People have always been quick to blame the network.
You wouldn’t believe it – after almost 22 years (yeah, it’s been that long since RFC 1883 was published), IPv6 became an Internet standard (RFC8200/STD86). No wonder some people claim IETF moves at glacial speed ;)
Speaking of IPv6, IETF and glacial speeds – there’s been a hilarious thread before Prague IETF meeting heatedly arguing whether the default WLAN SSID should be IPv6-only (+NAT64). Definitely worth reading (for the entertainment value) over a beer or two.
Late last month (wow, has it been that long already?!) I had the honor of attending Tech Field Day Extra …
The post Cisco Live 2017 – Tech Field Day Extra appeared first on Fryguy's Blog.
ONAP adopted AT&T’s process of VNF validation.
The company says it can now offer a fully virtualized end-to-end next-gen core.
A shadow container attack on Docker was used as an example.
The post Worth Reading: Do startup employees make more? appeared first on rule 11 reader.
At times I have trouble focusing on writing articles for some of the presentations I am exposed to at Tech Field Day. Because of that, I really wanted to try something different. This article is more of my free-formed thoughts about NSX and why I’m excited to deploy it at my current $job. From the time I heard that the NSX team was going to be presenting at TFD15 for 4 hours, I knew that I would be writing this article because. Unfortunately it took me far too long to gather up this half formed thought.
I love the concept of Micro-Segmentation that NSX enables. Think of NSX as a virtual distributed firewall that is integrated with your hypervisor, but it really is so much more. This allows you to connect a security policy directly to the vNIC of your guest VM’s. Attaching it to the VM allows that policy to follow the VM anywhere, and everywhere it goes. You don’t have to worry about inter- or intra-VLAN segmentation as all of that is done on each vNIC. On top of that, NSX’s firewall is PCI DSS 3.2 compliant! Another rather compelling Continue reading
Microsoft sharpens focus on container heavyweights Google and AWS.
AWS is still more than three times the size of its nearest competitor, Microsoft Azure.
Analysys Mason advises Telefόnica to exert pressure on Unica vendors to live up to their promises.
The company says its module/software combo makes IoT more secure.
The revenue decrease was primarily driven by reduced spending from one of its Tier 1 carrier customers.
As I spend a lot of time on Oak Island (not the one on television, the other one), I tend to notice some of those trivial things in life. For instance, when the tide is pretty close to all the way in, it probably is not going to come in much longer; rather, it is likely to start going back out soon. If you spend any time around clocks with pendulums, you might have noticed the same thing; the maximum point at which the pendulum swings is the point where it also begins swinging back. Of course my regular readers are going to recognize the point, because I have used it in many presentations about the centralization/decentralization craze the networking industry seems to go through every few years.
Right now, of course, we are in the craze of centralization. To hear a lot of folks tell it, in ten years there simply are not going to be routing protocols. Instead, we are going to all buy appliances, plug them in, and it is “just going to work.” And that is just for folks who insist on having their own network—for the part of the world that is not completely Continue reading