Cisco’s DevNet extends the value of its intent-based networking

Earlier this month, Cisco held a media and press event to launch its intent-based networking solution. To no surprise, its user event, Cisco Live 2017 was all about the network as Cisco looks to get customers to think more broadly about the role of the network in digital transformation.Brandon Butler did a great follow-up post to mine that talked about why intent-based networking is a big deal. He called out a number of benefits, including streamlined operations and better security.To read this article in full or to leave a comment, please click here

Cisco’s DevNet extends the value of its intent-based networking

Earlier this month, Cisco held a media and press event to launch its intent-based networking solution. To no surprise, its user event, Cisco Live 2017 was all about the network as Cisco looks to get customers to think more broadly about the role of the network in digital transformation.Brandon Butler did a great follow-up post to mine that talked about why intent-based networking is a big deal. He called out a number of benefits, including streamlined operations and better security.To read this article in full or to leave a comment, please click here

Cray adds big data software to its supercomputers

Cray has announced a new suite of big data and artificial intelligence (AI) software called Urika-XC for its top-of-the-line XC Series of supercomputers. Urika-XC is a set of analytics software that will let XC customers use Apache Spark, Intel’s BigDL deep learning library, Cray’s Urika graph analytics engine, and an assortment of Python-based data science tools.With the Urika-XC software suite, analytics and AI workloads can run alongside scientific modeling and simulations on Cray XC supercomputers, eliminating the need to move data between systems. Cray XC customers will be able to run converged analytics and simulation workloads across a variety of scientific and commercial endeavors, such as real-time weather forecasting, predictive maintenance, precision medicine and comprehensive fraud detection. To read this article in full or to leave a comment, please click here

Cray adds big data software to its supercomputers

Cray has announced a new suite of big data and artificial intelligence (AI) software called Urika-XC for its top-of-the-line XC Series of supercomputers. Urika-XC is a set of analytics software that will let XC customers use Apache Spark, Intel’s BigDL deep learning library, Cray’s Urika graph analytics engine, and an assortment of Python-based data science tools.With the Urika-XC software suite, analytics and AI workloads can run alongside scientific modeling and simulations on Cray XC supercomputers, eliminating the need to move data between systems. Cray XC customers will be able to run converged analytics and simulation workloads across a variety of scientific and commercial endeavors, such as real-time weather forecasting, predictive maintenance, precision medicine and comprehensive fraud detection. To read this article in full or to leave a comment, please click here

Building Our New Website: A video about the user experience of multilingual websites

How do you build a multilingual website? What are the things you should be thinking about? In my last post in this series, I wrote about our need for a multilingual editor (and we now have some GREAT candidates!). But there's obviously much more to a site than just having a person on board. This week, Joly MacFie of our New York Chapter pointed me to this excellent video from the recent WordCamp Helsinki 2017 event titled "The User Experience Perspective of Multilingual and Multi-regional Websites":

Dan York

Dark Fiber and Cisco OTV – Basic Approach and connectivity

Today I am going to discuss on the connectivity of the two datacenter and in the Active-Active state or you can called them as Connecting Multiple Active Datacenter with OTV and Dark Fiber.

First let's talk about the technologies, Cisco OTV is a Overlay Transport Virtualization technology and is used to extend the LAN segments across the datacenter or in other words you can say that extending the Layer 2 traffic over the Layer 3 network.

Note : Cisco OTV supports on Cisco Nexus 7K series switches and is not supported in Cisco Nexus 9K Switches.

Cisco OTV- Overlay Transport Virtualization technology
As I said, that Cisco OTV is the way to extend your layer 2 network across the datacenter via the Layer 3 links. OTV actually works on the MAC routing concept.

MAC and Routing ..What :)

Yes, control plane protocol in Cisco OTV is used to exchange MAC reachability information between network devices providing LAN extension functionality. This is a huge change from Layer 2 switching that traditionally leverages data plane learning, and it is justified by the need to limit flooding of Layer 2 traffic across the transport infrastructure. 

Layer 2 communications between sites Continue reading

IDG Contributor Network: HTTP and DNS in a 5G World

The internet has of course been wildly successful over the last thirty years as more and more functionality has moved online. A large part of this success has been due to two key protocols that have allowed the internet to scale relatively gracefully: HTTP which stands for Hypertext Transmission Protocol, and DNS which stands for Domain Name System. HTTP is the protocol used to send data between a web browser running on a laptop or mobile phone and the web page or application that it is communicating with, which is running on a server in the network. No matter where the web page is located or who develops the web browser, it is guaranteed that they will be able to interoperate because they all use the standardized HTTP protocol to communicate. DNS is equally fundamental as it is the protocol which allows end user devices to translate a given human readable URL such as “www.google.com” to a machine usable IP address that the network can make sense of.To read this article in full or to leave a comment, please click here

NonPetya: no evidence it was a “smokescreen”

Many well-regarded experts claim that the not-Petya ransomware wasn't "ransomware" at all, but a "wiper" whose goal was to destroy files, without any intent at letting victims recover their files. I want to point out that there is no real evidence of this.


Certainly, things look suspicious. For one thing, it certainly targeted the Ukraine. For another thing, it made several mistakes that prevent them from ever decrypting drives. Their email account was shutdown, and it corrupts the boot sector.

But these things aren't evidence, they are problems. They are things needing explanation, not things that support our preferred conspiracy theory.

The simplest, Occam's Razor explanation explanation is that they were simple mistakes. Such mistakes are common among ransomware. We think of virus writers as professional software developers who thoroughly test their code. Decades of evidence show the opposite, that such software is of poor quality with shockingly bad bugs.

It's true that effectively, nPetya is a wiper. Matthieu Suiche‏ does a great job describing one flaw that prevents it working. @hasherezade does a great job explaining another flaw.  But best explanation isn't that this is intentional. Even if these bugs didn't exist, it'd still be a wiper if the Continue reading