Archive

Category Archives for "Networking"

History Of Networking – Joel Halpern – Policy Based Management

In this History of Networking episode of Network Collective, Joel Halpern joins us to talk about the history of network modeling and policy based management in the standards bodies.


Joel Halpern
Guest
Russ White
Host
Donald Sharp
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Joel Halpern – Policy Based Management appeared first on Network Collective.

Dell-EMC expands its CI platform, simplifies data center operations

Standing up a private cloud using technology from multiple vendors is a time-consuming, complex process that involves months of post-deployment tweaking and tuning.In 2009, VMware, Cisco and EMC formed a joint venture called VCE that aimed to solve that problem. (Note: Cisco and VMWare are clients of ZK Research.) They created a converged infrastructure (CI) product called “Vblock” that brought together VMware software, Cisco servers and networking with EMC storage in a preconfigured, turnkey, validated solution so customers could essentially turn the product on and start using it.Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it Vblock had 90 percent of the heavy lifting done, with the other 10 percent being unique the organization. Customers loved it, with many saying Vblock was the only way to get a private cloud up and running inside a week. To read this article in full, please click here

Dell-EMC expands its CI platform, simplifies data center operations

Standing up a private cloud using technology from multiple vendors is a time-consuming, complex process that involves months of post-deployment tweaking and tuning.In 2009, VMware, Cisco and EMC formed a joint venture called VCE that aimed to solve that problem. (Note: Cisco and VMWare are clients of ZK Research.) They created a converged infrastructure (CI) product called “Vblock” that brought together VMware software, Cisco servers and networking with EMC storage in a preconfigured, turnkey, validated solution so customers could essentially turn the product on and start using it.Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it Vblock had 90 percent of the heavy lifting done, with the other 10 percent being unique the organization. Customers loved it, with many saying Vblock was the only way to get a private cloud up and running inside a week. To read this article in full, please click here

Dell-EMC expands its CI platform, simplifies data center operations

Standing up a private cloud using technology from multiple vendors is a time-consuming, complex process that involves months of post-deployment tweaking and tuning.In 2009, VMware, Cisco and EMC formed a joint venture called VCE that aimed to solve that problem. (Note: Cisco and VMWare are clients of ZK Research.) They created a converged infrastructure (CI) product called “Vblock” that brought together VMware software, Cisco servers and networking with EMC storage in a preconfigured, turnkey, validated solution so customers could essentially turn the product on and start using it.Also on Network World: Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it Vblock had 90 percent of the heavy lifting done, with the other 10 percent being unique the organization. Customers loved it, with many saying Vblock was the only way to get a private cloud up and running inside a week. To read this article in full, please click here

IDG Contributor Network: Why 5G is bringing edge computing and automation front and center

The Olympic Winter Games in Pyeongchang are underway and all eyes are on the competitors. They are also on the digital infrastructure and technology allowing billions around the world to view world record-breaking moments in real-time. The 2018 Games represent the world’s first deployment of a broad-scale 5G network, thanks to a partnership between domestic telecom provider KT, Intel and Samsung. The new capabilities have been on the horizon for some time. We saw 5G steal the show a year ago at Mobile World Congress, and Verizon and AT&T have each announced plans to offer 5G networks before the end of 2018. So, what does the emergence of 5G networks mean for enterprises?To read this article in full, please click here

IDG Contributor Network: Why 5G is bringing edge computing and automation front and center

The Olympic Winter Games in Pyeongchang are underway and all eyes are on the competitors. They are also on the digital infrastructure and technology allowing billions around the world to view world record-breaking moments in real-time. The 2018 Games represent the world’s first deployment of a broad-scale 5G network, thanks to a partnership between domestic telecom provider KT, Intel and Samsung. The new capabilities have been on the horizon for some time. We saw 5G steal the show a year ago at Mobile World Congress, and Verizon and AT&T have each announced plans to offer 5G networks before the end of 2018. So, what does the emergence of 5G networks mean for enterprises?To read this article in full, please click here

ExpertExpress Evolved into a Team of Experts

Years ago, I decided to try out another idea: solving real-life challenges with the help of an easy-to-consume online consulting service. When I discussed the idea with my friends during one of the early Networking Field Day events the opinion was pretty unanimous: “this will never work”

Fortunately, they were wrong. Not only did ~100 customers decided to use it in the meantime, the simple idea grew to a point where I couldn’t do it all on my own.

Read more ...

Why I’m helping Cloudflare grow in Asia

Why I’m helping Cloudflare grow in Asia

I’m excited to announce that I’ve joined Cloudflare as Head of Asia. This is an important time for the company as we continue to grow our presence in the region and build on the successes we’ve already had in our Singapore office. In this new role, I’m eager to grow our brand recognition in Asia and optimize our reach to clients by building up teams and channel partners.

