Did you miss Cumulus Networks’ session at Networking Field Day 2017 on February 26th? Or maybe you tuned in, and you want to reminisce on the best moments? Don’t worry, we’ve got you covered! Check out our top five favorite highlights from Technical Marketing Engineer Pete Lumbis’ presentation about managing EVPN/VXLAN. (You can also watch the whole session here, if you’d prefer to hear it from the man himself. Prepare for an intelligent demonstration peppered with some good laughs!)
It makes sense to start with the basics, and that’s exactly how we begin the presentation. In a daring move, Pete decides to illustrate Cumulus Linux’s capabilities sans-Powerpoint, and whiteboards the architecture of a Mellanox switch running our OS.
One of the great things about Cumulus technology is that it’s all based in Linux. So, any configurations you would make on a Linux device are exactly the same on Cumulus Linux. Simple, right? That’s exactly our goal — allowing customers to easily customize their network as they see fit with basic building blocks. As Pete describes it, building the network is like “taking those Lego pieces and turning them into Saturn V.” Continue reading
Symantec, Skyhigh Networks (recently acquired by McAfee), and Netskope are leading vendors.
The company hopes to attract partners and customers on its way into the CNCF.
How did I use over a gigabyte of mobile data in a single day? Why is my phone as warm as a hot plate? If you have ever asked yourself either of these questions, you might be the victim of a malicious application that is using your device and consuming your mobile bandwidth to facilitate ad fraud. We have recently identified a large population of apps being distributed from the Google Play Store that support this behavior. These apps are installed on devices on a majority of the major cell phone carriers around the world. These carriers operate in the US (AT&T, Verizon, Sprint, and T-Mobile), Europe (KPN, Vodafone, Ziggo, Sky, Virgin, Talk Talk, BT, O2, and T-Mobile), and the Asia Pacific region (Optus, Telstra, iinet, and others) [Note: Mobile providers and Google have been notified]. Just this morning, before this article was published, Buzzfeed broke another ad fraud story.
The Mechanics of the Grift
Online advertising consists of a complex ecosystem of ad buyers, sellers, exchanges, and data providers. Operators of websites and application authors have available space in their content layout and interaction in the user experience that can be integrated to include various forms of Continue reading
Security is always changing and failure always exists. This toxic scenario requires a fresh perspective on how we think about operational security. We must understand that we are often the primary cause of our own security flaws. The industry typically looks at cybersecurity and failure in isolation or as separate matters. We believe that our lack of insight and operational Continue reading
wget --no-check-certificate https://github.com/sflow/host-sflow/releases/download/v2.0.17-1/hsflowd-opx_2.0.17-1_amd64.debThe sFlow agent requires very little configuration, automatically monitoring all switch ports using the following default settings:
sudo dpkg -i hsflowd-opx_2.0.17-1_amd64.deb
Link Speed | Sampling Rate | Polling Continue reading |
---|
I will be teaching my first live training course at Safari Books Online on the 9th of March, starting at noon ET: How the Internet Really Works. It’s hard to describe the level and background for this training, as it will be all over the place; this is a bit of an experiment in this realm. The course description is—
This live training will provide an overview of the systems, providers, and standards bodies important to the operation of the global Internet, including the Domain Name System (DNS), the routing and transport systems, standards bodies, and registrars. For DNS, the process of a query will be considered in some detail, who pays for each server used in the resolution process, and tools engineers can use to interact DNS. For routing and transport, the role of each kind of provider will be considered, along with how they make money to cover their costs, and how engineers can interact with the global routing table (the Default Free Zone, of DFZ). Finally, registrars and standards bodies will be considered, including their organizational structure, how they generate revenue, and how to find their standards.
Sprint is increasing its capex by $1 billion for the quarter to pay for its network upgrades.
I’m soon to depart from Cisco Live Barcelona. It’s been a long week of fun presentations. While I’m going to avoid using the words intent and context in this post, there is one thing I saw repeatedly that grabbed my attention. ACI is eating Cisco’s world. And it’s coming for something else very soon.
Application-Centric Infrastructure has been out for a while and it’s meeting with relative success in the data center. It’s going up against VMware NSX and winning in a fair number of deals. For every person that I talk to that can’t stand it I hear from someone gushing about it. ACI is making headway as the tip of the spear when it comes to Cisco’s software-based networking architecture.
Don’t believe me? Check out some of the sessions from Cisco Live this year. Especially the Software-Defined Access and DNA Assurance ones. You’re going to hear context and intent a lot, as those are the key words for this new strategy. You know what else you’re going to hear a lot?
Contract. Endpoint Group (EPG). Policy.
If you’re familiar with ACI, you know what those words mean. You see the parallels between the data center Continue reading
AT&T to release its dNOS to Linux; Cisco buys BroadSoft; Aryaka and Radware team up.
Maybe Kenny Rogers was right in stating you gotta "know when to fold 'em."
AWS and Google also saw big cloud revenue gains.
I mentioned The Network Collective previously when I responded to the very first episode of the videocast/podcast (what TWiT would call a netcast
). Since then the three founders and co-hosts (Jordan, Eyvonne and Phil) have published an impressive 20 community roundtable episodes and have somehow also found time to launch a History of Networking
series co-hosted by Russ White (yes, that Russ White).
I’m a bit of a nerd when it comes to computer history, and I love reading books that give the inside story about the birth of the personal computer, the story of Silicon Valley, the rise and fall of technology companies and so on. However, the history of networking is nowhere near as well covered, which is a real shame. Thankfully, The Network Collective are filling that gap handsomely with a list of guests so far that blows my mind. For example:
If you’ve ever heard of Vixie cron, BIND DNS, DNSSEC, the Internet Software Consortium (ISC), you’ve found things Mr Vixie has had his hands all over. It’s fascinating to hear him talking about the history of DNS adoption, and his role in maintaining BIND in a nascent Continue reading