If you missed a VMware vForum in a city near you, you can still join us on April 19th for vForum Online! At this free digital event, you’ll get practical guidance, and develop new strategies for building a digital success plan across the cloud, the virtualized network, and mobile. Continue reading
The rapid migration from enterprise to cloud, driven by the economics of scale, the convergence of local and wide-area networking (LAN-WAN), the migration from Fibre Channel to IP storage, the rise of analytics and the emergence of new cloud applications is dramatic. In the past two years, we have witnessed a massive shift in the way applications are built and deployed, moving away from legacy siloed infrastructure to seamless workload mobility. The demands of these new workloads change the way spine networks are reconstructed for cloud networking. As physical compute or storage silos evolve to support cloud applications, one can automate and provision the entire network to handle any workload, workflow or workstream, with real time agility.
Use techniques like traffic policing and WAN optimization to get the most out of your bandwidth.
Is your IT organization guilty of data hoarding or lusting after big data?
Long story short: I burned out last autumn and still haven’t recovered.
I managed to find a replacement instructor for three of my workshops, so I hope they’ll still take place. I’m also working on other ways of delivering them to whoever is interested in an interactive live session.
To all the people who wanted to meet me in Las Vegas: I’m really sorry I’ll miss you. Interop was always a great place for interesting conversations and awesome workshop audiences.
So there’s a mistake I’ve been making, for years. I’ve referred to what is link aggregation as “LACP”. As in “I’m setting up an LACP between two switches”. While you can certainly set up LACP between to switches, the more correct term for the technology is link aggregation (as defined by the IEEE), and an instance of that is generically called a LAG (Link Aggregation Group). LACP is an optional part of this technology.
Here I am explaining this and more in an 18 minute Youtube video.
If you’re in Buenos Aires on April 2-3 and are interested in building, come join the IETF Hackathon. CloudFlare and Mozilla will be working on TLS 1.3, the first new version of TLS in eight years!
At the hackathon we’ll be focusing on implementing the latest draft of TLS 1.3 and testing interoperability between existing implementations written in C, Go, OCaml, JavaScript and F*. If you have experience with network programming and cryptography, come hack on the latest and greatest protocol and help find problems before it is finalized. If you’re planning on attending, add your name to the Hackathon wiki. If you can’t make it, but implementing cryptographic protocols is your cup of tea, apply to join the CloudFlare team!
We’re very excited about TLS 1.3, which brings both security and performance improvements to HTTPS. In fact, if you have a client that speaks TLS 1.3 draft 10, you can read this blog on our TLS 1.3 mirror: tls13.cloudflare.com.
We hope to see you there!
Today, we’re going to talk about performance and especially network performance. The main goal of this article is to present to you a way to boost progressively your network bandwidth at minor costs. Welcome to the wonderful world of the multipathing! We can define the multipathing as a method to use more than one way […]
The post Multipathing With NFS4.1 And KVM appeared first on Packet Pushers.
Today, we’re going to talk about performance and especially network performance. The main goal of this article is to present to you a way to boost progressively your network bandwidth at minor costs. Welcome to the wonderful world of the multipathing! We can define the multipathing as a method to use more than one way […]
The post Multipathing With NFS4.1 And KVM appeared first on Packet Pushers.
A recent report from Infoblox says the U.S. far and away hosted the largest number of domains that were used “for hosting and launching attacks using malicious DNS infrastructure” in the fourth quarter of 2015.
The post United States Hosts 72% Of Compromised DNS Domains appeared first on Packet Pushers.