Archive

Category Archives for "Networking"

BiB 066: Why Cloud Visibility Matters

Complex cloud applications need decent visualizations to help infrastructure engineers understand what's going on. For cloud visibility, Kentik absorbs AWS & GCP flow logs, with Azure support coming. Kubernetes & Istio are also data providers to Kentik. Using the Kubernetes API, Kentik correlates pod IPs to pod names and cluster namespaces. With that information, Kentik can visualize pod to pod and service to service traffic flows within a Kubernetes cluster.

The post BiB 066: Why Cloud Visibility Matters appeared first on Packet Pushers.

Edge-chips could render some networks useless

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power, and resilience is behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do at the source — in other words on the machine — the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks useless

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks unnecessary

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks unnecessary

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks useless

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks unnecessary

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Jason Donenfeld Honored with the ISRG’s Radiant Award

Earlier this week Jason Donenfeld received the Radiant Award from the Internet Security Research Group. Jason is an accomplished engineer and a creative thinker, which makes his work clean, simple, and takes it a step beyond – most notably in WireGuard, an open-source secure VPN tunnel.

We are proud to have enabled this award. Let me explain why.

At the Internet Society we care a great deal about the technologies that help to establish trust between people around the globe, while those people may have never interacted before.

One of the groups we proudly partner with is the Internet Security Research Group, the non-profit behind the Let’s Encrypt initiative. In the 4 years since Let’s Encrypt was launched, it has changed the landscape of web traffic encryption. Whereas in 2014 around 30% of pages loaded by Firefox where loaded over a secure channel, that number has increased to over 75% by now. I believe that rise in secure web traffic is in large part the result of the work by Let’s Encrypt.

Before 2014 it was somewhat costly to get a web certificate, a critical piece of authentication material that is the basis of establishing global trust. Both Continue reading

PQ 160: Inside ArcOS®: The Internet-Scale, Carrier-Grade Network OS (Sponsored)

On today's Priority Queue we dive into ArcOS®, a new network OS designed for whitebox routing and switching from our sponsor Arrcus. We examine how the OS was designed, how it differentiates itself from competitors, and explore key use cases.

The post PQ 160: Inside ArcOS®: The Internet-Scale, Carrier-Grade Network OS (Sponsored) appeared first on Packet Pushers.

Last Month in Internet Intelligence: November 2018

In November, we saw fewer significant Internet disruptions in the Oracle Internet Intelligence Map as compared to prior months. As usual, there were hundreds of brief issues with limited impact and generally unknown causes, but the most notable issues last month were due to reported DDoS attacks, problems with terrestrial and submarine cables, and general network issues.

DDoS Attacks

On November 4 and 5, several Cambodian ISPs were targeted by DDoS attacks described as the “biggest attacks in Cambodian history.” Published reports indicated that ISPs including EZECOM, SINET, Telcotech, and Digi were targeted by DDoS attacks totaling nearly 150 Gbps, causing subscriber downtime lasting as much as half a day. Disruption from the attacks was visible in the Country Statistics view for Cambodia in the Internet Intelligence Map, as shown in the figure below. However, because Internet connectivity remained generally available (albeit impaired) across the country, the impact appears nominal in the graphs.

However, when viewed at a network level, the impact of the attacks appears to be more significant. SINET, one of the ISPs targeted by the DDoS attacks, posted a Tweet on November 5 letting users know that they were under attack, and followed up Continue reading