A lot more money for microsegmentation.
A new toolkit allows in-house customization of Blue Planet.
I gave a 13-minute talk to the Irish Network Operators Group (INOG) recently. In this 13-minute video I argue that you can become more effective, and happier, by standing back and reflecting on how you work, leveraging existing truths, fallacies and principles. I introduce The twelve … Continue reading
The post Effectiveness – Network Truths, Principles and Fallacies appeared first on The Network Sherpa.
I recently gave a 13-minute talk to the Irish Network Operators Group (INOG). In this talk I argue that you can become more effective, and a happier engineer by standing back and reflecting. The talk discusses how you work – with reference to some great truths, principles and fallacies.
I introduce The twelve networking truths and the 8 Fallacies of Distributed Computing. I then describe a handful of my own learnings and fancy terms like Chesterton’s Fence and the Gordian Knot.
Check out the video folks, I’d love your feedback.
I was quite nervous preparing for the talk, but I know myself well enough by now to recognise these small fears as opportunities. This is the same fear I faced when I started this blog.
This isn’t false modesty, I’ve done talks before in Amazon and survived, but I was still very nervous. Still, it took me hours of consideration, planning and preparation in addition to a fair bit of anxiety.
I got a real buzz from doing the talk and overcoming the fear. Upon reviewing the video, I know I’ve got a few things to work on. But, by facing a small fear, I’m now slighter better at public Continue reading
Putting load balancing capabilities directly into the developer's hands.
The service provider is seeing 1.8 Gb/s speeds in 5G trial.
I’ve seen this misconception a few times on message boards, reddit, and even comments on this blog: That Layer 2 adjacency is no longer required with vSphere 6.0, as VMware now supports Layer 3 vMotion. The (mis)perception is that you no longer need to stretch a Layer 2 domain between ESXi hosts.
That is incorrect. VMware did remove a Layer 2 adjacency requirement for the vMotion Network, but not for the VMs. Lemme explain.
It used to be (before vSphere 6.0) that you were required to have the VMkernel interfaces that performed vMotion on the same subnet. You weren’t supposed to go through a default gateway (though I think you could, it just wasn’t supported). So not only did your VM networks need to be stretched between hosts, but so did your VMkernel interfaces that performed the vMotion sending/receiving.
What vSphere added was a separate TCP/IP stack for vMotion networks, so you could have a specific default gateway for vMotion, allowing your vMotion VMkernel interfaces to be on different subnets.
This does not remove the requirement that the same Layer 2 network exist on the sending and receiving ESXi host. The IP of the VM needs to Continue reading
Company also debuts new Wave 2 access points and a multi-gigabit access switch.
Spam might seem like an annoyance in the US and other areas where bandwidth is paid for by the access rate—and what does spam have to do with BGP security? In many areas of the world, however, spam makes email practically unusable. When you’re paying for Internet access by the byte transmitted or received, spam costs real money. The normal process for combating spam involves a multi-step process, one step of which is to assess the IP address of the mail server’s previous activity for a history of originating spam. In order to avoid classifiers that rely on the source IP address, spammers have turned to hijacking IP address space for short periods of time. Since this address space is normally used for something other than email (or it’s not used at all), there is no history on which a spam detection system can rely.
The evidence for spam related hijacking, however, is largely anecdotal, primarily based in word of mouth and the rare widely reported incidents. How common are these hijacks, really? What sort of address space is really used? To answer this question, a group of researchers from Symantec and the Qatar Computing Research Center undertook a project Continue reading