Archive

Category Archives for "Networking"

IDG Contributor Network: Software may be eating the world, but Cumulus Networks is still keen on hardware

I’ve been following Cumulus Networks almost since its inception. The company was co-founded by J.R. Rivers, something of a legend in the networking space. Cumulus Networks’ raisan d’etre was to provide an open source operating system (eponymously called Cumulus Linux) that organizations could install on different networking hardware devices and, in doing so, gain all the benefits of software-defined networking (SDN) without any of the hassles of proprietary and locked-down software.It was a compelling story (at least for this commentator). And given the credibility that Rivers bought to the table, I was sold.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Software may be eating the world, but Cumulus Networks is still keen on hardware

I’ve been following Cumulus Networks almost since its inception. The company was co-founded by J.R. Rivers, something of a legend in the networking space. Cumulus Networks’ raisan d’etre was to provide an open source operating system (eponymously called Cumulus Linux) that organizations could install on different networking hardware devices and, in doing so, gain all the benefits of software-defined networking (SDN) without any of the hassles of proprietary and locked-down software.It was a compelling story (at least for this commentator). And given the credibility that Rivers bought to the table, I was sold.To read this article in full or to leave a comment, please click here

7 (more) security TED Talks you can’t miss

Second editionImage by Thomas XuThe first list 10 security Ted Talks you can’t miss was so popular we decided to serve another. So here is another batch of must see security and privacy videos. In this selection you’ll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to Bruce Schneier’s talk on how challenging it is for us to evaluate and understand risk. It’s a must-see talk. Well, we think they all are, so enjoy.To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: Software may be eating the world, but Cumulus Networks is still keen on hardware

I’ve been following Cumulus Networks almost since its inception. The company was co-founded by J.R. Rivers, something of a legend in the networking space. Cumulus Networks’ raisan d’etre was to provide an open source operating system (eponymously called Cumulus Linux) that organizations could install on different networking hardware devices and, in doing so, gain all the benefits of software-defined networking (SDN) without any of the hassles of proprietary and locked-down software.It was a compelling story (at least for this commentator). And given the credibility that Rivers bought to the table, I was sold.To read this article in full or to leave a comment, please click here

Introducing Cumulus Express — open networking hardware & software all in one

In the last few months at Cumulus Networks, we’ve put a lot of focus on finding innovative ways to make web-scale networking accessible to data centers of all sizes and engineers of all backgrounds. We released features like NCLU, EVPN and PIM to make that happen.

In our minds, web-scale networking principles make data centers more powerful and make engineers’ lives easier. We take great pride in helping organizations accelerate their journey to web-scale in the fastest, simplest way possible. That’s why we are super excited to announce that web-scale networking with Cumulus Networks just got EVEN BETTER. We know, you didn’t think it was possible.

Allow us to formally introduce Cumulus Express — your turnkey solution featuring an open networking switch preloaded and licensed with Cumulus Linux. Each Cumulus Express switch is ready to go as is, improving your time to market by eliminating steps to install and research optics. That’s right, you can now deploy switches running Cumulus Linux in one easy step.

With Cumulus Express you get:

  • 1G to 100G platforms: Available in 1G-T, 10G/10G-T, 25G (coming soon), 40G & 100G speeds
  • NOS & license preloaded: Each switch comes preloaded with Cumulus Linux with an active license Continue reading

21% off Polaroid ZIP Mobile Photo Printer with ZINK Zero Ink Printing Technology – Deal Alert

Enjoy the power and fun of a Polaroid camera without the Polaroid camera. This little standalone photo printer connects to your phone or tablet via Bluetooth, and is powered by a rechargeable lithium polymer battery, so it's designed to be portable, easy and fun to use. On a single charge the gadget will print 25 photos -- without ink. Instead, it uses heat to produce deep, vibrant colors that are completely smudge-proof, on 2x3 paper that is waterproof, tear-proof and backed with adhesive so you can peel-and-stick for added fun. Paper is easy to find on Amazon and comes in packs of 20, 30 or 50 (on sale here). A compact and protective carrying case is also available at what seems to be a reasonable price (found here).  The Polaroid ZIP mobile printer currently averages 4 out of 5 stars on Amazon from over 1,400 customers (read recent reviews). Its typical list price of $129.99 has been reduced by 21% to $102.14, a price you'll reveal only after adding the product to your cart. If you're looking for a fun and unusual summer gift idea for yourself or someone on your list, see Continue reading

Facebook plans new data center in Denmark

Facebook has chosen Odense in Denmark as the site of its third data center outside the U.S.Denmark's moderate climate will allow the company to use outdoor air and indirect evaporative cooling to keep temperatures in the data center down, and servers will be powered entirely with renewable energy, the company said Thursday.Most of Denmark's renewable energy comes from wind power, a highly variable resource. On one day in 2015, it was able to satisfy the nation's entire electricity demand with wind power, and also become a net exporter of electricity. At other times, around a quarter of the country's electricity demand is met by wind power, according to the latest figures from Eurostat, the European Union's statistical agency.To read this article in full or to leave a comment, please click here

Facebook plans new data center in Denmark

Facebook has chosen Odense in Denmark as the site of its third data center outside the U.S.Denmark's moderate climate will allow the company to use outdoor air and indirect evaporative cooling to keep temperatures in the data center down, and servers will be powered entirely with renewable energy, the company said Thursday.Most of Denmark's renewable energy comes from wind power, a highly variable resource. On one day in 2015, it was able to satisfy the nation's entire electricity demand with wind power, and also become a net exporter of electricity. At other times, around a quarter of the country's electricity demand is met by wind power, according to the latest figures from Eurostat, the European Union's statistical agency.To read this article in full or to leave a comment, please click here

