2017 was a year when the voice of women resonated around the world. Global women’s marches, hashtags such as #MeToo and #TimesUp, record numbers of women entering politics – all together a global call for action that signaled women were tired of not being heard.
It’s been a year that’s left many in the western world asking how we got here and how we can make sure we never go back. A big reason for this is because of what the Internet helps us do. We can reach further, speak louder, and come together like never before.
We know that women use the Internet to build opportunities for business, their communities, and for their families. But for the first time we are seeing how women are using it to collaborate, coordinate, and unite to make change happen.
But now is the time to ask questions.
Just under 50% of the world’s population isn’t online. Break that down further, women are 50% less likely to be connected than men.
The Internet’s future is one where new divides are emerging. It’s not just the binary fact of being on or offline – it’s who, how, and where. And, as the world’s political Continue reading
In this video, Keith Townsend explains what network disaggregation means, and how separating the network operating system from hardware provides enterprises and service providers with valuable flexibility. Townsend is principal at The CTO Advisor and Interop ITX infrastructure chair.
New assurance software continuously verifies the network is operating as intended, the company claims.
Regardless of how much I write about (the ridiculousness of using) stretched VLANs, I keep getting questions along the same lines. This time it’s:
What type of applications require L2 Extension and L3 extension?
I don’t think I’ve seen anyone use L3 extension (after all, isn’t that what Internet is all about), so let’s focus on the first one.
Stretched VLANs (or L2 extensions) are used to solve a number of unrelated problems, because once a vendor sold you a hammer everything starts looking like a nail, and once you get used to replacing everything with nails, you want to use them in all possible environments, including public and hybrid clouds.
Read more ... The company says a Tier 1 North American operator is a customer.
The technology comes from its recent acquisition of LivingObjects.
"We are a new type of carrier that offers cloud DNA to the old world of WAN.”
On layer 2 networks, high availability can be achieved by:
Layer 2 networks need very little configuration but come with a major drawback in highly available scenarios: an incident is likely to bring the whole network down.2 Therefore, it is safer to limit the scope of a single layer 2 network by, for example, using one distinct network in each rack and connecting them together with layer 3 routing. Incidents are unlikely to impact a whole IP network.
In the illustration below, top of the rack switches provide a default gateway for hosts. To provide redundancy, they use an MC-LAG implementation. Layer 2 fault domains are scoped to a rack. Each IP subnet is bound to a specific rack and routing information is shared between top of the rack switches and core routers using a routing protocol like OSPF.
There are two main issues with this design:
The Continue reading