Everyone loves to talk about business critical applications that require extremely high availability, but it’s rare to see someone analyze the whole application stack and identify the weakest link.
For more details, watch my Designing Active/Active and Disaster Recovery Data Centers or attend one of my workshops.
If you start mapping out the major components of an application stack, you’ll probably arrive at this list (bottom-to-top):
Read more ...I’m happy to be given the opportunity to speak once more at Interop Vegas in 2016. No workshop for me this year, but I will be putting on three individual talks, all focusing on topics that have been very near and dear to me over the past year.
Last year I was very focused on putting the theory behind network automation into practical terms, and making it “real”. Over the past year I’ve seen rapid growth in adoption of these ideas, and I was happy to be just one very small part of helping to make that happen.
Since the last Interop, my career has steered me towards a more direct approach to network automation, specifically through software development. So I’d like to spend some time providing an overview of my sessions at the upcoming Interop Vegas 2016, which are all inspired by the last year of my career.
I am obviously very passionate about network automation, and have been very vocal about my belief that network automation only has a chance if it is done properly, which includes proper testing. I strongly believe that network automation can and should take place within the context of a Continue reading
Brocade's stock drops 14% on the announcement.
Take survey and enter to win one of two $200 Amazon Gift Cards.
In my last post on securing BGP, I said—
The CAP theorem post referenced above is here.
Before I dive into the technical issues, I want to return to the business issues for a moment. In a call this week on the topic of BGP security, someone pointed out that there is no difference between an advertisement in BGP asserting some piece of information (reachability or connectivity, take your pick), and an advertisements outside BGP asserting this same bit of information. The point of the question is this: if I can’t trust you to advertise the right thing in one setting, then why should I trust you to advertise the right thing in another? More specifically, if you’re using Continue reading
Take a Network Break and sample our delicious assortment of tech news, including a new product from Arista, financial results from Huawei, & stories on Dell, HPE, Plumgrid, Intel & more.
The post Network Break 81: Arista’s Universal Spine, Huawei’s Big Profits appeared first on Packet Pushers.
Take a Network Break and sample our delicious assortment of tech news, including a new product from Arista, financial results from Huawei, & stories on Dell, HPE, Plumgrid, Intel & more.
The post Network Break 81: Arista’s Universal Spine, Huawei’s Big Profits appeared first on Packet Pushers.
WLAN market continues on a rapid path of consolidation with latest deal.