At Interop ITX, network pioneer Radia Perlman talks about Ethernet, STP, and recites her famous poem.
In furthering our mission to bring S.O.U.L. to networking through Simple, Open, Untethered, Linux-based networking solutions, and just on the heels of our Cumulus NetQ 1.3 announcement around simplifying container networking and operations, today we continue the mission to advance web-scale networking in the digital age with our release of Cumulus Linux 3.6. Our focus has been to help organizations move towards a modern world of simplification, flexibility and scale — where complex applications reside on standardized infrastructure that is automated, repeatable and scalable. We see a world of agility built upon cloud principles; of converged administrative teams where sysadmins can manage the network and network admins can manage systems.
In this release of Cumulus Linux 3.6, we are not only driving network efficiency and simplicity, but also expanding our solution set to include data center interconnect (DCI) use cases. Additionally, to help organizations adopt these web-scale principles in networking, we are enhancing our portfolio by adding popular networking capabilities to the open Linux platform. These include:
From Continue reading
Michael Dell told Dell Technologies World attendees to use software, data, AI, and IoT to remain relevant.
To address mounting US user concerns, Senators Ed Markey (D-MA) and Richard Blumenthal (D-CT) have introduced the Consumer Online Notification for Stopping Edge-provider Network Transgressions (CONSENT) Act. (They have also introduced legislation to increase transparency and consumer privacy protection, though the text is not yet public.) While the Internet Society is weary of a reactionary regulatory trend and would rather see proactive anticipatory movement towards stronger privacy protections, we are supportive of legislation, like the CLOUD Act, that puts more control over how data is used in consumers’ hands, and moves towards a more user-centric Internet.
Currently, US users often have to go through an extensive and complicated process to opt out of data usage practices. Some may not even be aware that those options exist. Opt-out processes make data collection the “default” setting and weaken consumers’ ability to really consent to data handling practices.
The CONSENT Act, however, would require “edge-providers” (defined by the Act as persons that provide a service over the Internet) to notify users when they subscribe, establish an account, purchase, or begin receiving service if their data will be collected. This would make significant gains for user trust, as it would increase transparency at Continue reading
The Blockchain is disrupting industries and certainly not just the financial sector. Technological innovation can impact more than our daily lives and perhaps it can effectively disrupt entire industries. The Blockchain is already impacting the processing of payments for international settlements. The Blockchain is now one of the most sought after technical skills and is expected grow exponentially. In a recent report by Deloitte named “Deloitte’s 2018 Outlook” highlights the growth of Blockchain Technology.
Whether you’re a PHP developer, pre sales engineer, or a networking architect, the Blockchain is now at the forefront of technologies to know.
In this course we will cover key aspects around Blockchain and Bitcoin, including: What is a Blockchain? What is Bitcoin? What are smart contracts? What is a cryptocurrency? What are digital tokens? How are Blockchain and Bitcoin related and why is it so important to know the relation? We will also cover Some common misconceptions about Blockchain and Bitcoin and discuss Ethereum as a primary example of a common open source Blockchain.
Get Started Here.
It’s now or never for this acquisition. But first T-Mobile must convince regulators that the competitive landscape is growing and that the new company will create jobs, not eliminate them.
The company is using SDN technology to combine service edge routers for Ethernet and IP-based services. Software control will come from a single common compute platform based on x86 architecture.
The Open SD-WAN Exchange (OSE) plans to launch its service level API, which helps SD-WAN vendors talk, at the upcoming ONUG Spring 2018 conference.
Microsoft reported cloud revenues of $6 billion, while AWS reported revenues of $5.4 billion for the quarter.
Have you ever wondered why spine-and-leaf networks are the “standard” for data center networks? While the answer has a lot to do with trial and error, it turns out there is also a mathematical reason the fat-tree spine-and-leaf is is used almost universally. There often is some mathematical reason for the decisions made in engineering, although we rarely explore those reasons. If it seems to work, there is probably a reason.
The fat-tree design is explored in a paper published in 2015 (available here at the ACM, and now added to my “classic papers” page so there is a local copy as well), using a novel technique to not only explore why the spine-and-leaf fat-tree is so flexible, but even what the ideal ratio of network capacity is at each stage. The idea begins with this basic concept: one kind of network topology can be emulated on top of another physical topology. For instance, you can emulate a toroid topology on top of a hierarchical network, or a spine-and-leaf on top of of hypercube, etc. To use terms engineers are familiar with in a slightly different way, let’s call the physical topology the underlay, and the emulated topology the overlay. Continue reading
In Part 1 of Getting Started with Terraform, we explained how Terraform lets developers store Cloudflare configuration in their own source code repository, institute change management processes that include code review, track their configuration versions and history over time, and easily roll back changes as needed.
We covered installing Terraform, provider initialization, storing configuration in git, applying zone settings, and managing rate limits. This post continues the Cloudflare Terraform provider walkthrough with examples of load balancing, page rules, reviewing and rolling back configuration, and importing state.
Before we build on Part 1, let's quickly review what we configured in that post. Because our configuration is in git, we can easily view the current configuration and change history that got us to this point.
$ git log
commit e1c38cf6f4230a48114ce7b747b77d6435d4646c
Author: Me
Date: Mon Apr 9 12:34:44 2018 -0700
Step 4 - Update /login rate limit rule from 'simulate' to 'ban'.
commit 0f7e499c70bf5994b5d89120e0449b8545ffdd24
Author: Me
Date: Mon Apr 9 12:22:43 2018 -0700
Step 4 - Add rate limiting rule to protect /login.
commit d540600b942cbd89d03db52211698d331f7bd6d7
Author: Me
Date: Sun Apr 8 22:21:27 2018 -0700
Step 3 - Enable TLS 1.3, Continue reading
Why BGPSec turned out the way it did ?
Take a Network Break! A cryptocurrency heist combines BGP hijacking with some DNS tomfoolery, Juniper targets enterprise multicloud with Contrail enhancements, and Big Switch adds packet capture and analytics appliances to its product line.
The Linux community swaps out iptables for BPF, Google pushes the Rich Communication Service (RCS) to compete on messaging, and Cisco unbundles Nexus 9000.
Apple exits the home WiFi router market, Innovium snags $77 million to market its programmable ASIC, and Net Neutrality rules have yet to be revoked–why?
Get links to all these stories after our sponsor messages.
Find out how Cisco and its trusted partners Equilibrium Security and ePlus/IGX can help your organization tackle the General Data Protection Regulation, or GDPR. Tune into Packet Pushers Priority Queue episode 147 to get practical insights on how to get your arms around these wide-ranging rules.
MyEtherWallet DNS Attack Offers Opt-In Lessons – Dark Reading
Make Way for Secure and Automated Multicloud for Any Cloud, Any Workload and Any Deployment – Juniper Networks
Juniper Preaches Multicloud To Win Contrail Converts In The Enterprise – Packet Pushers
Big Mon Recorder and Analytics Nodes Enable Traffic Capture and App-aware Analytics for Cloud-Native Network Defense & Continue reading