Archive

Category Archives for "Networking"

Musing: The Short Life of Influencers

We have a seen a number of people in the influencer recently taking jobs at vendors. Keith Townsend is the latest and I wish him the very best. I'm not saying if you participate in @TechFieldDay you'll find a new job. But the correlation between the number of TFD delegates starting new jobs in the […]

Softening chip market hit harder by trade wars

Seasonal softness and a looming tariff dispute between China and the U.S. put a dampener on the chip market, and it only looks to be getting worse with China interfering in the business of a U.S. company.Last week, Micron Technology, the number four chip vendor, according to IHS Markit, said China is blocking sales of some of its memory products. While based in Boise, Idaho, and having a large fabrication plant there, Micron also makes a lot of products in China for the Chinese market. And Micron is currently in a legal battle with Taiwanese chip maker United Microelectronics over alleged patent violations in China.Last week, a Chinese court granted a preliminary injunction banning Micron subsidiaries in China from manufacturing or selling DRAM modules and NAND flash chips used in solid-state drives. The good news, according to Micron, is that the injunction covers only 1 percent of its revenue.To read this article in full, please click here

Softening chip market hit harder by trade wars

Seasonal softness and a looming tariff dispute between China and the U.S. put a dampener on the chip market, and it only looks to be getting worse with China interfering in the business of a U.S. company.Last week, Micron Technology, the number four chip vendor, according to IHS Markit, said China is blocking sales of some of its memory products. While based in Boise, Idaho, and having a large fabrication plant there, Micron also makes a lot of products in China for the Chinese market. And Micron is currently in a legal battle with Taiwanese chip maker United Microelectronics over alleged patent violations in China.Last week, a Chinese court granted a preliminary injunction banning Micron subsidiaries in China from manufacturing or selling DRAM modules and NAND flash chips used in solid-state drives. The good news, according to Micron, is that the injunction covers only 1 percent of its revenue.To read this article in full, please click here

sFlow available on Juniper PTX series routers


sFlow functionality introduced on the PTX1000 and PTX10000 platforms—Starting in Junos OS Release 18.2R1, the PTX1000 and PTX10000 routers support sFlow, a network monitoring protocol for high-speed networks. With sFlow, you can continuously monitor tens of thousands of ports simultaneously. The mechanism used by sFlow is simple, not resource intensive, and accurate.  - New and Changed Features

The recent article, sFlow available on Juniper MX series routers, describes how Juniper is extending sFlow support to include routers to provide visibility across their entire range of switching and routing products.

Universal support for industry standard sFlow as a base Junos feature reduces the operational complexity and cost of network visibility for enterprises and service providers. Real-time streaming telemetry from campus switches, routers, and data center switches, provides centralized, real-time, end-to-end visibility needed to troubleshoot, optimize, and account for network usage.

Analytics software is a critical factor in realizing the full benefits of sFlow monitoring. Choosing an sFlow analyzer discusses important factors to consider when selecting from the range of open source and commercial sFlow analysis tools.

IDG Contributor Network: The rise of artificial intelligence DDoS attacks

What keeps me awake at night is the thought of artificial intelligence lying in wait in the hands of bad actors. Artificial intelligence combined with the powers of IoT-based attacks will create an environment tapped for mayhem. It is easy to write about, but it is hard for security professionals to combat. AI has more force, severity, and fatality which can change the face of a network and application in seconds.When I think of the capabilities artificial intelligence has in the world of cybersecurity I know that unless we prepare well we will be like Bambi walking in the woods. The time is now to prepare for the unknown. Security professionals must examine the classical defense mechanisms in place to determine if they can withstand an attack based on artificial intelligence.To read this article in full, please click here

IDG Contributor Network: The rise of artificial intelligence DDoS attacks

What keeps me awake at night is the thought of artificial intelligence lying in wait in the hands of bad actors. Artificial intelligence combined with the powers of IoT-based attacks will create an environment tapped for mayhem. It is easy to write about, but it is hard for security professionals to combat. AI has more force, severity, and fatality which can change the face of a network and application in seconds.When I think of the capabilities artificial intelligence has in the world of cybersecurity I know that unless we prepare well we will be like Bambi walking in the woods. The time is now to prepare for the unknown. Security professionals must examine the classical defense mechanisms in place to determine if they can withstand an attack based on artificial intelligence.To read this article in full, please click here

Datanauts 141: Managing Cloud-Native Applications

Cloud native applications are designed to be managed by software in all stages. This includes ongoing health checks as well as initial deployments. Human bottlenecks should be eliminated as much as possible in the technology, processes, and policies.

That quote is from the O Reilly book Cloud Native Infrastructure. On today s Datanauts episode, we talk to Justin Garrison, one of the authors and a senior systems engineer.

We dive into the chapter about managing cloud native applications, including a general conversation about the definition of a cloud-native app–that is, an application managed by software rather than humans.

Then we discuss the challenges of managing a microservices architecture, explore the concept of sidecar proxies, and walk through the process of deploying a new cloud application into production.

We also look at troubleshooting tools and techniques, and examine the necessity of service discovery and resource scheduling.