A little about me

I’m a Californian with more than 20 years of experience growing businesses across Asia. I initially came to Asia with the Boston Consulting Group and since then I’ve helped Google and Twitter start and grow their businesses in Singapore and Asia. In many cases throughout my career, I’ve been one of the very first employees (sometimes the first) on the ground in this part of the world. To me, the Asian market presents an often untapped opportunity for companies looking to expand, and it’s a challenge that has appealed to me throughout my career.

Why I’m helping Cloudflare grow in AsiaThis year's Chinese New Year celebration

Why Cloudflare?

I’m driven by opportunities to work with global businesses that drive change and are full of ambitious and passionate people. Cloudflare’s mission is to help build Continue reading

HTTPS or bust: Chrome’s plan to label sites as “Not Secure”

HTTPS or bust: Chrome’s plan to label sites as

Google just announced that beginning in July 2018, with the release of Chrome 68, web pages loaded without HTTPS will be marked as “not secure”.

More than half of web visitors will soon see this warning when browsing unencrypted HTTP sites, according to data from Cloudflare’s edge that shows 56.62% of desktop requests originate from Chrome. Users presented with this warning will be less likely to interact with these sites or trust their content, so it’s imperative that site operators not yet using HTTPS have a plan to do so by July.

HTTPS or bust: Chrome’s plan to label sites as

How did we get here (and why)?

To those who have followed the Chrome team’s public statements, this announcement comes as no surprise. Google has been gearing up for this change since 2014, as Chrome boss Parisa Tabriz tweeted and Chris Palmer memorialized in a widely distributed email. While this step is an important and potentially jarring one for users, it’s by no means the last step that Google will take to influence website administrator behavior for the better.

But why are they making this change (now)? Google’s primary motivation for driving HTTPS adoption is simple: a safe browsing experience is good for business. Users that feel Continue reading

We’ve added a new GIT Fundamentals course to our library!

Log into your members account, or check out ine.com to view our latest addition to the INE video course library, GIT Fundamentals.

 

Why Study GIT Fundamentals:
GIT Version Control Systems are popular among many organizations, you should learn the basics now so that when faced with a GIT based project you’re able to contribute to your team quickly and efficiently.

About the Course:
This course is 3 hours and 27 minutes long and taught by Eric Parker. This is an introductory course, meant to familiarize students with the core GIT system concepts.

What You’ll Learn:

At the end of the course, students will be able to modify and commit data to both local and remote GIT repositories. Upon the completion of the course, you will be ready to start contributing to GIT based projects of your choice.

About the Instructor:

Eric Parker is a native Texan and a graduate of Texas A&M University and is more than happy to tell you all about it! He has spent the last 12+ years building software solutions in the Raleigh, NC area and has architected JAVA, .NET and JavaScript based software projects in both mid-size and enterprise level companies. He Continue reading

Indigenous Connectivity Summit Participants Share Their Stories

Madeleine Redfern, the mayor of Iqaluit – the largest and only city in Nunavut, Canada – has a colorful way of describing how sparsely populated the territory is. “The seals outnumber the people.” With a population of just over 35,000 people spread out over an arctic 1,750,000 square kilometers, Internet access is a challenge. In fact, according to Redfern, her most favorited tweet was that she couldn’t tweet… because the connection was too slow.

Madeleine Redfern participated in the first ever Indigenous Connectivity Summit last November. She and other participants shared their experience and expertise to help close the connectivity gap in Indigenous communities. Many also sat down for brief interviews with the 1st-Mile Institute, a New Mexico nonprofit that has initiated a local “Broadband for All” program. The videos are now available to watch on the 1st-Mile Institute’s website.

You can also find the videos on the Internet Society’s Indigenet page, which includes resources from the Summit including the presentations, the policy brief Spectrum Approaches for Community Networks, and other ways to get involved!

The post Indigenous Connectivity Summit Participants Share Their Stories appeared first on Internet Society.

The DNS Negative Cache

Considering the DNS query chain—

  • A host queries a local recursive server to find out about banana.example
  • The server queries the root server, then recursively the authoritative server, looking for this domain name
  • banana.example does not exist

There are two possible responses in this chain of queries, actually. .example might not exist at all. In this case, the root server will return a server not found error. On the other hand, .example might exist, but banana.example might not exist; in this case, the authoritative server is going to return an NXDOMAIN record indicating the subdomain does not exist.

Assume another hosts, a few moments later, also queries for banana.example. Should the recursive server request the same information all over again for this second query? It will unless it caches the failure of the first query—this is the negative cache. This negative cache reduces load on the overall system, but it can also be considered a bug.

Take, for instance, the case where you set up a new server, assign it banana.example, jump to a host and try to connect to the new server before the new DNS information has been propagated through the system. On Continue reading