Download the HPE MEC Research Report, . Telecommunications (telco) providers are excited about Multi-Access Edge Computing (MEC) because it promises to make compute and storage capabilities available to customers at the edge of communications networks. Workloads and applications will be closer to customers, potentially enhancing experiences and enabling new services and offers. MEC is being... Read more →
In this video, learn how this free tool can help you spot what ports a device is connected to for network analysis.
![]() |
Fig 1.1- OSPF Network Connected to other Campus Via NBMA Networks- Frame Relay |
One of my readers sent me a question about his favorite annoyance:
During my long practice, I’ve never seen an Enterprise successfully managing the network device software upgrade/patching cycles. It seems like nothing changed in the last 20 years - despite technical progress, in still takes years (not months) to refresh software in your network.
There are two aspects to this:
Read more ...If you’ve chosen to do a proof-of-concept (PoC), you should already know what the challenge or requirement is, what your satisfactory results look like and what the product or tool set is that will deliver on your commitment. A proof-of-concept is a recipe that should give you a well baked set of results.
Approaching a PoC is a conscious decision to trial an idea that if successful, your business will put in to daily production to satisfy one or more business requirements.
So why aren’t the results more apparent in our day to day lives? Why do we not see these decision points more transparently?
Some people approach PoCs as a tyre kicking exercise, or a means to get a vendor to commit to them and then use as leverage against cost. If you’re just playing, you’re wasting time. If you’re tyre kicking then be prepared for lack of commitment or interest in the future from individuals or organisations. Genuine PoCs and evaluations are a normal and acceptable part of business, so the responses are different from those assisting with PoCs.
Approach a PoC with clear intent and understanding of the challenge that faces you. You must Continue reading
Did you know there’s an RFC describing typical BGP route leaks? I didn’t until I stumbled upon this blog post.
There’s been a lot of talk about container networking in the industry lately (heck, we can’t even stop talking about it). And it’s for a good reason. Containers offer a fantastic way to develop and manage microservices and distributed applications easily and efficiently. In fact, that’s one of the reasons we launched Host Pack — to make container networking even simpler. Between Host Pack and NetQ, you can get fabric-wide connectivity and visibility from server to switch.
There are a variety of ways you can deploy a container network using Host Pack and Cumulus Linux, and we have documented some of them in several Validated Design Guides discussed below. Wondering which deployment method is right for your business? This blog post is for you.
Overview: The Docker Swarm with Host pack solution uses the connectivity module within Host Pack, Free Range Routing (FRR) in a container. The FRR container runs on the servers and uses BGP unnumbered for Layer 3 connectivity, enabling the hosts to participate in the routing fabric. We use Docker Swarm as the container orchestration tool for simplicity.
Choose this deployment if:
![]() |
Fig 1.1- Local Mode behind Mesh Network |
Two Accenture Pivotal Business Group sites, in Columbus, Ohio, and New York City, will open by the end of the year.