Archive

Category Archives for "Networking"

Technology often thought of as SDN !!!

What is SDN ? SDN Definition varies  from Vendor to vendor ,commonly  the architecture of SDN defined by each vendor includes use of different technology to make  network automate, flexible, agile, dynamic ,scalable and most importantly cost effective.

I was going through Network automation article and found the different technology/trends which are some or other way often thought of  a SDN, or are important  part of SDN discussion .It’s good to go through it  :-

OpenFlow : Its low level protocol used to decouple the control plane from the data plane.

NFV Network function Virtualization: It refers to taking functions that have traditionally have been deployed as hardware ,instead deploy them as software.

Virtual Switching :They are software based  switches VDS(VMware Distributed switch ) ,AVS(cisco application virtual switch ),VSS(VMware Std. switch) etc.  that resides in hypervisor kernel providing local network connectivity b/w virtual  machines.

Network Virtualization: It refers to software-only overlay-based solution. A key characteristic of these solutions is that an overlay-based protocol such as Virtual eXtensible LAN (VxLAN) is used to build connectivity between hypervisor-based virtual switches.  This connectivity and tunneling approach provides Layer 2 adjacency between virtual machines that exist on different physical hosts independent of Continue reading

Cloudflare Access: Sharing our single-sign on plugin for Atlassian

Here at Cloudflare, we rely on a set of productivity tools built by Atlassian, including Jira and Confluence. We secure them with Cloudflare Access. In the past, when our team members wanted to reach those applications, they first logged in with our identity provider credentials to pass Access. They then broke out a second set of credentials, specific to Atlassian tools, to reach Jira. The flow is inconvenient on a desktop and downright painful on a mobile device.

While Access can determine who should be able to reach an application, the product alone cannot decide what the user should be able to do once they arrive at the destination. The application sets those specific permissions, typically by requiring another set of user credentials. The extra step slows down and frustrates end users. Access saves time by replacing a cumbersome VPN login. However, we wanted to also solve the SSO problem for our team.

We created a plugin, specific to Atlassian, that could take identity data from the token generated by Access and map it to a user account. Our team members log in with our identity provider to pass Access, and then Access could set their user permissions in Jira Continue reading

Cisco, SAP team up to ease cloud, container integration, management

Cisco today said it has teamed with SAP to make it easier for customers to manage high volumes of data from multi-cloud and distributed data center resources.The companies announced that Cisco’s Container Platform will work with SAP’s Data Hub to integrate large data sets that may be in public clouds, such as Amazon Web Services, Hadoop, Microsoft or Google, and integrate them with private cloud or enterprise apps such as SAP S/4 HANA.[ Check out our 12 most powerful hyperconverged infrasctructure vendors. | Get regularly scheduled insights by signing up for Network World newsletters. ] Cisco introduced its Kubernetes-based Container Platform in January and said it allows for self-service deployment and management of container clusters. SAP rolled out the Data Hub about a year ago, saying it provides visibility, orchestration and access to a broad range of data systems and assets while enabling the fast creation of powerful, organization-spanning data pipelines.To read this article in full, please click here

Cisco, SAP team up to ease cloud, container integration, management

Cisco today said it has teamed with SAP to make it easier for customers to manage high volumes of data from multi-cloud and distributed data center resources.The companies announced that Cisco’s Container Platform will work with SAP’s Data Hub to integrate large data sets that may be in public clouds, such as Amazon Web Services, Hadoop, Microsoft or Google, and integrate them with private cloud or enterprise apps such as SAP S/4 HANA.[ Check out our 12 most powerful hyperconverged infrasctructure vendors. | Get regularly scheduled insights by signing up for Network World newsletters. ] Cisco introduced its Kubernetes-based Container Platform in January and said it allows for self-service deployment and management of container clusters. SAP rolled out the Data Hub about a year ago, saying it provides visibility, orchestration and access to a broad range of data systems and assets while enabling the fast creation of powerful, organization-spanning data pipelines.To read this article in full, please click here

IDG Contributor Network: The WAF backed by artificial intelligence (AI)

The Web Application Firewall (WAF) issue didn't seem to me as a big deal until I actually started to dig deeper into the ongoing discussion in this field. It generally seems that vendors are trying to convince customers and themselves that everything is going smooth and that there is not a problem. In reality, however, customers don’t buy it anymore and the WAF industry is under a major pressure as constantly failing on the customer quality perspective.There have also been red flags raised from the use of the runtime application self-protection (RASP) technology. There is now a trend to enter the mitigation/defense side into the application and compile it within the code. It is considered that the runtime application self-protection is a shortcut to securing software that is also compounded by performance problems. It seems to be a desperate solution to replace the WAFs, as no one really likes to mix its “security appliance” inside the application code, which is exactly what the RASP vendors are currently offering to their customers. However, some vendors are adopting the RASP technology.To read this article in full, please click here

