
Last year, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. We interviewed Orla Lynskey to hear her perspective on the forces shaping the Internet’s future.
Orla Lynskey is an associate professor of law at the London School of Economics and Political Science. Her primary area of research interest is European Union data protection law. Her monograph, The Foundations of EU Data Protection Law (Oxford University Press, 2015), explores the potential and limits of individual control over personal data, or “informational self-determination’” in the data protection framework. More recently, her work has focused on collective approaches to data protection rights and mechanisms to counterbalance asymmetries of power in the online environment. Lynskey is an editor of International Data Privacy Law and the Modern Law Review and is a member of the EU Commission’s multistakeholder expert group on GDPR. She holds an LLB from Trinity College, Dublin, an LLM from the College of Europe (Bruges) and a PhD from the University of Cambridge. Before entering academia, she worked as a competition lawyer in Brussels Continue reading
In this post we will discuss how hair-pining is occurring in some topologies in the Enterprise branch sites, when connecting to 2 Service Providers, while the 2 Service Providers are not directly connected to each other and don’t have any MPLS/VPN Inter-AS Option (A,B,C,..) with each other. From the customer side, some of the remote …
Continue reading "Hair-pining in a Wide Area Network – Simple Design Scenario"
The post Hair-pining in a Wide Area Network – Simple Design Scenario appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Everyone’s favorite time of the year is almost here! Is it because it’s the holiday season? Perhaps it’s the magic that happens at the end of the year? Or maybe, it’s because there’s an even better reason to get excited!
Change Freeze Season!
That’s right. Some of you reading this started jumping up and down like Buddy the Elf at the thought of having a change freeze. There’s something truly magical about laying down the law about not touching anything in the system until after the end-of-year reports are run and certified. For some, this means a total freeze of non-critical changes from the first of December all the way through the New Year until maybe even February. That’s a long time to have a frozen network? But why?
Change freezes are an easy thing to explain to the new admins. You simply don’t touch anything in the network during the freeze unless it’s broken. No tweaking. No experimenting. No improvements. Just critical break/fix changes only. There had better be a ticket. There should be someone yelling that something’s not right. Otherwise you’re in for it.
There are a ton of reasons for this. The first is Continue reading
Today’s reality is multi-vendor, hybrid environments that are hard to manage and secure. Those who can overcome these challenges can deliver greater performance and enhanced functionality for end users.
One of the fundamentals I always emphasize in introductory parts of my network automation workshops and online courses is the fact that we’re about to develop software that will control the most-mission-critical part of IT infrastructure, and should therefore use software development methodologies like version control, testing…
However, there’s a “small” glitch. While it’s perfectly possible to test most software in some virtual environment you can spin up on-the-fly using Vagrant, Docker, Jenkins, Travis, or some other CI/CD tool, testing a network automation solution requires access to network devices.
Read more ...
“Nobody gets to keep a lock on cloud computing,” Wasabi CEO David Friend said. “As much as Amazon would like to, it’s going to be a multi-cloud world.”
Enterprise network architectures are being reshaped using tenets popularized by the major cloud properties. This podcast explores this evolution and looks at the ways that real-time streaming telemetry, machine learning, and artificial intelligence affect how networks are designed and operated.
In working with the ONF, Comcast is breaking with a long cable tradition of not sharing technology and innovation ideas with competitors.
The Linux Foundation project OpenChain is developing an overarching standard for creating a quality compliance program that companies can apply across the supply chain.
The company has a similar product for Microsoft Azure that is slated to enter beta next year. Google Cloud is on the roadmap for future support.
Complex cloud applications need decent visualizations to help infrastructure engineers understand what's going on. For cloud visibility, Kentik absorbs AWS & GCP flow logs, with Azure support coming. Kubernetes & Istio are also data providers to Kentik. Using the Kubernetes API, Kentik correlates pod IPs to pod names and cluster namespaces. With that information, Kentik can visualize pod to pod and service to service traffic flows within a Kubernetes cluster.
The post BiB 066: Why Cloud Visibility Matters appeared first on Packet Pushers.