Archive

Category Archives for "Networking"

IDG Contributor Network: Defining network performance with Google’s 4 golden signals

You’re supposed to meet someone for coffee. If they’re three minutes late, no problem, but if they’re thirty minutes late, its rude. Was the change from “no problem” to “rude” a straight line, or were there steps of increasing rudeness? Do we care why? A good reason certainly increases our tolerance. Someone who is always late reduces it.Network performance follows many of the same dynamics. We used to talk about outages, but they have become less frequent. “Slow” is the new “out.” But how slow is slow? Do we try to understand the user experience and adjust our performance monitoring to reflect it? Or is the only practical answer to just wait until someone complains?To read this article in full, please click here

Project Jengo Celebrates One Year Anniversary by Releasing Prior Art

Project Jengo Celebrates One Year Anniversary by Releasing Prior Art

Project Jengo Celebrates One Year Anniversary by Releasing Prior Art

Today marks the one year anniversary of Project Jengo, a crowdsourced search for prior art that Cloudflare created and funded in response to the actions of Blackbird Technologies, a notorious patent troll. Blackbird has filed more than one hundred lawsuits asserting dormant patents without engaging in any innovative or commercial activities of its own. In homage to the typical anniversary cliché, we are taking this opportunity to reflect on the last year and confirm that we’re still going strong.

Project Jengo arose from a sense of immense frustration over the way that patent trolls purchase over-broad patents and use aggressive litigation tactics to elicit painful settlements from companies. These trolls know that the system is slanted in their favor, and we wanted to change that. Patent lawsuits take years to reach trial and cost an inordinate sum to defend. Knowing this, trolls just sit back and wait for companies to settle. Instead of perpetuating this cycle, Cloudflare decided to bring the community together and fight back.

After Blackbird filed a lawsuit against Cloudflare alleging infringement of a vague and overly-broad patent (‘335 Patent), we launched Project Jengo, which offered a reward to people who submitted prior art that could Continue reading

Show 389: Using MPLS In The Enterprise

Today on the Weekly show, MPLS in the enterprise, especially for the use case of segmentation.

Should you do it? Why would you do it? Considering the equipment you ve got, could you do it even if you wanted to? And even if you should, you would, and you can, what about all those other people you work with?

Discussing this emotionally fraught topic of MPLS in the enterprise is Tom Ammon, a senior network engineer who s supported it in a few different environments. He blogs at blog.tomammon.net.

We start by discussing the general case for MPLS in the enterprise, walk through the hardware and software requirements necessary to support MPLS, and then drill into segmentation more specifically.

We also look at reasons why you’d want to use MPLS for segmentation, and explores issues around operations, skillsets and training, and troubleshooting.

The post Show 389: Using MPLS In The Enterprise appeared first on Packet Pushers.

Minimizing Risk: How to Be Secure on Twitter and Other Social Networks

Last week’s news that the passwords of every Twitter user around the world had been exposed in plain text is a stark reminder of the sometimes-fragile nature of security in the online places we trust with our personal information.

In this latest example, Twitter says it was a technical error that led to the exposure of the passwords of the social network’s 330 million users. Twitter also says it’s fixed the bug and has no evidence that anyone’s accounts have been breached or misused.

While the error led to exposure only within Twitter’s internal systems, the social network has urged everyone to change their passwords anyway.

“Out of an abundance of caution, we ask that you consider changing your password on all services where you’ve used this password. You can change your Twitter password anytime by going to the password settings page.”

It’s sound advice, and it’s a step we have taken at the Internet Society with our own social media channels.

Yet, you may wonder what the point is in changing your password if a mistake like this can happen. If it happened once, surely it can happen again.

Yes, it could, there’s no doubt. We have compelling Continue reading

Dustin’s Internet Community Roadtrip: In Portland, Recognizing the Role of Women in Tech

Dustin Phillips, Co-Executive Director of ICANNWiki, is traveling across the United States in his red Toyota Corolla, making connections with the people who are making their communities – and the Internet – a better place. First stop: Portland, Oregon, where attended the ICANNWiki’s Girls in ICT Day Edit-a-thon and met up with Hack Oregon.

On the first day of the Internet Community Roadtrip, I headed down to Portland for ICANNWiki’s Girls in ICT Day Edit-a-thon. Making this my first stop was particularly special for me, because it is where I was introduced to the world of Internet governance three years ago. In my time at ICANNNWiki, I’ve experienced the important role that collaborative resources and tools play in the bottom-up, community-driven processes that keep the Internet free and global. At ICANNWiki, we focus on providing capacity-development, an informative resource and a sense of community. We build community by capturing and promoting the work that is being done, in order to provide well-deserved recognition and increase awareness for what is happening in the Internet governance ecosystem.

