Got this response to my Stretched Layer-2 Revisited blog post. It’s too good not to turn it into a blog post ;)
Recently I feel like it's really vendors pushing layer 2 solutions, rather than us (enterprise customer) demanding it.
I had that feeling for years. Yes, there are environment with legacy challenges (running COBOL applications on OS/370 with emulated TN3270 terminals comes to mind), but in most cases it’s the vendors trying to peddle unique high-priced non-interoperable warez.Read more ...
Semantics and complexity of GraphQL Hartig & Pérez, WWW’18
(If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page).
GraphQL has been gathering good momentum since Facebook open sourced it in 2015, so I was very interested to see this paper from Hartig and Pérez exploring its properties.
One of the main advantages (of GraphQL) is its ability to define precisely the data you want, replacing multiple REST requests with a single call…
One of the most interesting questions here is what if you make a public-facing GraphQL-based API (as e.g. GitHub have done), and then the data that people ask for happens to be very expensive to compute in space and time?
Here’s a simple GraphQL query to GitHub asking for the login names of the owners of the first two repositories where ‘danbri’ is an owner.
From here there are two directions we can go in to expand the set of results returned : we can increase the breadth by asking for more repositories to be considered (i.e., changing
first:2 Continue reading
Following concerns from Senator Marco Rubio that American companies are not using their repatriated cash to invest in the American worker, we looked into what seven tech companies are planning to do with the billions they brought back.
Way back in the early days of the commercial Internet, when we all logged into what seemed to be new but what was actually a quite old service used by academic institutions and government agencies that rode on the backbones of the telecommunications network, there were many, many thousands of Internet service providers who provided the interface between our computers and the network capacity that was the onramp of the information superhighway.
Most of these ISPs are gone today, and have been replaced by a few major telco, cable, and wireless network operators who provide us with our Internet service. …
What: Attend a half-day lecture and lab designed to get you started with Micro-segmentation and Multi-Site Cloud Networking (Disaster Recovery).
Why: Not only will you get a business and technical overview of NSX Data Center, you’ll also receive hands-on experience with the products. We’ll make sure you leave knowing how NSX can help secure and extend your network across multiple sites, and into the cloud.
The Facebook freak-out provides an outlet for fears regarding the digital environment we inhabit. A few companies control most channels of information. The gadgets that we use for convenience and entertainment also create the mechanisms for near-total surveillance, from tracking devices in our pockets to wiretaps in our homes—hi, Alexa! Someone besides Santa is watching and knows whether you have been naughty or nice. —Nathanael Blake @Public Discourse
Within just 10 days of the disclosure of two critical vulnerabilities in GPON router at least 5 botnet families have been found exploiting the flaws to build an army of million devices. Security researchers from Chinese-based cybersecurity firm Qihoo 360 Netlab have spotted 5 botnet families, including Mettle, Muhstik, Mirai, Hajime, and Satori, making use of the GPON exploit in the wild. —Swati Khandelwal @The Hacker News
Exploitation of Rowhammer attack just got easier. Dubbed ‘Throwhammer,’ the newly discovered technique could allow attackers to launch Rowhammer attack on the targeted systems just by sending specially crafted packets to the vulnerable network cards over the local area network. Known since 2012, Rowhammer is a severe issue with recent generation dynamic random access memory (DRAM) chips in which repeatedly accessing a row of memory Continue reading
Under this scenario Dell would exchange its common stock, privately held by Michael Dell and Silver Lake, for shares of the company’s publicly traded VMware stock.
The contract comes as Microsoft competes against other cloud providers for a $10 billion Pentagon deal called JEDI.
The platform relies on Canonical's Ubuntu Core OS and Snaps application packaging system.
Today on the Packet Pushers Weekly show, we investigate how to monitor hybrid and SD-WAN.
If your WAN looks like a mix of legacy MPLS, SD-WAN, and uplinks to cloud, this is your show. Our sponsor today is LiveAction, who is going to shine a light on the hybrid and SD-WAN through monitoring and automation.
Our guest is John Smith, Founder, CTO and EVP of LiveAction.
We talk about LiveAction’s software and how it works, why it’s essential to have visibility into your hybrid WAN and SD-WAN, and how LiveAction can provide highly visual and intuitive insights and actionable intelligence for day-to-day operations, troubleshooting, and long-term planning.
LiveAction’s Packet Pushers Resources – LiveAction
The post Show 390: Visualizing Complex SD-WAN With LiveAction (Sponsored) appeared first on Packet Pushers.
Airship will build clouds ‘where absolutely everything is a container from the bare metal up.’
Red Hat enhances its virtualization game; HPE releases AI and ML suite for telcos; CA Technologies gets stamp of approval from U.S. Department of Defense.
The Atlanta-based firm expects to add new data centers by year-end to support multi-access edge computing and cloud services.
Dustin Phillips, Co-Executive Director of ICANNWiki, is traveling across the United States in his red Toyota Corolla, making connections with the people who are making their communities – and the Internet – a better place. While making his way to the Bay Area from Portland, Oregon, he took a slight detour.
On my way down to the Bay Area from Portland, I made a trip through the Redwood National and State Parks of Northern California. These Coastal Redwoods have existed for over 20 million years and individual trees can live over 2,000 years. What makes these ancient giants so resilient?
They find strength in community.
Redwoods grow in groves, or “communities,” where the roots only go down 10-13 feet (3-4 m) before spreading outward 60-80 feet (20-27 m). In this phenomenon, survival is dependent on interconnection, meaning the roots intertwine and fuse with each other to provide resiliency against the threats of nature and share the resources necessary to thrive.
This lesson from the redwoods is directly applicable to the Internet. The “network of networks” would be nothing without interconnection or the shared resources of open standards and protocols. Expanding wider, not deeper, is essential to the resilience Continue reading
Peyton Maynard-Koran was the keynote speaker at InteropITX this year. If you want to catch the video, check this out:
Readers of my blog my remember that Peyton and I don’t see eye-to-eye on a few things. Last year I even wrote up some thoughts about vendors and VARs that were a direct counterpoint to many of the things that have been said. It has even gone further with a post from Greg Ferro (@EtherealMind) about the intelligence level of the average enterprise IT customer. I want to take a few moments and explore one piece of this puzzle that keeps being brought up: You.
You are a critical piece of the IT puzzle. Why? You’re a thinking person. You can intuit facts and extrapolate cause from nothing. You are NI – natural intelligence. There’s an entire industry of programmers chasing what you have. They are trying to build it into everything that blinks or runs code. The first time that any company has a real breakthrough in true artificial intelligence (AI) beyond complicated regression models will be a watershed day for us all.
However, you are also the problem. You have requirements. You need a Continue reading
Whether you’ve just started your CCIE training journey, or are already several months along, an INE bootcamp can help get you to where you need to be before taking the CCIE Written or lab exam. This blogpost is for anyone who may be interested in attending a CCIE Security bootcamp but is hesitant to dive in. Keep reading to find out what a bootcamp is and what you should expect when attending a CCIE Security Bootcamp with INE.
What is a Bootcamp?
Bootcamps are intensive, live classes that typically last from 5-7 days. Bootcamps allow you to dive further into your study path in a small classroom environment with an in-person, expert INE instructor leading the way. Each bootcamp class will cover a specific list of topics tailored to the Cisco track and certification level you are studying. Our instructors will customize the training to focus on certain topics and technologies that best meet the individual requests of the students in your bootcamp.
What to expect: Instructor’s Point of View
In this short video, our CCIE Security instructor, Rohit Pardasani, explains what topics he typically covers in a bootcamp and what the environment is like.
What to Continue reading