Archive

Category Archives for "Networking"

Happy Amazon Crash Day

On one of the biggest shopping days of the year for Amazon.com the company’s web site crapped out intermittently for hours yesterday.Instead of Prime Day purchases, many customers just got error messages and pictures of the dogs of Amazon, along with a message from Amazon that read: "Sorry, we're experiencing unusually heavy traffic. Please try again in a few seconds. Your items are still waiting in your cart," or “"Uh-Oh. Something went wrong on our end." [ Related: How to plan a software-defined data-center network.] Prime Day started at 3PM ET and the problems emerged almost immediately after.  Around 5 p.m., Amazon tweeted acknowledgement of the problem stating: “Some customers are having difficulty shopping and we are working to resolve this issue quickly.  Many are shopping successfully – in the first hour of Prime day in the US, customers have ordered more items compared to the first hour last year.”To read this article in full, please click here

BrandPost: How Cloud Migration Impacts Network Infrastructure

The Cloud ImperativeEnterprise IT is increasingly a multi-cloud affair. With Gartner projecting that 85 percent of enterprises are currently using a multi-cloud strategy, it seems difficult to find an enterprise that doesn’t. IT leaders are like conductors – orchestrating SaaS, PaaS, and on-premises code and data in increasingly virtualized, software-defined environment. With the cloud taking center stage, what impacts does migration of workloads have on infrastructure overall?Migration Challenges for InfrastructureAs IT strives to be more responsive to both lines of business and development teams seeking to spin up new instances and environments, workloads often need to move – and rapidly. But workload mobility has a downside, namely an increasing demand on the shared services on- and off-premises.To read this article in full, please click here

The Pursuit of Inspired Leadership

At Arista Networks, great technology and leadership inspires us to innovate and continue our mission to reinvent. It’s an ongoing journey to create the right leaders and disruptive technology for market transitions and Arista’s evolution. Today I digress a bit, as I was reading a 2017 Harvard Business Review article on the four key traits identified for successful CEOs. So much of it resonated with me with respect to the Arista way and our company culture. Let’s review how these traits apply to a fast-paced technology company like Arista.

The Pursuit of Inspired Leadership

At Arista Networks, great technology and leadership inspires us to innovate and continue our mission to reinvent. It’s an ongoing journey to create the right leaders and disruptive technology for market transitions and Arista’s evolution. Today I digress a bit, as I was reading a 2017 Harvard Business Review article on the four key traits identified for successful CEOs. So much of it resonated with me with respect to the Arista way and our company culture. Let’s review how these traits apply to a fast-paced technology company like Arista.

Innovative Approaches to Connecting Indigenous Communities

In November 2017, the Internet Society hosted its first Indigenous Connectivity Summit in Santa Fe, New Mexico. This event brought together over 200 Indigenous community members to talk about Internet access solutions, and the importance of connectivity for socioeconomic, health, community empowerment, education, and cultural and language preservation.

It was an incredible two days that resulted in new, meaningful relationships, partnerships, and opportunities for all those present. But the work isn’t done yet.

Connectivity in Indigenous communities continues to lag far behind non-Indigenous areas. Low speeds or non-existent service, high costs, and data caps plague many communities. In some Arctic communities in Canada, it is often cheaper and faster to mail a USB drive south, upload data, and mail it back North than it is to download the content on the slow and expensive services available.

To continue the conversation that was started in Santa Fe, the Internet Society will hold the second Indigenous Connectivity Summit in Inuvik, Northwest Territories, Canada on October 11-12. This event will bring together Indigenous community leaders, technical experts, researchers, policy makers, and service providers to address the unique connectivity issues Alaska Native, American Indian, Inuit, First Nation, and Métis communities face and how they Continue reading

Proxying traffic to Report URI with Cloudflare Workers

Proxying traffic to Report URI with Cloudflare Workers

The following is a guest post by Scott Helme, a Security Researcher, international speaker, and blogger. He's also the founder of the popular securityheaders.com and report-uri.com, free tools to help people deploy better security.

With the continued growth of Report URI we're seeing a larger and larger variety of sites use the service. With that diversity comes additional requirements that need to be met, some of them simple and some of them less so. Here's a quick look at those challenges and how they can be solved easily with a Cloudflare Worker. Continue reading

Amazon rumored to be entering the networking market

It’s hard to remember a time when people thought Amazon was nuts for going into the cloud computing business, since it was so far removed from the company’s core ecommerce business. No one is laughing now.It seems history could repeat itself. According to an article in The Information, Amazon is rumored to be targeting a new industry, albeit one dominated by a giant player and multiple healthy competitors — the network switching business. The move would put it in direct competition with Cisco, HPE, Juniper Networks, and Arista.To read this article in full, please click here

Amazon rumored to be entering the networking market

It’s hard to remember a time when people thought Amazon was nuts for going into the cloud computing business, since it was so far removed from the company’s core ecommerce business. No one is laughing now.It seems history could repeat itself. According to an article in The Information, Amazon is rumored to be targeting a new industry, albeit one dominated by a giant player and multiple healthy competitors — the network switching business. The move would put it in direct competition with Cisco, HPE, Juniper Networks, and Arista.To read this article in full, please click here

