hard slog, we are officially coming out of stealth and launching the company. What a ride! But the journey is just…
Liked by John Cavanaugh
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named John Cavanaugh in United States
-
John Cavanaugh
-
John Cavanaugh
Co-Founder / Retired CEO at Marketvision Consulting Group, LLC
-
John Cavanaugh
Owner, Cavanaugh Nelson PLC
-
John Cavanaugh
Executive Director | Privacy Evangelist | CIPM, CIPP/US, YPP
246 others named John Cavanaugh in United States are on LinkedIn
See others named John Cavanaugh