Archive

Category Archives for "Networking"

How Serverless Platforms are Changing to Enable New Applications (video)

How Serverless Platforms are Changing to Enable New Applications (video)

Serverless technology is still in its infancy, and some people are unsure about where it’s headed. Join Zack Bloom, Director of Product for Product Strategy at Cloudflare, on a journey to explore the serverless future where developers “just write code,” pay for exactly what they use, and completely forget about where code runs; then see why current platforms won't be able to get developers all the way there.

The talk below was originally presented and recorded at Serverless Computing London in November 2018. If you’d like to join us in person to talk about serverless, we’ll be announcing 2019 event locations throughout the year on the docs page.

Cloudflare's Zack Bloom spoke at Serverless Computing London Conference

About the talk

Many of the technical challenges of serverless (cold-start time, memory overhead, and CPU context switching) are solved by a new architecture which translates technology developed for web browsers onto the server. Learn about how serverless platforms built using isolates are helping to expand the kinds of applications built using serverless.

About the speaker

Zack Bloom helps build the future of the Internet as the Director of Product for Product Strategy at Cloudflare. He was a co-founder of Eager, an Continue reading

Coding, cloud skills are most in demand for network pros

As more companies build their businesses around software, network and data-center pros will also be looking toward software to optimize their skills.While software may not be the first thing to come to mind when dealing with data centers, IT industry watchers say experienced network and infrastructure professionals would be wise to up their code game. Popular technology trends such as public, private and hybrid cloud, Internet of Things, artificial intelligence and machine learning will prompt network and data center pros to invest their training time and dollars in better understanding the software side of the IT house. BE SURE NOT TO MISS:To read this article in full, please click here

BGP as High Availability Protocol

Every now and then someone tells me I should write more about the basic networking concepts like I did years ago when I started blogging. I’m probably too old (and too grumpy) for that, but fortunately I’m no longer on my own.

Over the years ipSpace.net slowly grew into a small community of networking experts, and we got to a point where you’ll see regular blog posts from other community members, starting with Using BGP as High-Availability protocol written by Nicola Modena, member of ExpertExpress team.

BGP in 2018 – Part1: The BGP Table

It has become either a tradition, or a habit, each January for me to report on the experience with the inter-domain routing system over the past year, looking in some detail at some metrics from the routing system that can show the essential shape and behaviour of the underlying interconnection fabric of the Internet.

BiB 068: Aporeto’s Identity Based Workload Segmentation

Aporeto is an identity-based security solution. Not only user identity, but also workload identity. That is, when using Aporeto, workloads can only talk to each other when their identity is authenticated by fingerprint and authorized by policy. Aporeto decouples the network infrastructure from security, adding a whole new dimension to microsegmentation strategies.

The post BiB 068: Aporeto’s Identity Based Workload Segmentation appeared first on Packet Pushers.

Cisco targets mobile enterprise apps with geolocation technology

Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications.The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wireless suite and enterprise geolocation technology purchased from July Systems. Cisco CMX is a software engine that uses location and other intelligence gleaned from Cisco wireless infrastructure to generate analytics data and help deliver services to customers on their mobile devices.[ Check out our hands-on reviews: 5 top hardware-based Wi-Fi test tools and Mojo wireless intrusion prevention system. ] Cisco bought July last June for an undisclosed price. July provides businesses with deep and accurate analytics about who and what are in their physical locations along with the ability to act on those insights in real-time, Cisco said.To read this article in full, please click here

Cisco targets mobile enterprise apps with geolocation technology

Cisco is rolling out a cloud-based geolocation package it expects will help customers grow mobile location services and integrate data from those services into enterprise analytics and business applications.The package, called DNA Spaces, is comprised of Cisco’s Connected Mobile Experience (CMX) wireless suite and enterprise geolocation technology purchased from July Systems. Cisco CMX is a software engine that uses location and other intelligence gleaned from Cisco wireless infrastructure to generate analytics data and help deliver services to customers on their mobile devices.[ Check out our hands-on reviews: 5 top hardware-based Wi-Fi test tools and Mojo wireless intrusion prevention system. ] Cisco bought July last June for an undisclosed price. July provides businesses with deep and accurate analytics about who and what are in their physical locations along with the ability to act on those insights in real-time, Cisco said.To read this article in full, please click here

Automating Logistics To Improve Productivity

Getting work done is hindered by logistics. Logistics is work about work. It’s the work you do so that you can get something else done.

For example, there’s a workflow I use to create a podcast. Most of that work is logistical: creating a collaborative script document from a template, inviting guests to a recording channel, scheduling the recording, coordinating sponsor content, updating the production calendar, editing the episode, writing a blog post about the episode, and promoting the episode on social media.

Relatively little of the workflow is what I consider the meat of podcast creation: researching the topic and guests, writing interview questions, and recording the actual show.

I draw the line between logistics and meat by considering what I can delegate vs. what I need to do uniquely myself. Most tasks can be divided along this line.

Solving The Logistics Problem With Delegation

One way to boost productivity is to delegate logistics. Delegation frees up your time to focus on the remaining tasks requiring your unique skills.

Delegation comes in at least three forms.

  1. Humans.
  2. Software.
  3. Automation.

Some tasks can be delegated to other humans. In my case, I delegate many tasks in my business to consultants, Continue reading

The only thing constant is change

Several things of note for the near future.

As of today, I have moved into a role at Juniper networks. You will probably hear more about what I am working on over time, both here and there, and probably other places as well.

I hope to be changing platforms from WordPress to Craft in the spring; work is currently underway. This will likely mean some things about the design of this site will change; others will remain the same. Content wise, I am going to continue highlighting interesting research, soft skills, and networking technologies, but I will be trying to focus a bit more on disaggregation in all of these areas, rather than just floating around all over the place.

More as 2019 develops.

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here