Amazon rumored to be entering the networking market

It’s hard to remember a time when people thought Amazon was nuts for going into the cloud computing business, since it was so far removed from the company’s core ecommerce business. No one is laughing now.It seems history could repeat itself. According to an article in The Information, Amazon is rumored to be targeting a new industry, albeit one dominated by a giant player and multiple healthy competitors — the network switching business. The move would put it in direct competition with Cisco, HPE, Juniper Networks, and Arista.To read this article in full, please click here

The Uncertainty of Measuring the DNS

In this article I’d like to explore a common aspect of measurements of the Internet’s Domain Name system. It’s nowhere near as formally stated as Heisenberg’s Uncertainty Principle, and cannot be proved formally, but the assertion is very similar, namely that there is a basic limit to the accuracy of measurements that can be made about the behaviour and properties of the DNS.

IETF 102, Day 2: Trust in the IETF

This week is IETF 102 in Montreal, Canada, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. And today’s topics include IPv6, IoT and Trust technologies.

6MAN commences at 09.30 EDT/UTC-4, and has six new drafts up for discussion covering IPv6 Neighbor Discovery Extensions for Prefix Delegation, IPv6 VPNs, ICMPv6, OAM in Segment Routing Networks with an IPv6 Data plane, allowing low or zero valid lifetimes to be accepted in Router Advertisement Prefix Information Options where it’s known that there can only be one router on the link; as well as introducing a new IPv6 ‘unrecognised’ option for ICMPv6 that conveys whether an underlying network can transmit IPv6 packets.

There are also three working group sponsored drafts, adopted from the last meeting. Privacy Extensions for Stateless Address Autoconfiguration in IPv6 describes an extension that causes nodes to generate global scope addresses from interface identifiers that change over time; IPv6 Segment Routing Header specifies how a node can steer a packet through a controlled set of instructions (segments) by prepending an SR header to the packet; whilst IPv6 Router Advertisement IPv6-Only Flag is an update to RFC 5175 that indicates Continue reading

Making Application Collaboration Easier with Docker Application Packages

In the first blog post about the experimental Docker Application Packages, Gareth showed how our new open-source docker-app can be used to augment Compose files by adding metadata and separate settings.

Now that you know how to create an Application Package, how do you share it? Using a Docker registry solution like Docker Hub or Docker Enterprise of course! Let’s look at an example that works with the latest release of docker-app. Here’s a simple single-file format Application Package with the filename hello.dockerapp:

# This section contains your application metadata.

version: 0.1.0
name: hello
description: "A simple HTTP echo server"
maintainers:
- name: Chris Crone
  email: [email protected]
targets:
  swarm: true
  kubernetes: true

---

# This section contains the Compose file that describes your application services.

version: '3.6'
services:
  hello:
    image: hashicorp/http-echo:${version}
    command: ["-text", "${text}"]
    ports:
      - ${port}:5678

 ---

# This section contains the default values for your application settings.

port: 5678
text: hello development
version: latest

We can save this Application Package as a Docker image using the save command:

$ docker-app save
Saved application as image: hello.dockerapp:0. Continue reading

Encryption Is Critical for the Australian Economy

On 17 July 2018, the Internet Society and its locally based chapter, Internet Australia, joined 75 organizations in signing a letter urging Australia not to pursue legislation that could undermine the security of encrypted services and devices used by Australians.

As Internet Society CEO Kathy Brown wrote last year, “strong encryption is an essential piece to the future of the world’s economy … it allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else”.

Encryption should be the norm for all Internet traffic and stored data.

The Internet Society recognizes the concerns of law enforcement and remains firm in its conviction that encryption is an important technical solution that all Internet users should use to protect their communications and data. Legal or technical measures that weaken encryption or other digital security tools will place the well-being of law-abiding Australians, and the Internet at large, at risk.

We urge you to stand with us in support of encryption.

Voice your support via #aussiesencrypt.

The post Encryption Is Critical for the Australian Economy appeared first on Internet Society.

Smart Shopping Starts Today!

Let’s face it – things are different now than when we were kids.

I grew up with technology. My weekends consisted of frantically switching out floppy disks while on 13-inch-green-screen missions to destroy cubism-esque dragons, orcs and whatever else I could with my wizard powers. It taught me critical reasoning, innovative thinking, and gave me the courage to try new things.

Now that I’m a mom, I’m an advocate for my kids to use tech. But today’s tech is different. Now the Internet is everywhere and it’s a part of our everyday lives, in everyday things. Coffeemakers, toothbrushes, toasters, televisions and, yes – even teeth.

Did you ever think we’d have connected homes, let alone bras that might detect breast cancer?

These everyday things are known as the Internet of Things – IoT for short. It’s already everywhere.

Manufacturers are building connected things faster than most of us can keep up. While that means there’s lots of cool things hitting the shelves, many haven’t been built with our security or privacy in mind. That’s why we hear stories ranging from the somewhat humorous to the terrifying.

But we’re hungry for IoT devices – buying them as fast as manufacturers can Continue reading