Archive

Category Archives for "Networking"

Kentik Turns AIOps Spotlight on Network Data, Workflows

San Francisco-based startup Avi Freedman, Kentik CEO. “They may say there’s a problem over in the network, but what is it? …We’re embracing [the network], but taking a more AI approach to surfacing insights and automation approach to what you do with that.” The AI-enabled capabilities include: Network operations insight into infrastructure and traffic across cloud, data center, WAN and campus environments, including traffic growth and capacity run-out dates. Edge network utilization and costs, including predicting cost overages and alerting on traffic spikes so teams can shift traffic to avoid network congestion. Network protection by setting smart baselines and thresholds to automatically recognize traffic anomalies, more easily investigate incidents such as DDoS attacks, and automatically prevent threats from causing performance and availability issues. The majority of Kentik’s early customers are service providers. AIOps can help them understand how their customers and subscribers use their services to more quickly Continue reading

Tech Bytes: Healthcare Provider Cures Performance, Security Ills With Silver Peak SD-WAN (Sponsored)

On today's Tech Bytes podcast, sponsored by Silver Peak, we talk with a healthcare provider about how the organization uses Silver Peak's Unity Edge Connect SD-WAN to securely segment and prioritize electronic medical records traffic and enforce QoS on other essential applications.

The post Tech Bytes: Healthcare Provider Cures Performance, Security Ills With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.

Network Break 245: VMware Buys Bitfusion for GPU Virtualization; Arrcus Scores $30 Million

Take a Network Break! VMware buys Bitfusion for GPU virtualization, Arrcus takes in a $30 million Series B round to grow its network OS business, Kentik announces AIOps to provide more insight for IT operations, the SD-WAN market races toward $5 billion by 2023, and more tech news. Guests Ethan Banks and Phil Gervasi stop by for virtual muffins and commentary.

The post Network Break 245: VMware Buys Bitfusion for GPU Virtualization; Arrcus Scores $30 Million appeared first on Packet Pushers.

[Sponsored] No Tunnels – No Overlays – All The Secure Routing – 128 Technology

Tunnels and overlays are all the rage in software-defined networking but 128 Technology thinks there is a better way forward. Without tunnels or overlays, 128 can provide all the features you’ve come to expect from an SD-WAN solution and more. Listen in if you would like to hear how they can do all of this without encapsulation, offering far smaller overhead yet still keeping your data secure in transit. Once you’ve watched the overview here, you can find an even deeper dive into their technology at their website https://128technology.com or you can view the full day Networking Field Day Exclusive event recordings at http://tnc.li/128tech

Thank you to 128 Technology for sponsoring today’s episode and supporting the content we’re creating here at Network Collective.

Ritesh Mukherjee
Guest
Erik Thoen
Guest
Jordan Martin
Host

The post [Sponsored] No Tunnels – No Overlays – All The Secure Routing – 128 Technology appeared first on Network Collective.

The Week in Internet News: The Internet of Things and the Domain Name System

IoT vs. DNS: As the use of the Internet of Things grows, so do its threats on the Internet’s Domain Name System, Network World says. The Internet Corporation for Assigned Names and Numbers (ICANN) and IBM’s X-Force security researchers have both issued reports describing how the insecurity of IoT could lead to more botnets that attack the DNS.

A lot of zeros: The U.S. Federal Trade Commission announced an expected $5 billion fine against Facebook for privacy breaches, The Verge reports. Still, some critics suggested the fine was too small. Facebook’s revenue in 2018 was 11 times more than the fine, at $55.8 billion.

Not too big to investigate: Meanwhile, the U.S. Department of Justice has launched an antitrust investigation into Google, Amazon, and Facebook, Vox.com reports. The DOJ’s Antitrust Division is reviewing “whether and how market-leading online platforms have achieved market power and are engaging in practices that have reduced competition, stifled innovation, or otherwise harmed consumers.” 

Not just the DOJ: And the Federal Trade Commission is also getting into the antitrust investigations act. Facebook has announced that its friends at the FTC, fresh off their $5 billion fine of the social media Continue reading

5 reasons to use Kubernetes

Kubernetes is the de facto open source container orchestration tool for enterprises. It provides application deployment, scaling, container management, and other capabilities, and it enables enterprises to optimize hardware resource utilization and increase production uptime through fault-tolerant functionality at speed. The project was initially developed by Google, which donated the project to the Cloud-Native Computing Foundation. In 2018, it became the first CNCF project to graduate.

