The application performance management (APM) platform provides native visibility into containers running on Kubernetes, Red Hat OpenShift, and Pivotal Cloud Foundry.
It never ceases to amaze me how quickly technology evolves. In 2007, the iPhone was released and dramatically transformed the way we communicate. Then, less than three years later, the first iPad hit consumer shelves and revolutionized personal computing. Now, Internet service providers around the world are racing to deploy the infrastructure needed to fuel our transition into smart cities of increasingly connected homes and driverless cars.
While some major U.S. cities are set to get home access to 5G broadband speeds as soon as this month, there are still many people living in rural and remote Indigenous communities across North America that struggle to open an email.
It’s time to get our priorities straight. The Internet is a powerful tool transforming virtually every aspect of our lives. But we can’t move forward if anyone is left behind. Indigenous voices must count in our digital future.
The Canadian Radio-television and Telecommunications Commission (CRTC) recently made an important step in the right direction when it released details of its $750 million Broadband Fund to improve connectivity in underserved and remote regions of Canada.
The fund makes an important commitment to ensure applicants consult with First Nations, Inuit, and Métis and Continue reading
European test lab EANTC tested several SD-WAN vendors solutions and compared their scalability and performance.
The idea behind graceful upgrades is to swap out the configuration and code of a process while it is running, without anyone noticing it. If this sounds error prone, dangerous, undesirable and in general a bad idea – I’m with you. However, sometimes you really need them. Usually this happens in an environment where there is no load balancing layer. We have these at Cloudflare, which led to us investigating and implementing various solutions to this problem.
Coincidentally, implementing graceful upgrades involves some fun low-level systems programming, which is probably why there are already a bajillion options out there. Read on to learn what trade-offs there are, and why you should really really use the Go library we are about to open source. For the impatient, the code is on github and you can read the documentation on godoc.
So what does it mean for a process to perform a graceful upgrade? Let’s use a web server as an example: we want to be able to fire HTTP requests at it, and never see an error because a graceful upgrade is happening.
We know that HTTP uses TCP under the Continue reading
Perhaps the biggest benefit of containers is that they can be managed by Kubernetes, which is a pre-defined operational model.
Containers may make life easier for developers, but they can complicate matters for the operations team. These best practices can help.
This blog post was initially sent to the subscribers of my SDN and Network Automation mailing list. Subscribe here.
What could be better than an SDN product to bring you closer to a networking nirvana? You guessed it – an SDN product using machine learning.
Want to have some fun? The next time your beloved $vendor rep drops by trying to boost his bonus by persuading you to buy the next-generation machine-learning tool his company just released, invite him to watch James Mickens’ Usenix Security Symposium keynote with you.
Read more ...The Internet Society in conjunction with Packet Clearing House (PCH), our Kyrgyzstan Chapter (ISOC-KG) and the CAREN Project organised a BGP and Peering capacity building workshop on 3-7 September 2018 in Bishkek, Kyrgyzstan. This five-day workshop was aimed at training engineers for the existing KG-IX Internet Exchange in the capital Bishkek, but also for the prospective Ferghana Valley Internet Exchange being established in the southern city of Osh.
The workshop was led by Nishal Goburdhan who’s an Internet Analyst at PCH, a non-profit organisation that builds and support IXPs around the world. He was assisted by myself (Kevin Meynell), with the workshop being hosted by the National Academy of Sciences of the Republic of Kyrgyzstan.
The workshop was comprised of a mix of lectures and hands-on lab work to teach the skills required for interconnecting networks on the Internet, and participating in an Internet Exchange. It commenced with Internet address planning using both IPv4 and IPv6, followed by setting-up OSPF on different internal networks, then interconnecting those using BGP and applying routing policy and filtering. The workshop concluded with how to set-up an IXP and discuss current best practices for peering.
Twelve participants attended the workshop, drawn from the incumbent Continue reading
6WIND has been gaining customers by offering a replacement to Brocade’s vRouter, which was purchased by AT&T and taken off the market.
The monitoring tool already offers out-of-box support for VMware's and Cisco’s SD-WAN services.
The new service, called Cb ThreatHunter, is essentially a cloud-delivered version of the company’s on-premises endpoint detection and response device.