Dave Taht sent me a link to IRTT after I published a blog post on measuring end-to-end latency with an Ansible playbook. Definitely looks like a tool worth having in your toolbox.
![]() |
Fig 1.1- LAN network STP topology |
On Tuesday the 5th, I’m participating in a webcast discussion about the future of networking over at Brighttalk. The details and registration linked below. I’ll be in a hotel room; I’m hoping the audio and lighting will work out correctly.
Re-Engineering Enterprise IT: A Blueprint for the Modern Infrastructure
Investors put money into IoT, cybersecurity, the cloud, containers, and more.
Organizational readiness is a big factor in HCI integration.
There’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have changed” over the past decade. And how they’re going to keep on changing. —Shawn Langlois @ MarketWatchThere’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have changed” over the past decade. And how they’re going to keep on changing. —Shawn Langlois @ MarketWatch
Many historians believe that one of the main reasons why the U.S. won the Cold War was its decisive lead over the Soviet Union in computer and telecommunications technology, which, by the 1980s, made it virtually impossible for the Soviets to compete, either economically or militarily. Continue reading
This is the fourth from the series of the articles that discuss configuration of the enterprise network. The article explains configuration of the device ASAv-I. The device is a Cisco Adaptive Security Virtual Appliance (ASAv) version 9.6(1) installed on qcow2 Qemu disk. The ASAv-I provides traffic filtering and inspection services for the campus network and Data Center (DC). It also connects the campus network and DC to the vIOS-EDGE-I edge router.
Picture 1 - ASAv-I, Campus, DC and Edge Connection
Note: The recommended RAM size for ASAv instance is 2048 MB. In order to lower memory consumption, GNS3 is configured to assign 1536 MB to the ASAv.
Note: The interface eth0 on the ASAv-I is referred as the interface Management0/0 in ASAv configuration. The interface eth0 is not connected as we use the inside interfaces for management instead. The first connected interface is then the interface eth1 that is referred as the interface GigabitEthernet0/0 in ASAv CLI. Similarly, the second connected interface eth2 is referred as the GigabitEthernet0/1 and so on.
Note: Here is the configuration file of vASA-I.
Once we start ASAv, the Qemu window is launched. However we want to use GNS3 Continue reading
Hyperledger reaches 183 members; Azure adds location services; and AWS debuts new VR, IoT, and more at re:Invent.
The company’s revenues grew 11% year-over-year in Q3 2018.
Lambda platform also now supports Google-derived Golang programming language.
"Mobility is the killer app for the multi-cloud world," Pandey said.
You probably saw the news this week that Nokia was looking to purchase Juniper Networks. You also saw pretty quickly that the news was denied, emphatically. It was a curious few hours when the network world was buzzing about the potential to see Juniper snapped up into a somewhat larger organization. There was also talk of product overlap and other kinds of less exciting but very necessary discussions during mergers like this. Which leads me to a great thought exercise: Does Juniper Need To Be Purchased?
More than any other networking company I know of, Juniper has paid the price for trying to break out of their mold. When you think Juniper, most networking professionals will tell you about their core routing capabilities. They’ll tell you how Juniper has a great line of carrier and enterprise switches. And, if by some chance, you find yourself talking to a security person, you’ll probably hear a lot about the SRX Firewall line. Forward thinking people may even tell you about their automation ideas and their charge into the world of software defined things.
Would you hear about their groundbreaking work with Puppet from 2013? How about their wireless Continue reading
Company claims superiority over other Kubernetes installers.
Here are the signs that it's time for a network upgrade.
A long while ago Marcel Wiget sent me an interesting email along the lines “I think you should do a Software Gone Wild podcast with Phil Shafer, the granddaddy of NETCONF”
Not surprisingly, as we started discovering the history behind NETCONF we quickly figured out that all the API and automation hype being touted these days is nothing new – some engineers have been doing that stuff for almost 20 years.
Read more ...