Meet me in the parking lot: Walking meetings hit their stride

“Software engineer” might sound like a sedentary role, but it doesn’t have to be. Janice Lan schedules walking meetings to break the sitting habit.“Walking meetings are preferable for one-on-ones because it actually gives you a break from staring at a computer screen,” says Lan, a software engineer at Sift Science, which develops machine learning technology to detect fraud. “I walk with either a manager or a peer, usually when we talk about high-level things.”A walking meeting is just what it sounds like: a meeting that takes place during a walk rather than in a conference room or office. People can hold walking meetings on sidewalks and park trails or inside shopping malls and convention centers if the setting isn’t too noisy.To read this article in full or to leave a comment, please click here

A look at Auto-Tunnel Mesh Groups

In this post I would like to give a demonstration of using the Auto-Tunnel Mesh group feature.

As you may know, manual MPLS-TE tunnels are first and foremost unidirectional, meaning that if you do them between two PE nodes, you have to do a tunnel in each direction with the local PE node being the headend.

Now imagine if your network had 10 PE routers and you wanted to do a full mesh between them, this can become pretty burdensome and error-prone.
Thankfully there’s a method to avoid doing this manual configuration and instead rely on your IGP to signal its willingness to become part of a TE “Mesh”. Thats what the Auto-Tunnel Mesh Group feature is all about!

toplogy

In my small SP setup, I only have 3 PE devices, namely PE-1, PE-2 and PE-3. I also only have one P node, called P-1.
However small this setup is, its enough to demonstrate the power of the Auto-Tunnel mesh functionality.

Beyond that, I have setup a small MPLS L3 VPN service for customer CUST-A, which has a presence on all 3 PE nodes. The VPNv4 address-family is using a RR which for this purpose is P-1.

We are running OSPF Continue reading

CIA updates rules for collecting and retaining info on US people

The U.S. Central Intelligence Agency on Wednesday updated rules relating to the collection, retention and dissemination of information of U.S. persons, including putting a limit of five years on holding certain sensitive data and introducing restrictions for querying the data.The announcement by the spy agency comes a couple of days before a new administration under President-elect Donald Trump takes charge, and could address to an extent concerns expressed by civil rights groups about the collection and handling of information of U.S. persons in the course of overseas surveillance. Such information is collected by the CIA under Executive Order 12333.To read this article in full or to leave a comment, please click here

CIA updates rules for collecting and retaining info on US people

The U.S. Central Intelligence Agency on Wednesday updated rules relating to the collection, retention and dissemination of information of U.S. persons, including putting a limit of five years on holding certain sensitive data and introducing restrictions for querying the data.The announcement by the spy agency comes a couple of days before a new administration under President-elect Donald Trump takes charge, and could address to an extent concerns expressed by civil rights groups about the collection and handling of information of U.S. persons in the course of overseas surveillance. Such information is collected by the CIA under Executive Order 12333.To read this article in full or to leave a comment, please click here

LSA issue @ January 19, 2017 at 10:43AM

Here is the question: if Host A wants to transmit some data across TCP/IP network to Host B with IP address of 1.2.3.4 how will this Dest_IP address be represented? Correct, it will be hex encoded, but will the bytestream be like 0x01 02 03 04 or 0x04 03 02 01? Yep, you see where

2016 Year in Review

Every beginning of the year I usually review what I have done the past one year, make notes, and build the plan for the upcoming year. I made many mistakes in the past, did things I’m not proud of, however I use them as opportunity to learn and try to be better next time.


Early 2016 I found that my startup company was competing directly against Cisco (that was still my employer at that time). That was quite surprising. I founded that company in 2012 initially as my pet project, the lab for my MBA, where I can practice whatever I learned from the business school. My pitch for the startup was simple: we do what Cisco (or Cisco Services) will not do. We built online learning platform to learn Cisco certification using group mentoring system. We run physical network audit. We did system integration projects to interoperate Cisco products with any other vendors.

However, since late 2014 the engineering team in my company have evolved. They grew skills in network programming. The team put more focus on Software Defined Networking (SDN). They built lab to validate Network Function Virtualization (NFV). And then the team started to develop our own Continue reading

Technology Short Take #76

Welcome to Technology Short Take #76, the first Technology Short Take of 2017. Normally, I’d publish this on a Friday, but due to extenuating circumstances (my mother-in-law’s funeral is tomorrow) I’m posting it today. Here’s hoping you find something useful!

Networking

Mac malware is found targeting biomedical research

A Mac malware that’s been spying on biomedical research centers may have been circulating undetected for years, according to new research.Antivirus vendor Malwarebytes uncovered the malicious code, after an IT administrator spotted unusual network traffic coming from an infected Mac.The malware, which Apple calls Fruitfly, is designed to take screen captures, access the Mac’s webcam, and simulate mouse clicks and key presses, allowing for remote control by a hacker,  Malwarebytes said in a blog post on Wednesday.The security firm said that neither it nor Apple have identified how the malware has been spreading. But whoever designed it relied on “ancient” coding functions, dating back before the Mac OS X operating system launch in 2001, said Malwarebytes researcher Thomas Reed in the blog post.To read this article in full or to leave a comment, please click here