The test produced round-trip latency of less than 100 microseconds (0.1 milliseconds) and a data transmission speed of 40 Gb/s.
Today's episode introduces Heavy Networking, a rebrand of the Packet Pushers' Weekly Show. We've renamed this podcast to better reflect its deep dive into networking technology and skills, and better differentiate it from other infrastructure shows in our podcast network. We also dive into key trends that will impact your career.
The post Heavy Networking 423: Introducing Heavy Networking appeared first on Packet Pushers.
And Poland arrested a Chinese Huawei employee and charged him with spying for Beijing.
AWS purchases a disaster recovery startup; Synchronoss and TBSCASoft build blockchain for telecom operators; Red Hat releases a new version of its enterprise workflow framework.
Cisco announced it is buying Luxtera for $660M. Luxtera make SFP modules for Ethernet switches including the critical laser components. Interesting Things Just before the Christmas break when fewer people are watching. Background of US/China trade problems Cisco get control of part of the supply chain Silicon photonics is about using existing silicon manufacturing processes […]
The post Why Would Cisco Buy Luxtera ? appeared first on EtherealMind.
Sprint takes the next step on its path toward the launch of 5G services in the first half of 2019, seemingly with or without T-Mobile.
I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. This post examines how it’s easy to get so focused on automating the small stuff we have difficulty turning that into the more cohesive automation solution that we’d like to have.
This post appeared on Orange Matter as “Automation Paralysis: Why We Get Stuck Automating The Small Stuff“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent. Irreverent? Moi? Of course.
I’d love it if you were to take a moment to visit and read, and maybe even comment!
If you liked this post, please do click through to the source at Orange Matter: Automation Paralysis and give me a share/like. Thank you!
It this Network Collective Short Take, Russ White discusses security considerations when deploying and operating IPv6.
The post Short Take – IPv6 Security Considerations appeared first on Network Collective.
Today’s guest post is from Bhredipta Socarana, an Intellectual Property lawyer based in Indonesia and a Youth@IGF Fellow.
As one of the most populated countries, Indonesia has grown as one of the biggest markets for technology development. From the import of various over-the-top platforms to the implementation of Artificial Intelligence, technology has changed the Indonesian livelihood, including my own. This is also the case for Internet of Things (IoT).
As an emerging country, Indonesia admittedly has not been an advance player in responding to technology improvement. Despite the heavy invasion of technology-related products, many Indonesians have homework to do, especially for IoT. The business player needs to be aware of the responsibility of manufacturing and distributing IoT, while the public must also be aware of the various risks that they may be exposed to using IoT products.
Through the rapid development of technology and the intention of the Indonesian government to push the public to enter the “Industrial Revolution 4.0,” it will be mostly impossible to prevent penetration of IoT to our life. This leaves the public with the need to get smart with IoT.
Privacy and cybersecurity are among the issues revolving around IoT, and the need to have a Continue reading
Edson Erwin invented this highly scalable and optimized way of connecting network nodes in the 1930s and Charles Clos made the telephone nodes interconnection design using that solution. It was even before we had IP networks. He invented it in order to optimize the architecture of telephony network systems back then. It was not used in IP based network for last few decades but it experienced a big comeback with new datacenter design in the last few years. It was first invented only for scalability requirements that it solved beautifully. In new datacenter design, CLOS topology of interconnecting network devices scalability
The post CLOS Topology appeared first on How Does Internet Work.
Changes are afoot in the world of monitoring. Companies will seek alternatives to APM and AI/machine learning will start to be used to deliver better insights.
One of my readers sent me a description of their automation system that manages firewall rulesets on Fortigate firewalls using NAPALM to manage device configurations.
In his own words:
We are now managing thousands of address objects, services and firewall policies using David Barroso’s FortiOS Napalm module. This works very well and with a few caveats (such as finding a way to enforce the ordering of firewall policies) we are able to manage all the configuration of our firewalls from a single Ansible playbook.
The did the right thing and implemented an abstracted data model using GitOps to manage it:
Read more ...The time has come for IT to once again dive into the world of homegrown automation for running their networks.
Network teams have a love/hate relationship with
Time after time, though, something goes wrong with the cobbled together systems. Soon, rolling back and correcting mistakes or nursing along the automation as platforms and environments evolve takes more time and effort
Now, the confluence of several trends in IT has made it clear that it is automation time again. First and foremost, the focus on digital Continue reading