The two vendors are offering connectivity and SD-WAN over Ericsson’s private network. The offering looks similar to Aryaka’s.

Six o’clock already, I was just in the middle of a dream, now I’m up, awake, looking at my Twitter stream. As I do that the Twitter app is making multiple API calls over HTTPS to Twitter’s servers somewhere on the Internet.
Those HTTPS connections are running over TCP via my home WiFi and broadband connection. All’s well inside the house, the WiFi connection is interference free thanks to my eero system, the broadband connection is stable and so there’s no packet loss, and my broadband provider’s connection to Twitter’s servers is also loss free.
Those are the perfect conditions for HTTPS running over TCP. Not a packet dropped, not a bit of jitter, no congestion. It’s even the perfect conditions for HTTP/2 where multiple streams of requests and responses are being sent from my phone to websites and APIs as I boot my morning. Unlike HTTP/1.1, HTTP/2 is able to use a single TCP connection for multiple, simultaneously in flight requests. That has a significant speed advantage over the old way (one request after another per TCP connection) when conditions are good.
But I have to catch an early train, got to be to work by nine, so Continue reading
Today’s hybrid architectures require a combination of monitoring techniques to create a modern, full-stack, hybrid cloud monitoring capability.
The fast pace of webinars continues in October 2018:
There are no on-site events planned until early December:
You can attend all upcoming webinars with an ipSpace.net webinar subscription. Online courses and on-site events require separate registration.
So, you've created a compute instance (ie, a virtual machine) on Amazon EC2. Next question: does the instance require access to and/or from the Internet?
Protip: just because you created the instance in the public cloud, i.e. the cloud that you get to over the Internet, it doesn't mean that your instances all need to sit on the Internet. They can have direct inbound and outbound Internet access, no Internet access, or something in between (which I'll explain).
The basic building block for networking on AWS is the VPC (Virtual Private Cloud). Within a VPC, you define your IP space, gateways, ACLs, DHCP options, and more. Gateways will be the focus of this article.
Patel oversaw CenturyLink’s integration with Level 3 Communications and has experience with many large acquisitions.
NSX Data Center is now the de facto SDN standard for the Private Cloud. Reference guides for NSX Data Center are proven to reduce complexity in managing the physical switch infrastructure. This increases the infrastructures stability and requires a minimal set of system and service configuration to bring up the fabric. Organizations utilize NSX Data Center for a diverse set of use cases including security, a diverse application framework deployment platform, and application continuity across private and hybrid clouds. With reference designs for any underlay, NSX Data Center is fulfilling its promise to be a platform over any infrastructure. NSX Data Center provides the cornerstone for the Virtual Cloud Network.
Ever since publishing our original design guide Deploying NSX with Cisco ACI as an Underlay, there has been an avalanche of interest in building out a more simplified Cisco infrastructure with ACI as the underlay. Most of the requests are for more detail when constructing the ACI underlay. The high-level design guidance in the original NSX reference design for ACI discussed the minimum ACI constructs necessary for an NSX Data Center deployment. These ideals have not changed. The original paper called Continue reading
Digital Realty already has data centers in North America, Europe, Asia, and Australia. This expands its data center footprint to Latin American — a region primed for growth.
For a server to be truly dispensable, it should be able to be shut down at will or fail without any noticeable end-user impact.
WiFi, fixed access, and satellites are promising technologies that operators should consider as viable alternatives to fiber or microwave for 5G backhaul.
The integration allows users to manage the digital model using event-driven and serverless methods that can then be transferred to the physical environment.
The initiative supports the movement of transactional, operational, customer, or IoT data between the data lake and a customer’s operations.
Worldwide revenue for the telco VNF market in 2017 stood at only $2.5 billion.
Originally developed for the data center, silicon photonics can pump lots of data from the tower to the baseband unit or central office.
The planned IPO comes three years private equity firms Thoma Bravo and Silver Lake took the IT management company private for $4.5 billion.
At NANOG on the Road (NotR) in September of 2018, I participated in a panel on BGP security—specifically the deployment of Route Origin Authentication (ROA), with some hints and overtones of path validation by carrying signatures in BGP updates (BGPsec). This is an area I have been working in for… 20 years? … at this point, so I have seen the argument develop across these years many times, and in many ways. What always strikes me about this discussion, whenever and wherever it is aired, is the clash between business realities and the desire for “someone to do something about routing security in the DFZ, already!” What also strikes me about these conversations it the number of times very fundamental concepts end up being explained to folks who are “new to the problem.”
Part of the problem here is Continue reading