This is all well and good, but it doesn’t explain why development and operations should invest their valuable time and effort in Kubernetes. The reason Kubernetes is so useful is that it helps dev and ops quickly solve the problems they struggle with every day.

Following are five ways Kubernetes’ capabilities help dev and ops professionals address their most common problems.

1. Vendor-agnostic

Many public cloud providers not only serve managed Kubernetes services but also lots of cloud products built on top of those services for on-premises application container orchestration. Being vendor-agnostic enables operators to design, build, and manage multi-cloud and hybrid cloud platforms easily and safely without risk of vendor lock-in. Kubernetes also eliminates the ops team’s worries about a complex multi/hybrid cloud strategy.

2. Service discovery

To develop microservices applications, Java developers must Continue reading

NVMe over Fabrics enterprise storage spec enters final review process

NVM Express Inc., the developer of the NVMe spec for enterprise SSDs, announced that its NVMe-oF architecture has entered a final 45-day review, an important step toward release of a formal specification for enterprise SSD makers.NVMe-oF stands for NVMe over Fabrics, a mechanism to transfer data between a host computer and a target SSD or system over a network, such as Ethernet, Fibre Channel (FC), or InfiniBand. NVM Express first released the 1.0 spec of NVMe-oF in 2016, so this is long overdue.To read this article in full, please click here

IT Burnout – The Task List

Sadly, this picture above is me. I used to think I had one of the best memories in the world. It turns out my memory is well-suited for bar trivia and routing protocol esoterics. My memory doesn’t appear so adept at remembering other little things that are of more important, such as remembering to buy a gift for a birthday or following up on an email that I sent last week.

Human brains are great at processing information. But some of the ones that are best at processing it are horrible at recalling it. I think of it not unlike a three-tiered storage array. The fast access tasks are in the fastest storage tier where they are needed. The longer term but less important info goes into the near-line tier where it can be recalled when needed. And in my case, the bandwidth to that tier is slow and unreliable.

Exciting Things!

One of my solutions to this problem is getting better with task management. As bad as my memory is, it’s also not well suited to writing things down to remember them. The irony is almost too delicious to ignore. I need to write things down so I don’t Continue reading

Not So Private Thoughts at IETF 105

At IETF 105, held in Montreal at the end of July, the Technical Plenary part of the meeting had two speakers on the topic of privacy in today's Internet, Associate Professor Arvind Narayanan of Princeton University and Professor Stephen Bellovin of Colombia University. They were both quite disturbing talks in their distinct ways, and I'd like to share my impressions of these two presentations and then consider what privacy means for me in today's Internet.

Verizon launches interconnect service through Equinix

Just days after AT&T hooked up with IBM and Microsoft for cloud service connectivity, Verizon announced a software-defined interconnect (SDI) service to help the carrier's customers connect Equinix colocation data centers.These two companies have a history. In 2017, Equinix acquired 29 Verizon data centers in the U.S and Latin America for $3.6 billion. So like AT&T, Verizon left data centers to the experts and focused on building connections to them. [ Read also: How to plan a software-defined data center network ] As more enterprises move workloads into colocation facilities run by providers like Equinix, fast, secure connections between the enterprise and the colocation become a must. Verizon's SDI service is designed to provide fast, reliable connectivity between customer and the colocation data center.To read this article in full, please click here

Verizon launches interconnect service through Equinix

Just days after AT&T hooked up with IBM and Microsoft for cloud service connectivity, Verizon announced a software-defined interconnect (SDI) service to help the carrier's customers connect Equinix colocation data centers.These two companies have a history. In 2017, Equinix acquired 29 Verizon data centers in the U.S and Latin America for $3.6 billion. So like AT&T, Verizon left data centers to the experts and focused on building connections to them. [ Read also: How to plan a software-defined data center network ] As more enterprises move workloads into colocation facilities run by providers like Equinix, fast, secure connections between the enterprise and the colocation become a must. Verizon's SDI service is designed to provide fast, reliable connectivity between customer and the colocation data center.To read this article in full, please click here

Software Engineers and Network Automation

I was saying “you’ll get the best network automation (or SDN) results if you pair network engineers with software engineers” for ages, but there’s always someone else saying it more eloquently, in this case Jeremy Schulman in his recent blog post.

