Archive

Category Archives for "Networking"

Disaster Recovery with VMware NSX-V and Zerto

Note, this is a reposting of the blog that I initially posted here on humairahmed.com. In a prior blog, VMware NSX and SRM: Disaster Recovery Overview and Demo, I described and demoed how VMware NSX and SRM with vSphere Replication combined provide for an enhanced disaster recovery (DR) solution. SRM also provides additional integration with NSX when Storage Policy Protection Groups (SPPGs) are used by providing the ability to automate network mappings. One of the great things about the NSX-V platform, is it can be used with any DR orchestration tool that supports the VMware vSphere ESXi hypervisor. Some of the tools customers are using with NSX include VMware SRM, Dell EMC RP4VM, Zerto, and Veeam. As SRM was discussed and demonstrated in a prior blog, Zerto and NSX together is explained in more detail below.  Continue reading

Wait, what happened to my choices?

This weekend, I experienced one of those moments that make me question the value of information technology. My trusty windows phone, for whatever reason, failed. Given I was traveling in less than 24 hours, I needed to find a replacement. So I traipsed to the local phone store, and was told “I’m sorry, we don’t sell windows phones. They aren’t popular enough.” So there I stood, like the shopper in the proverbial aisle of cereal, trying to choose which new phone to get.

After staring at all the different phones for a while, it dawned on me that the apparent variety is fake. I really only had two choices.

The first is the iPhone. The iPhone is a throwback to the late 1990’s, at least one generation behind current hardware, and with a user interface that falls into the “cute retro gamified Windows 3.11/Xerox Star” sort of thing. Getting anything done requires jumping through multiple hoops. There is no way to pin anything you use on a regular basis to the screen, no information available without entering an app, the icons are tiny candies, etc. Sorry Apple fanfolk, but Apple hasn’t innovated in at least 10 years in Continue reading

Amazon Temporarily Discounts Echo from $179 to $100 – Deal Alert

By now I'm sure you're familiar with Amazon's Echo device. Amazon Echo comes in both white and black, and is a hands-free speaker you control with your voice. Echo connects to the Alexa Voice Service to play music, make calls, send and receive messages, provide information, news, sports scores, weather, and more. One works well, or string them around your house for Alexa in every room. Multiple Echo devices work together seamlessly. It may be one of those devices that actually does what it promises to do. Echo is discounted fairly regularly, but usually not by this much. If you've been thinking about picking one up, now may be a good time. Its list price has been reduced from $179 to $99.99 for a limited time. See the deal on Amazon.To read this article in full or to leave a comment, please click here

Just $9.99 Right Now For a 3-Pack of 6-foot Lightning/Micro USB Combo Cables – Deal Alert

Sync and charge iOS & Android devices with this generous 6-foot lightning/micro USB combo cable, available right now as a 3-pack, discounted to $9.99. Features a durable stainless steel connector, and a tangle-free nylon braided cord. The company offers a 12-month warranty against any issues with quality, as well.  See this 3-pack deal on Amazon.To read this article in full or to leave a comment, please click here

What is PLR – Point of Local Repair in MPLS Traffic Engineering ?

What is PLR, Point of Local Repair in MPLS Traffic Engineering ?   PLR is the term is used in the context of Fast Reroute. I briefly mentioned from PLR in the MPLS Traffic Engineering Fast Reroute Link Protection post earlier and in this post, will explain it in more detail.   Let’s look at the below […]

The post What is PLR – Point of Local Repair in MPLS Traffic Engineering ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

How Google is speeding up the Internet

Engineers at Google have developed a new algorithm to speed up TCP, the main transport protocol for traffic on the internet, by optimizing the speed at which traffic is sent so it doesn’t clog up the available routes. They say their acceleration method, called bottleneck bandwidth and roundtrip (BBR) propagation time, measures the fastest way to send data across different routes and is able to more efficiently handle traffic when data routes become congested. Google is already using BBR to speed up its YouTube traffic, and last month the company made BBR available in its Google Cloud Platform. Google says implementing BBR sped up the already highly-optimized YouTube traffic by 4% on average, and as much as 14% in some countries.To read this article in full or to leave a comment, please click here

How Google is speeding up the Internet

Engineers at Google have developed a new algorithm to speed up TCP, the main transport protocol for traffic on the internet, by optimizing the speed at which traffic is sent so it doesn’t clog up the available routes. They say their acceleration method, called bottleneck bandwidth and roundtrip (BBR) propagation time, measures the fastest way to send data across different routes and is able to more efficiently handle traffic when data routes become congested. Google is already using BBR to speed up its YouTube traffic, and last month the company made BBR available in its Google Cloud Platform. Google says implementing BBR sped up the already highly-optimized YouTube traffic by 4% on average, and as much as 14% in some countries.To read this article in full or to leave a comment, please click here

Advancing Privacy Protection with the GDPR

A game-changer

The road towards implementation of the new European GDPR (the General Data Protection Regulation) has been a long one, even though public awareness of its impact, especially outside of Europe, is only now really starting to take hold. This game-changing piece of EU legislation will require companies to fundamentally change how they process and use personal data (broadly defined) they receive from EU citizens, including through consent and data handling agreements with their customers, supply chains, and vendors. It will come into effect on 25th May, 2018, and will have tremendous reach, touching on all business sectors. More than that, the GDPR has extra-territorial scope and will apply to any business that processes the personal data of European users, irrespective of whether that business has any physical presence in the European Union.

The aim of the GDPR, which will replace the currently applicable European Data Protection Directive of 1995, is to both meet the challenges of globalization and address dynamic new products and services, while also trying to create a future-proof framework that will comfortably accommodate emerging technologies and scenarios, including the Internet of Things. It is also a response to Europeans’ growing concerns over the control and Continue reading

BrandPost: How to Know if An Active-Active Architecture Right for You

Software defined WANs (SD-WANs) have gained market momentum so quickly because their value proposition is multi-faceted. Some enterprises have looked to SD-WAN as a way to dramatically lower network transport costs, while others are building SD-WANs to automate network operations. One of the more common use-cases I have seen is to shift toward an “active-active” architecture.ACTIVE-ACTIVE WAN ARCHITECTUREHistorically, WANs are built on the concept of “active-passive”, where a branch can be connected using two or more links, but only the primary link is active and passing traffic.  In this scenario, the backup connection only becomes active in the event the primary connection fails. While this might seem sensible, it’s highly inefficient as enterprises are paying for far more bandwidth than they are actually leveraging. This inefficient architectural design is driving increased interest in active-active configurations.To read this article in full or to leave a comment, please click here