Archive

Category Archives for "Networking"

Full Stack Journey 030: Building Cloud-Native Infrastructure As Code With Pulumi

Pulumi is a tool for building cloud-native infrastructure as code using general-purpose programming languages. Luke Hoban, CTO of Pulumi, joins Scott Lowe on the Full Stack Journey podcast to chat about the tool and how it differs from existing approaches to infrastructure as code.

The post Full Stack Journey 030: Building Cloud-Native Infrastructure As Code With Pulumi appeared first on Packet Pushers.

History of Networking: OpenConfig with Anees Shaikh and Rob Shakir

OpenConfig is an effort amongst many cooperative network operators to define vender-neutral data models for configuring and managing networks programatically. In this episode we talk with Anees Shaikh and Rob Shakir about the roots of the OpenConfig project and where it’s at currently.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

Juniper Lightboard Series – Intro to Juniper Routing – Part 2

Just released the second video in my “Introduction to Juniper Routing” Lightboard Series. In this video, I cover more details around the functions and role of the Packet Forwarding Engine (PFE), and describe the difference between transit traffic and exception traffic. In my next video, I’ll cover how routes are added to the routing table, …

When Wi-Fi is mission-critical, a mixed-channel architecture is the best option

I’ve worked with a number of companies that have implemented digital projects only to see them fail. The ideation was correct, the implementation was sound, and the market opportunity was there. The weak link? The Wi-Fi network.For example, a large hospital wanted to improve clinician response times to patient alarms by having telemetry information sent to mobile devices. Without the system, the only way a nurse would know about a patient alarm is from an audible alert. And with all the background noise, it’s often tough to discern where noises are coming from. The problem was the Wi-Fi network in the hospital had not been upgraded in years and caused messages to be significantly delayed in their delivery, often taking four to five minutes to deliver. The long delivery times caused a lack of confidence in the system, so many clinicians stopped using it and went back to manual alerting. As a result, the project was considered a failure.To read this article in full, please click here

IDG Contributor Network: Zero-trust: microsegmentation networking

The transformation to the digital age has introduced significant changes to the cloud and data center environments. This has compelled the organizations to innovate more quickly than ever before. This, however, brings with it both – the advantages and disadvantages.The network and security need to keep up with this rapid pace of change. If you cannot match with the speed of the digital age, then ultimately bad actors will become a hazard. Therefore, the organizations must move to a zero-trust environment: default deny, with least privilege access. In today’s evolving digital world this is the primary key to success.To read this article in full, please click here

Cognitive WiFi is Here

Last August, Arista made its first acquisition, Mojo Networks, to transform the future of WiFi and campus networks. Just as Arista disrupted the datacenter with important architectural and technology-based innovations, I believe this is a similar pioneering step for the campus. Over the past two decades, the industry has deployed a WiFi controller-based architecture. This stagnant “WLC” approach for wireless connectivity has not evolved to address costly operational dilemmas such as:

Automatic Clean-and-Updated Firewall Ruleset

This is a guest blog post by Andrea Dainese, senior network and security architect, and author of UNetLab (now EVE-NG) and  Route Reflector Labs. These days you’ll find him busy automating Cisco ACI deployments.


Following the Ivan’s post about Firewall Ruleset Automation, I decided to take a step forward: can we always have up-to-date and clean firewall policies without stale rules?

The problem

We usually configure and manage firewalls using a process like this:

Read more ...

Tech Bytes: How Arrcus Uses LSVR To Build Scalable Data Center Fabrics (Sponsored)

Today's Tech Bytes episode explores the Link State Vector (LSVR) protocol, an IETF draft standard that lets you use BGP to build a data center fabric. Sponsor Arrcus joins us to discuss how LSVR works, and how Arrcus's ArcOS network operating system leverages this protocol.

The post Tech Bytes: How Arrcus Uses LSVR To Build Scalable Data Center Fabrics (Sponsored) appeared first on Packet Pushers.

5G: A deep dive into fast, new wireless

The next step in the evolution of wireless WAN communications - 5G networks - is about to hit the front pages, and for good reason: it will complete the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.To read this article in full, please click here(Insider Story)

What is 5G? How is it better than 4G?

5G wireless is an umbrella term to describe a set of standards and technologies for a radically faster wireless internet that ideally is up to 20 times faster with 120 times less latency than 4G, setting the stage for IoT networking advances and support for new high-bandwidth applications.What is 5G? Technology or buzzword? It will be years before the technology reaches its full potential worldwide, but meanwhile some 5G network services are being rolled out today. 5G is as much a marketing buzzword as a technical term, and not all services marketed as 5G are standard.To read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router #2: Simplify and Consolidate the WAN Edge

We’re now near reaching the end of our homage to the iconic David Letterman Top Ten List segment from his former Late Show, as Silver Peak counts down the Top Ten Reasons to Think Outside the Router. Click for the #3, #4, #5,  #6, #7, #8, #9 and #10 reasons to retire traditional branch routers.To read this article in full, please click here

The Week in Internet News: U.S. Census Seeks Help with Fake News from Tech Giants

Fake news fears: The U.S. Census Bureau is seeking help from Google, Facebook, and Twitter to fight off fake news during its 2020 population count, Reuters reports. Some groups appear to be targeting the census as a way to redirect congressional representation and federal funding.

Broadband for all: The Vermont House has voted for a bill to add funding for broadband deployment, including community broadband projects, Vermont Public Radio reports. About 17,000 Vermont residents don’t have broadband available, and many others have slow Internet service.

Copyright rules divide: New copyright rules in the European Union may lead to a different Internet experience there, The Verge says. With the EU’s Copyright Directive, there’s now a European Internet that feels different that the U.S. Internet and the authoritarian Internet in some countries, the story says. Among other things, the new rules allow publishers to charge platforms like Google News for displaying snippets of stories.

Encryption rising: The use of encryption by large companies has hit an all-time high, Dark Reading notes. About 45 percent of enterprises have encryption plans in place.

Fake news fighters: Facebook has launched a fake-news fighting effort in India as the country heads toward elections, Time. Continue reading