Jeremy will talk about ChatOps in Autumn 2019 Building Network Automation Solutions online course, but of course you’re more than welcome to ask him other questions as well.

African Peering and Interconnection Forum 2019 Fellows Announced

The 10th African Peering and Interconnection Forum (AfPIF-10) has selected twenty fellows to participate in the meeting next month.

The fellows are drawn from various fields such as interconnection, content, infrastructure, and policy. They represent Kenya, Lesotho, Somalia, Nigeria, Gabon, Burkina Faso, Mozambique, Tanzania, Madagascar, Democratic Republic of Congo (DR Congo), Egypt, Uganda, South Africa, Republic of the Congo (Congo), Ethiopian Cameroon, Benin, and Gambia.

Among the chosen fellows are six women sponsored by the Women in Tech partners. The women are drawn from Kenya, South Africa, Gambia, and Congo.

Representing DR Congo in this year’s AfPIF forum is Eric Nsilu Moanda. Eric works as a Senior Core Data Network Architect for Vodacom DR Congo. He has held the position at the Vodafone Group subsidiary for 12 years now, designing all IP Integration Solutions for the company.

“I look forward to learning how to produce attractive local content in Africa, for Africans, obtaining a fresh technical and marketing perspective, and gaining awareness in the evolution of continental interconnection projects,” Eric said.

In the past, Eric has peered on integrating Vodacom to KINIX (Kinshasa Exchange point) and he also worked on the Internet update link for the CDN of Kinix via Continue reading

Report: Smart-city IoT isn’t smart enough yet

Security arrangements for smart-city IoT technology around the world are in an alarming state of disrepair, according to a report from Forrester Research that argues serious changes are needed in order to avoid widespread compromises.Much of what’s wrong has to do with a lack of understanding on the part of the people in charge of those systems and a failure to follow well-known security best practices, like centralized management, network visibility and limiting attack-surfaces. More on IoT: What is the IoT? How the internet of things works What is edge computing and how it’s changing the network Most powerful Internet of Things companies 10 Hot IoT startups to watch The 6 ways to make money in IoT What is digital twin technology? [and why it matters] Blockchain, service-centric networking key to IoT success Getting grounded in IoT networking and security Building IoT-ready networks must become a priority What is the Industrial IoT? [And why the stakes are so high] Those all pose stiff challenges, according to “Making Smart Cities Safe And Secure,” the Forrester report by Merritt Maxim and Salvatore Schiano. The attack surface for a smart city is, by default, enormous, given the volume of Internet-connected hardware involved. Continue reading

Kernel of Truth season 2 episode 11: Network monitoring

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

Don’t let your switch be the one who called wolf! Network monitoring is a hot topic here at Cumulus Networks and to talk about it more, host Brian O’Sullivan is joined by two new guests to the podcast Justin Betz and Faye Ly. They sit down to chat about the evolution of monitoring, the challenges in achieving robust monitoring and visibility, and what does it even mean to have “good network monitoring and visibility?” Listen, learn and hopefully enjoy!

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a variety of jobs, including bartending in three countries and working as an extra in a German soap opera. You can find him on Twitter at @bosullivan00.

Faye Continue reading

BrandPost: Part 3: Assessing Your WAN Strategy: Resiliency and Security at Branch Locations

In part 1 of this 3-part series on how to conduct a wide-area network assessment and determine necessary updates, we looked at foundational issues including current challenges and objectives. Part 2 examined considerations around applications and bandwidth. In this third and final installment we’ll look at two issues that are critical for any organization: resiliency and security.To read this article in full, please click here

IoT’s role in expanding drone use

As faithful readers of TechWatch (love you, Mom) may know, the rollout of many companies’ ambitious drone delivery services has not gone as quickly as promised. Despite recent signs of progress in Australia and the United States—not to mention clever ideas for burger deliveries to cars stuck in traffic—drone delivery remains a long way from becoming a viable option in the vast majority of use cases. And the problem affects many areas of drone usage, not just the heavily hyped drone delivery applications.To read this article in full, please click here