Cisco's fixed Nexus switches could be used with SONiC software.
Cisco's plans to give Ericsson "space" hints at vendor's current struggles.
Jason Wells, over on LinkedIn, has an article up about the end of MPLS; to wit—
To being—I actually work with Aryaka on occasion, and within the larger SD-WAN world more often (I am a member of the TAB over at Velocloud, for instance). This is decidedly not a post about the usefulness or future of SD-WAN solutions (though I do have opinions there, as you might have guessed). Rather, what I want to point out is that we, in the networking industry, tend to be rather sloppy about our language in ways that are not helpful.
To understand, it is useful to back up a few years and consider other technologies where our terms have become confused, and how it has impacted our Continue reading
The two companies are demonstrating multi-access edge computing in Shanghai this week.
This isn’t China Telecom’s first SD-WAN deal.
Nutanix kicks off its .NEXT 2017 conference today.
Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient.
Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient. Critical visibility into users and endpoints is missing, enforcing policies is difficult, and, in the meantime, cyberattacks are more sophisticated and costly than ever.
What do IT teams need to defend today’s applications, users, and data from potentially brand-damaging attacks?
That’s the question VMware experts will be tackling during our VMware EVOLVE Transform Security events, coming to a city near you. During these half-day, in-person events, you will learn how a ubiquitous software layer can help support the security challenges of the modern business.
VMware experts will guide you through how to:
Reserve your spot at an upcoming Transform Security-focused VMware EVOLVE event in your city:
The post VMware Evolve Transform Security is Coming to A City Near You! appeared first on Network Virtualization.
In 2015 the world made one of the biggest promises to itself in the form of 17 Global Goals set out by the United Nations. These goals – the Sustainable Development Goals (SDGs) – are aimed at achieving extraordinary things in the next 15 years. They are dedicated to fighting injustice and inequalities, ending climate change, beating discrimination, bringing in sustainable energy, and making sure no one goes hungry.
Last month we shared statistics on some popular reflection attacks. Back then the average SSDP attack size was ~12 Gbps and largest SSDP reflection we recorded was:
This changed a couple of days ago when we noticed an unusually large SSDP amplification. It's worth deeper investigation since it crossed the symbolic threshold of 100 Gbps.
The packets per second chart during the attack looked like this:
The bandwidth usage:
This packet flood lasted 38 minutes. According to our sampled netflow data it utilized 930k reflector servers. We estimate that the during 38 minutes of the attack each reflector sent 112k packets to Cloudflare.
The reflector servers are across the globe, with a large presence in Argentina, Russia and China. Here are the unique IPs per country:
$ cat ips-nf-ct.txt|uniq|cut -f 2|sort|uniq -c|sort -nr|head
439126 CN
135783 RU
74825 AR
51222 US
41353 TW
32850 CA
19558 MY
18962 CO
14234 BR
10824 KR
10334 UA
9103 IT
...
The reflector IP distribution across ASNs is typical. It pretty much follows the world’s largest residential ISPs:
$ cat ips-nf-asn.txt |uniq|cut -f 2|sort|uniq Continue reading
The post Worth Reading: The blue disco ball appeared first on rule 11 reader.
The 5G buzz is building and along with it are projections that some 5G networks will launch in 2018, with more widespread deployment in 2019. The launch of 5G networks will contribute to the large-scale proliferation of Internet of Things (IoT) devices.