People who work hands-on with Cisco gear finally understand it's time to reskill, and DevNet can help.
You are a problem…maybe the biggest problem of all. No? The crashing router code is the biggest problem? The leaking memory in the switch?
The app needs layer 2 stretched between data centers–what problem could be worse than that?
Today on the show, we re here to argue that, no…it s you. And me. And everyone else you work with.
With us today to defend the idea that technology problems are really people problems is Eyvonne Sharp, network architect and co-founder of The Network Collective.
We talk about how people and processes can contribute more to a problem than a technology. We also talk about three different organizational culture types (Pathological, Bureaucratic, and Generative), how to evaluate your own organization, and Eyvonne recommends a few books on team building and culture development.
Using the Westrum typology to measure culture – Andy Kelk
Forget about broad-based pay hikes, executives say – Axios
The Undoing Project – Michael Lewis
The Five Dysfunctions of a Team: A Leadership Fable –
Team of Teams: New Rules of Engagement for a Complex World – General Stanley McChrystal
The post Show 394: Technology Continue reading
The 12th edition of the European Dialogue on Internet Governance or the EuroDIG, as it is commonly known, took place in Tbilisi, Georgia, on 5-6 June. The Internet Society (ISOC) is an institutional partner to EuroDIG and the ISOC European Regional Bureau helped shape the agenda and were involved in several sessions.
This year, a few specific aspects caught my attention and created a lot of debate during the sessions and in the corridors.
Reinforcing the multistakeholder model
While European governments have traditionally been strong supporters of the Internet Governance Fora (IGF) and the multistakeholder model, this support has been to some extent compromised by concerns over national security and other priorities in the recent times. Several core members of the European Internet community have talked about a “fatigue” with the regional and national IGFs.
This year’s EuroDIG offered some fresh food for thought. Larry Strickling, who leads the Internet Society’s Collaborative Governance project, made several interventions during the EuroDIG. Strickling’s extensive experience of driving multistakeholder processes and his practical approach were received with great interest and curiosity. In parallel, high participation from young people injected heaps of new energy and optimism to the event.
Embracing the Internet opportunity Continue reading
Myths about the drawbacks and limits of hyperconvergence software have spread due to the fact that many of these “appliance solutions in software clothing” don’t have the flexibility of a true software solution.
The annual Hackathon@AIS, in its second year, is aimed at exposing engineers from the Africa region to open Internet Standards Development. This year, the event was held 9-10 May 2018 in Dakar Senegal at the Radisson Blu Hotel during the Africa Internet Summit (AIS-2018).
The event was attended by more than 75 engineers from 15 countries including 11 fellows who were supported to attend the event. The event featured participants with English and or French-speaking backgrounds encouraging collaboration to work. Organized into 3 tracks, the event allowed participants to choose which track they were interested in participating in. The tracks were as follows:
1. Network Time Protocol Track
Objectives:
Facilitators:
Participants were introduced to NTP and asked to test out an IETF draft and implement it in open source NTP clients.
Outcome:
Participants were able to successfully implement draft and made presentations demonstrating their work and accomplishments.
2. Network Programmability
Objectives:
Employees are using many other means than email to communicate including text and Skype, presenting challenges for IT teams.
A while ago I found an interesting analysis of HTTP/2 behavior under adverse network conditions. Not surprisingly:
When there is packet loss on the network, congestion controls at the TCP layer will throttle the HTTP/2 streams that are multiplexed within fewer TCP connections. Additionally, because of TCP retry logic, packet loss affecting a single TCP connection will simultaneously impact several HTTP/2 streams while retries occur. In other words, head-of-line blocking has effectively moved from layer 7 of the network stack down to layer 4.
What exactly did anyone expect? We discovered the same problems running TCP/IP over SSH a long while ago, but then too many people insist on ignoring history and learning from their own experience.
Cohesity’s technology helped Schneider Electric eliminate its reliance on legacy backup and shift to a hybrid cloud approach.
CNCF Executive Director Dan Kohn said the group is focused during the second-half of this year on seeing if Kubernetes can take on a greater role in shaping the future of cloud architecture.
IPv6 Buzz is back with a new episode on how SDN could change how we think about the role IPv6 plays in the enterprise. Our guest is Tim Martin.
The post IPv6 Buzz 002: SDN And IPv6 With Tim Martin appeared first on Packet Pushers.
Virtual Routing and Forwarding (VRF) is a ubiquitous concept in networking, first introduced in the late 1990s as the control and data plane mechanism to provide traffic isolation at layer 3 over a shared network infrastructure. VRF for Linux is an excellent blog that describes the technology behind VRFs, especially as it pertains to the Linux kernel. With the introduction of support for leaking of routes, VRFs get to enjoy their isolation while also having the nous to mix and mingle.
You have a valid question there. That was certainly the initial use case for VRFs. Each VRF was intended to represent a customer of a service provider and isolation was a fundamental tenet. Each VRF had its own routing protocol sessions and IPv4 and IPv6 routing tables and route computation as well as packet forwarding was independent from other VRFs. All communication stayed within the VRF other than specific scenarios such as reaching the Internet. Hershey’s wouldn’t want to get too chatty with Lindt, right? No, VRFs weren’t meant to be gregarious.
As VRFs moved outside the realm of the service provider and started finding application elsewhere, such as in the Continue reading
Course Duration: 1hr 45min
About the Course
The modern accessibility of public, private and hybrid cloud environments has led rise to a bastion of cloud-centric practices. One of the most notable is the idea of QA and Testing in the cloud. This course will describe the concepts, methodologies and implementations of testing in a cloud environment. We will go through the full software QA lifecycle and describe where and how each component of that lifecycle can be offloaded into the cloud and further describe methods and mechanisms on how to do so effectively.
InfoVista’s VNF will be added to Huawei’s open SD-WAN service to support application monitoring and delivery capabilities, WAN optimization, and analytics.
Similar to the earlier Spectre and Meltdown bugs the new security flaw could allow access to sensitive data through a side channel. Intel ranks it as a “moderate” vulnerability.
In this interview, Karl Brown, senior director of product management for the Citrix NetScaler SD-WAN platform, talks about Citrix’s approach to SD-WAN.