I had a great chat about the benefits of network automation with Christoph Jaggi a while ago, resulting in 2-part interview published by Inside-IT. As you might prefer to read the English original instead of using Google Translate, here it is (or you could practice your language skills and read the German version).
Read more ...
The following is a guest post by Paddy Sherry, Lead Developer at Gambling.com Group. They build performance marketing websites and tools, using Cloudflare to serve to their global audience. Paddy is a Web Performance enthusiast with an interest in Serverless Computing.
Choosing technology that is used on a large network of sites is a key architectural decision that must be correct. We build static websites but needed to find a way to make them dynamic to do things like geo targeting, restrict access and A/B testing. This post shares our experiences on what we learned when using Workers to tackle these challenges.
At Gambling.com Group, we use Cloudflare on all of our sites so our curiosity level in Workers was higher than most. We are big fans of static websites because nothing is faster than flat HTML. We had been searching for a technology like this for some time and applied to be part of the beta program, so were one of the first to gain access to the functionality.
The reason we were so keen to experiment with Workers is that for anyone running static sites, 99% of the time, the product requirements Continue reading
Last week saw the formal publication of the TLS 1.3 specification as RFC 8446. It’s been a long time coming – in fact it’s exactly 10 years since TLS 1.2 was published back in 2008 – but represents a substantial step forward in making the Internet a more secure and trusted place.
What is TLS and why is it needed?
Transport Layer Security (TLS) is widely used to encrypt data transmitted between Internet hosts, with the most popular use being for secure web browser connections (adding the ‘S’ to HTTP). It is also commonly (although less visibly) used to encrypt data sent to and from mail servers (using STARTTLS with SMTP and IMAP/POP etc..), but can be used in conjunction with many other Internet protocols (e.g. DNS-over-TLS, FTPS) where secure connections are required. For more information about how TLS works and why you should use it, please see our TLS Basics guide.
TLS is often used interchangeably with SSL (Secure Socket Layers) which was developed by Netscape and predates it as an IETF Standard, but many Certification Authorities (CAs) still market the X.509 certificates used by TLS as ‘SSL certificates’ due to their familiarity with Continue reading
Today's Weekly Show returns to the topic of open networking in production. Guest Andrey Khomyakov walks us through the management and operations side (rather than the hardware side) of network disaggregation, whiteboxes, and automation in a live environment.
The post Weekly Show 404: Running Open Networks In Production appeared first on Packet Pushers.
Just about every major US regulatory requirement says companies must use software that’s fully supported by the vendor that sells it. Simply put, if you’re using software that is beyond its end of life, you’re not only posing a security risk to your company – you’re also out of regulatory compliance.
It’s an issue for any public company, given that they must all comply with the Sarbanes Oxley Act, as well as any company that must meet the Payment Card Industry Data Security Standard (PCI DSS) or the Health Insurance Portability and Accountability Act (HIPAA). Those three acts alone cover an awful lot of, if not most, US companies.
All software has a lifecycle, including the network operating system (NOS) software controlling all the network switches and routers in enterprise networks. When that NOS is nearing its end of life, meaning you have no choice but to upgrade in order to stay in compliance, it’s a good time to assess your available options. In fact, given the pace of technology change, it’s a safe bet that you’ve got alternatives that quite literally didn’t exist when you installed your current NOS five, six — or more — years ago.
The SevOne monitoring software previously only gave insights into Cisco’s SD-WAN service.
Borrowing from the astrological meaning, the Goldilocks Zone refers to the space where organizations have the right amount of resources and combination of components to support network life.
The company’s open source blockchain-based security platform is working with enterprises to secure their IoT data and devices.
These issues can delay deployments, result in inferior service quality, and make it difficult to reach return on investment goals, according to John Isch at Orange Business Services.
Red Hat unveils infrastructure migration for containers; AT&T completes its AlienVault acquisition; BT, TIP, and Facebook launch a startup competition.
Companies can run Array’s security and networking applications, open source applications, or those from third-party vendors like Cisco and F5 on the platform.

This is an adapted transcript of a talk I gave at Promcon 2018. You can find slides with additional information on our Prometheus deployment and presenter notes here. There's also a video.
Tip: you can click on the image to see the original large version.
Here at Cloudflare we use Prometheus to collect operational metrics. We run it on hundreds of servers and ingest millions of metrics per second to get insight into our network and provide the best possible service to our customers.
Prometheus metric format is popular enough, it's now being standardized as OpenMetrics under Cloud Native Computing Foundation. It's exciting to see convergence in long fragmented metrics landscape.
In this blog post we'll talk about how we measure low level metrics and share a tool that can help you to get similar understanding of your systems.
There are two main exporters one can use to get some insight into a Linux system performance.
The first one is node_exporter that gives you information about basics like CPU usage breakdown by type, memory usage, disk IO stats, filesystem and network usage.
The second one is cAdvisor, that gives similar metrics, but drills down to a container level. Instead Continue reading
In this Network Collective Short Take, Russ White examines the relationship between state, optimization, and interaction surfaces when adding complexity to a network or system.
The post Short Take – State Optimization Surface appeared first on Network Collective.
To meet the needs of the emerging applications and networks, the clouds are descending toward the ground and even dispersed among the client devices – forming fog computing and networking or fog. Learn more about fog computing at Fog World Congress 2018.
Do you want to obtain your CCNP Collaboration or perhaps enhance your Cisco Collaboration skills for the real world? The CCNP Advanced Technologies v1 course from INE is targeted at network and voice professionals who want to take their Cisco Collaboration knowledge to the next level.
This course is intended for network and voice professionals looking to further improve their knowledge or prepare themselves for the CIPTV1 exam. In this course we will be looking at CUCM and VCS Dial Plan, Voice + Video Calling, IOS Gateway, Conferencing, QoS, On Cluster Calling with CUCM and Media Resources. This course will be delivered in lecture based format with plenty of hands on practical demonstrations.
CIPTV1 – Implementing Cisco IP Telephony & Video’ will cover professional to advanced level concepts and demonstrations around a large portion of the Cisco Unified Communications portfolio, including some of the below products and topics:
Dean Babbage is a Voice and Network Professional actively working in the Cisco Partner community. He carries Continue reading

It’s no surprise that Twitter’s developers are messing around with the platform. Again. This time, it’s the implementation of changes announced back in May. Twitter is finally cutting off access to their API that third party clients have been using for the past few years. They’re forcing these clients to use their new API structure for things like notifications and removing support for streaming. This new API structure also has a hefty price tag. For 250 users it’s almost $3,000/month.
You can imagine the feedback that Twitter has gotten. Users of popular programs like Tweetbot and Twitterific were forced to degrade client functionality thanks to the implementation of these changes. Twitter power users have been voicing their opinions with the hashtag #BreakingMyTwitter. I’m among the people that are frustrated that Twitter is chasing the dollar instead of the users.
Twitter is beholden to a harsh mistress. Wall Street doesn’t care about user interface or API accessibility. They care about money. They care are results and profit. And if you aren’t turning a profit you’re a loser that people will abandon. So Twitter has to make money somehow. And how is Twitter supposed to make money in today’s Continue reading