Sponsor: Linux Academy

Linux Academy offers the most hands-on training content in AWS, Azure, OpenStack, Linux, DevOps, Containers, security, and Google Cloud. Beginners and advanced learners alike will find up-to-date courses in skills development and certification prep. Hands-on labs let you work in actual cloud environments. Find out about the newest courses available online–including Continue reading

BrandPost: Why Storage Hardware Matters for Data Security

IT and business executives nearly always say data security is the No. 1 issue keeping them awake at night. The ramifications of a breach or attack loom large — whether it’s the potential of financial losses, brand damage, or loss of intellectual property.The concerns escalate when it comes to data stored in the cloud. As companies increasingly deploy either their own private clouds or a mix of private and public, they’re recognizing the need to pay greater attention to data protection. And with forecasts rising for the volume of data in cloud storage, it’s becoming a critical issue.To read this article in full, please click here

What’s the future of server virtualization?

Server virtualization is one of those technologies that’s simple in concept and profound in its impact on enterprise data centers.What if, instead of running one operating system instance and one application per server, you could add a layer of software, known as a hypervisor, that enables you to run multiple operating system instances and associated workloads on a single physical server?[ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ] That’s the idea behind server virtualization, and the idea dates back to IBM mainframes in the 1960s and was popularized by VMware, which introduced virtualization software for x86 servers in the early 2000s. Since then, other vendors have developed their own server-virtualization platforms and the industry as a whole has created advanced management, automation and orchestration tools that make deploying, moving and managing virtual machine (VM) workloads a breeze.To read this article in full, please click here

What’s the future of server virtualization?

Server virtualization is one of those technologies that’s simple in concept and profound in its impact on enterprise data centers.What if, instead of running one operating system instance and one application per server, you could add a layer of software, known as a hypervisor, that enables you to run multiple operating system instances and associated workloads on a single physical server?[ See where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights by signing up for Network World newsletters. ] That’s the idea behind server virtualization, and the idea dates back to IBM mainframes in the 1960s and was popularized by VMware, which introduced virtualization software for x86 servers in the early 2000s. Since then, other vendors have developed their own server-virtualization platforms and the industry as a whole has created advanced management, automation and orchestration tools that make deploying, moving and managing virtual machine (VM) workloads a breeze.To read this article in full, please click here

Rough Guide to IETF 102: IPv6

In this post for the Internet Society Rough Guide to IETF 102 I’ll review what’ll be happening at the IETF meeting in Montreal next week on the topic of all things IPv6.

IPv6 global adoption rates have shown slow growth since IETF 101 and are currently approaching 25% overall. With the almost total depletion of the remaining pools of new IPv4 addresses, more-and-more networks have been increasing their IPv6 deployments, with the top 15 network operators supporting nearly half-a-billion IPv6 users. In addition, 28 percent of the Alexa Top 1000 websites are IPv6-enabled, including many of the large content providers who are now delivering native IPv6 traffic to mobile devices in particular. The US recently reached 40% deployment with nearly 80% of smartphones using IPv6, whilst along with Belgium, India, Germany, Brazil and Japan who still lead the way, we’re starting to see significant growth in countries such as Switzerland, Portugal, Estonia, Uruguay, Ecuador, Peru and New Zealand.

IPv6 is always an important focus for the IETF, particularly with respect to the standardisation work related to the Internet-of-Things.

The IPv6 Maintenance (6man) Working Group is a key group and it will be meeting on Monday morning. It hasn’t published any RFCs since Continue reading

Rough Guide to IETF 102: Internet of Things

The buzz around the Internet of Things (IoT) is only increasing, to the surprise of, well, no one. We are often asked what is happening in the IETF in relation to IoT and in this short post I’d like to highlight some of the relevant activities and sessions scheduled during the upcoming IETF 102 meeting in Montreal. Also check out the IETF Journal IoT Category, the IETF IoT page, the IETF IoT Directorate, the Internet Society’s IoT page, or the Online Trust Alliance (OTA, which became an Internet Society Initiative in April 2017) IoT page for more details about many of these topics.

The IETF Hackathon, held on the weekend preceding the main IETF meeting (July 14-15), includes projects directly related to IoT, with the possibility of more being added. More information is on the Hackathon wiki. Projects of interest include those relating to:

  • Software Updates for Internet of Things (suit)
  • Authentication and Authorization for Constrained Environments (ace)
  • IPv6 over Low Power Wide-Area Networks (lpwan)
  • Work on IoT Semantic / Hypermedia Interoperability (WISHI)

The Thing-to-Thing Research Group (T2TRG) investigates open research issues towards turning the IoT into reality. The research group will be meeting on Thursday afternoon Continue reading

BrandPost: What’s Missing from DNS in the Enterprise?

A Brief DNS HistoryDNS is the internet’s backbone, the ‘network before the network’. Originally designed to solve the problem of knowing how to route email between disparate internet hosts, DNS is now a 35-year old connection protocolat the heart of every network. However, there are inherent shortcomings. First, DNS is naïve – built for an internet without trust requirements as its designers could not have foreseen today’s threats. DNS was built to simply answer questions to establish a connection, and it’s good at that – but that also leaves it susceptible. For example, the support for recursive DNS requests, which query other servers repeatedly, are vulnerable to fake requests from a spoofed IP address leading to Amplifier attacks. DNS caches can be poisoned by viruses, causing domain lookups to go to the wrong IP address. And yet, DNS is an integral part of every email, every web access, and every internet transaction.To read this article in full, please click here