In this briefing, Dell EMC focused on their Cyber Recovery 18.1 product. You might be thinking, “Oh, another backup product. I already have one of those.” Sort of. Cyber Recovery is more than simply backup, and it’s more than what a decent disaster recovery plan gets you. The Cyber Recovery Vault is an orchestrated Data Domain storage platform that provides an isolated copy of known good data that can be used to recover from a security breach.
The post BiB 059: Recover From Cyber Attacks & Ransomware With Dell EMC appeared first on Packet Pushers.
Within GKE, Istio will collect telemetry about a running container and send that information to either Stackdriver or Prometheus to allow an organization to monitor the health of that container.
The research firm MTN Consulting said that Alibaba’s cloud computing business is rapidly becoming the group's “most ambitious venture,” as it boosts its overseas investments and refocuses on R&D.
A common complaint I hear among network engineers is that the lessons and techniques used by truly huge scale networks simply are not applicable to more “standard scale” networks. The key point, however, is balance—to look for the ideas and concepts that are interesting and at least somewhat novel, and then see how they might be applied to products and systems in all networks. Learning concepts can help you understand design patterns you might encounter almost anywhere. One recent paper, for instance, details Andromeda, a large scale networking system designed and operated by Google, one of the few truly huge networks in the world—
Andromeda is designed around a flexible hierarchy of flow processing paths. Flows are mapped to a programming path dynamically based on feature and performance requirements.
While the paper describes the general compute environment, and the forwarding process on individual nodes, the most interesting part from a network engineering perspective is hoverboard. While this concept behind hoverboard has been implemented in previous systems, it is usually hidden under the covers of a vertically integrated system, and therefore not normally something you see the inner workings of. To understand hoverboard, you have to begin with a little theory Continue reading
The new product bundles software on top of HPE ProLiant DL rack servers for an open hybrid cloud platform.
Government officials are fearful that telecom providers using Huawei gear in other countries will be vulnerable to spying.
In this interview, Srinivas opens up about how data analytics has changed the network operations function, how IoT devices will impact networks, and how analytics can help boost network performance.
I had the opportunity to sit in on a great briefing from Gremlin the other day about chaos engineering. Ken Nalbone (@KenNalbone) has a great review of their software and approach to things here. The more time I spent thinking about chaos engineering and IT, the more I realized that it has more in common with Murphy’s Law that we realize.
If there’s more than one way to do a job and one of those ways will end in disaster, then somebody will do it that way. – Edward Murphy
Anything that can go wrong will go wrong. – Major John Paul Stapp
We live by the adage of Murphy’s Law in IT. Anything that can go wrong will go wrong. And usually it goes wrong at the worst possible time. Database query functions will go wrong when you need them the most. And usually at the height of something like Amazon Prime Day. Data center outages only seem to happen at 4 am on a Sunday during a holiday.
But why do things go wrong like this? Is it because the universe just has it out for IT people? Are we Continue reading
BGP Route Reflection solves a fundamental problem in iBGP operation but introduces some tradeoffs to consider when implementing. In this Network Collective short take, Russ details these tradeoffs and some potential ways to mitigate unintended consequences.
The post Short Take – BGP Optimal Route Reflection appeared first on Network Collective.
The company says its newly formed Access Networks organization will help it win 5G contracts and battle against rivals Ericsson, Huawei, ZTE, and Samsung.
France tackles the Internet: The French government has been making news in recent days for examining ways to regulate the Internet. Its parliament has passed a controversial new law that would allow judges to order the immediate removal of online articles they deem to be fake news, Euronews.com reports. Critics warned the law, which allows for jail sentences for fake news creators, could lead to censorship.
Regulation or autocracy? French President Emmanuel Macron pushed the fake news law, and he also called for more government regulation of the Internet at a recent Internet Governance Forum in Paris. Macron called for international cooperation on Internet issues, as a way to tame disinformation, with CFR.org suggesting governments must adapt to fight modern problems. But TechDirt suggested Macron was acting like an autocrat in his call for more regulation.
Broadband plan MIA: Canada’s government, meanwhile, has “no plan” to bring broadband to rural and remote areas, a government auditor said. Canada’s rural broadband efforts so far have led to “a series of moving targets, lofty proclamations, piecemeal programs, and ultimately big letdowns,” Motherboard says.
Where the money is: Research firm IDC expects investments in Artificial Intelligence to triple in the next three Continue reading
Top network transport factors include high packet loss, high latency, high jitter, network path changes, Wi-Fi system performance, and insufficient network bandwidth.