IDG Contributor Network: The WAF backed by artificial intelligence (AI)

The Web Application Firewall (WAF) issue didn't seem to me as a big deal until I actually started to dig deeper into the ongoing discussion in this field. It generally seems that vendors are trying to convince customers and themselves that everything is going smooth and that there is not a problem. In reality, however, customers don’t buy it anymore and the WAF industry is under a major pressure as constantly failing on the customer quality perspective.There have also been red flags raised from the use of the runtime application self-protection (RASP) technology. There is now a trend to enter the mitigation/defense side into the application and compile it within the code. It is considered that the runtime application self-protection is a shortcut to securing software that is also compounded by performance problems. It seems to be a desperate solution to replace the WAFs, as no one really likes to mix its “security appliance” inside the application code, which is exactly what the RASP vendors are currently offering to their customers. However, some vendors are adopting the RASP technology.To read this article in full, please click here

#BetterInternet: Join the Movement

#BetterInternet: Join the Movement
#BetterInternet: Join the Movement

When it comes to overall awareness of Cloudflare, it seems most folks fall into one of three camps: 1) those who don’t know much about Cloudflare at all, 2) those who are familiar with one or two of Cloudflare’s many solutions (i.e. DDoS protection, caching, DNS, etc.), and finally, 3) those who understand the full breadth and scope of Cloudflare’s global cloud network. This latter group of folks are especially excited about the broad scope of Cloudflare’s mission, which is: “to help build a better Internet.” Last week our co-founder Michelle Zatlyn explained in a blog post what this mission actually means:

“Our mission at Cloudflare is to help build a better Internet. That is a big, broad mission that means many things. It means that we push to make Internet properties faster. It means respecting individual’s privacy. It means making it harder for malicious actors to do bad things. It means helping to make the Internet more reliable. It means supporting new Internet standards and protocols, and making sure they are accessible to everyone. It means democratizing technology and making sure the widest possible group has access to it. It means increasing value for our community, Continue reading

We’ve Added an AWS Course to Our Video Library!

Hello! My name is Miles Karabas. I would like to tell you about my new course, AWS Certified SysOps Administrator, that just got released. The primary objective of this course is to teach the core components and services, and the basic concepts of AWS platform, and prepare you for the Certified SysOps Administrator – Associate level exam.

Why Get AWS Certified?

Amazon is the world leader in web services, and it’s services are used by thousands of companies around the world. AWS certifications show a potential employer that you have the skills to design, deploy and manage secure, highly available, cost efficient, scalable and fault tolerant systems on the AWS Platform. An AWS certification also puts you in an elite group of cloud engineers. These certifications are highly valued by employers. Last, AWS Certified engineers are among the highest paid IT professionals.

About the Course

The Certified AWS SysOps Administrator Exam focuses on specific processes of implementation, monitoring and managing of AWS services.

The course will cover the following topics:

  • Compute
  • Load Balancing & Auto Scaling
  • Storage
  • Databases
  • Security & Identity
  • Management Tools
  • Analytics
  • Networking & Content Delivery
  • Messaging
  • Monitoring

AWS exams are experience based, this course includes several hours Continue reading

Indigenous Access: It Will Benefit All Generations

In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership to work together to bridge the connectivity gap in indigenous communities in North America. One of the participants shared his story.

“My background is in architecture. This is all brand new,” said Merrill Yazzie, tribal community planner and project coordinator for the Pueblo of Cochiti. The pueblo had just begun to lay fiber to improve tribal Internet access. “The community itself doesn’t have Internet. The one line just goes to the government, to the administrative building,” said Yazzie. “Everyone relies on their cellular phones or satellite services, which can be pretty expensive.”

According to Yazzie, an enrolled member of the Navajo Nation, there are many advantages to increased Internet access. “It will benefit all generations,” said Yazzie. “Economically it will be a benefit. You don’t have access to the universities because you don’t have a vehicle or public transportation is not available. One way to access education would be through online courses.” Further, he mentioned the benefit increased connectivity could bring to basic services: Continue reading

Augmented reality, fog, and vision: Duke professor outlines importance of smart architectures

An academic researcher’s talk on Monday at the Fog World Congress in San Francisco demonstrated both the limits of distributed computing structures and their critical importance to future IoT and augmented reality (AR) implementations.Dr. Maria Gorlatova’s recent work has centered on the study of fog and edge architecture – specifically, the way in which particular methods of architecting those systems can affect latency and response time. She's studying the differences in systems which are on- and off-campus, that have different points of execution, which seems like the academic way of saying “where the computational work is done.”To read this article in full, please click here