The stop in Portland focused on increasing the recognition for the role of women in the Internet’s history as planned, but also included Continue reading

Nutanix looks to turn its products into a platform — and attract CIOs

Every big vendor has had to start small and then grow into a major platform. Nutanix is no exception. And this week at its .NEXT user conference, the hyperconverged infrastructure (HCI) provider outlined a plan to move from being a niche vendor that makes VDI work better to becoming the next big enterprise platform vendor.In a recent interview, Nutanix CEO Dheeraj Pandey talked about the building blocks of becoming a major enterprise vendor. Nutanix started off with an integrated hardware/software appliance to deliver its HCI solution. Pandey referred to this as their “iPhone,” meaning it was a fully integrated and turnkey product where Nutanix owns the entire experience.To read this article in full, please click here

Nutanix looks to turn its hyperconverged infrastructure (HCI) products into a platform

Every big vendor has had to start small and then grow into a major platform. Nutanix is no exception. And this week at its .NEXT user conference, the hyperconverged infrastructure (HCI) provider outlined a plan to move from being a niche vendor that makes VDI work better to becoming the next big enterprise platform vendor.In a recent interview, Nutanix CEO Dheeraj Pandey talked about the building blocks of becoming a major enterprise vendor. Nutanix started off with an integrated hardware/software appliance to deliver its HCI solution. Pandey referred to this as their “iPhone,” meaning it was a fully integrated and turnkey product where Nutanix owns the entire experience.To read this article in full, please click here

Nutanix looks to turn its products into a platform — and attract CIOs

Every big vendor has had to start small and then grow into a major platform. Nutanix is no exception. And this week at its .NEXT user conference, the hyperconverged infrastructure (HCI) provider outlined a plan to move from being a niche vendor that makes VDI work better to becoming the next big enterprise platform vendor.In a recent interview, Nutanix CEO Dheeraj Pandey talked about the building blocks of becoming a major enterprise vendor. Nutanix started off with an integrated hardware/software appliance to deliver its HCI solution. Pandey referred to this as their “iPhone,” meaning it was a fully integrated and turnkey product where Nutanix owns the entire experience.To read this article in full, please click here

Nutanix looks to turn its hyperconverged infrastructure (HCI) products into a platform

Every big vendor has had to start small and then grow into a major platform. Nutanix is no exception. And this week at its .NEXT user conference, the hyperconverged infrastructure (HCI) provider outlined a plan to move from being a niche vendor that makes VDI work better to becoming the next big enterprise platform vendor.In a recent interview, Nutanix CEO Dheeraj Pandey talked about the building blocks of becoming a major enterprise vendor. Nutanix started off with an integrated hardware/software appliance to deliver its HCI solution. Pandey referred to this as their “iPhone,” meaning it was a fully integrated and turnkey product where Nutanix owns the entire experience.To read this article in full, please click here

Solving challenges with Linux networking, programmable pipelines and tunnels

Exciting advances in modern data center networking

Many moons ago, Cumulus Networks set out to further the cause of open networking. The premise was simple: make networking operate like servers. To do that, we needed to develop an operating system platform, create a vibrant marketplace of compatible and compliant hardware and get a minimum set of features implemented in a robust way.

Today, these types of problems are largely behind us, and the problem set has moved in the right direction towards innovation and providing elegant solutions to the problems around scale, mobility and agility. Simply put, if “Linux is in the entire rack,” then it follows that the applications and services deployed via these racks should be able to move to any rack and be deployed for maximum overall efficiency.

The formula for this ephemeral agility then is based on two constructs.

  1. If the application can deploy anywhere, the policies governing the application’s ability to interact with the world need to be enforceable anywhere and on any rack in the entire data center.
  2. It should be possible to place an application on any rack and all the connectivity it needs should be available without needing any physical changes in Continue reading

10 competitors Cisco just can’t kill off

10 competitors Cisco just can't kill offImage by IDG / jesadaphorn, Getty ImagesCreating a short list of key Cisco competitors is no easy task as the company now competes in multiple markets.  In this case we tried to pick companies that have been around awhile or firms that have developed key technologies that directly impacted the networking giant. Cisco is now pushing heavily into software and security, a move that will open it up to myriad new competitors as well. Take a look.To read this article in full, please click here

10 competitors Cisco just can’t kill off

10 competitors Cisco just can't kill offImage by IDG / jesadaphorn, Getty ImagesCreating a short list of key Cisco competitors is no easy task as the company now competes in multiple markets.  In this case we tried to pick companies that have been around awhile or firms that have developed key technologies that directly impacted the networking giant. Cisco is now pushing heavily into software and security, a move that will open it up to myriad new competitors as well. Take a look.To read this article in full, please click here

10 competitors Cisco just can’t kill off

10 competitors Cisco just can't kill offImage by IDG / jesadaphorn, Getty ImagesCreating a short list of key Cisco competitors is no easy task as the company now competes in multiple markets.  In this case we tried to pick companies that have been around awhile or firms that have developed key technologies that directly impacted the networking giant. Cisco is now pushing heavily into software and security, a move that will open it up to myriad new competitors as well. Take a look.To read this article in full, please click here