Archive

Category Archives for "Networking"

Docker network visibility demonstration

The 2 minute live demonstration shows how the open source Host sFlow agent can be used to efficiently monitor Docker networking in production environments. The demonstration shows real-time tracking of 30Gbit/s traffic flows using less than 1% of a single processor core.

Handbook Updates

As many might have noticed, the Routing-bits Handbook updates have been sparse, and activity on the Routing-Bits blog even more so. A variety of contributors have led to this stemming from piracy, work, life, family, and relocation. With this I find myself at a cross-roads looking at the future the Routing-Bits website and the RB […]

Google buildings evacuated after threat

Buildings were evacuated at Google’s headquarters in Mountain View, California, on Friday afternoon after a threat was made against the company.No one was injured and there was no damage to buildings, Mountain View police spokeswoman Katie Nelson said. The incident involved a few buildings, beginning around 3:30 p.m. and concluded shortly before 5 p.m. Both police and Google security responded.Google didn't immediately have more information to provide. Police didn't comment on the nature of the threat and said they responded out of caution.While the campuses of Silicon Valley companies aren’t normally considered terrorist targets on the scale of federal buildings or major sporting events, major companies like Google, Apple, and Facebook are prominent symbols of U.S. economic and cultural power.To read this article in full or to leave a comment, please click here

Google buildings evacuated after threat

Buildings were evacuated at Google’s headquarters in Mountain View, California, on Friday afternoon after a threat was made against the company.No one was injured and there was no damage to buildings, Mountain View police spokeswoman Katie Nelson said. The incident involved a few buildings, beginning around 3:30 p.m. and concluded shortly before 5 p.m. Both police and Google security responded.Google didn't immediately have more information to provide. Police didn't comment on the nature of the threat and said they responded out of caution.While the campuses of Silicon Valley companies aren’t normally considered terrorist targets on the scale of federal buildings or major sporting events, major companies like Google, Apple, and Facebook are prominent symbols of U.S. economic and cultural power.To read this article in full or to leave a comment, please click here

How to use cloud storage as primary storage

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.The cloud is the promised land when it comes to storage.  A recent 451 Research report said AWS and Azure will be two of the top five enterprise storage vendors by 2017 with AWS as number two overall.  But the challenge with using the cloud for primary storage is the latency between that storage and users/applications. To take advantage of the economics, scale, and durability of cloud storage, it will take a combination of caching, global deduplication, security, and global file locking to provide cloud storage with the performance and features organizations require. To read this article in full or to leave a comment, please click here

How to use cloud storage as primary storage

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

The cloud is the promised land when it comes to storage.  A recent 451 Research report said AWS and Azure will be two of the top five enterprise storage vendors by 2017 with AWS as number two overall.  But the challenge with using the cloud for primary storage is the latency between that storage and users/applications. To take advantage of the economics, scale, and durability of cloud storage, it will take a combination of caching, global deduplication, security, and global file locking to provide cloud storage with the performance and features organizations require. 

To read this article in full or to leave a comment, please click here

How to improve network monitoring

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.I’m an aerospace engineer by degree and an IT executive by practice. Early in my career, I worked on missile hardware and simulators with some of the smartest minds at Marshall Space Flight Center in Huntsville, AL. An adage from those days still drives me today: “Better is the evil of good enough.”In rocket science, an astronaut’s life is literally in the balance with every engineering decision. Being perfect is mission critical. But along the way, NASA engineers realized while perfection is important, it was not to be universally adopted, for several key reasons: It is very expensive, it draws out timelines, and it can result in extreme over-engineering.To read this article in full or to leave a comment, please click here

How to improve network monitoring

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

I’m an aerospace engineer by degree and an IT executive by practice. Early in my career, I worked on missile hardware and simulators with some of the smartest minds at Marshall Space Flight Center in Huntsville, AL. An adage from those days still drives me today: “Better is the evil of good enough.”

In rocket science, an astronaut’s life is literally in the balance with every engineering decision. Being perfect is mission critical. But along the way, NASA engineers realized while perfection is important, it was not to be universally adopted, for several key reasons: It is very expensive, it draws out timelines, and it can result in extreme over-engineering.

To read this article in full or to leave a comment, please click here

Proposed US law would require tech companies to help defeat encryption

A proposal from two senior U.S. senators would force tech companies to give technical assistance to law enforcement agencies trying to break into smartphones and other encrypted devices.The draft bill, released Friday by Senators Richard Burr and Dianne Feinstein, would allow judges to order tech companies to comply with requests from the FBI and other law enforcement agencies to help them break into devices. Burr, a North Carolina Republican, is chairman of the Senate Intelligence Committee; Feinstein, from California, is the panel's senior Democrat."All persons receiving an authorized judicial order for information or data must provide, in a timely manner, responsive, intelligible information or data, or appropriate technical assistance," the draft bill says.To read this article in full or to leave a comment, please click here

How to choose a software defined WAN (SD-WAN)

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Only 1% of companies use software-defined WAN (SD-WAN) solutions today, but Gartner says the promise of cost savings and performance improvements will drive that number to more than 30% by 2019.  Why aren’t more businesses deploying now given the sizeable list of vendor tools available?  It could be a lack of understanding about the varying approaches to bringing software-defined networking to the branch.

Before exploring those differences, let’s review why SD-WAN is so promising for branch environments. Compared to traditional WANs, SD-WANs reduce the complexity of network hardware at branch offices and centralize and simplify management. SD-WANs also allow businesses to augment or replace MPLS networks by using less expensive Internet links in a logical overlay and intelligently routing traffic over multiple paths directly to the Internet, rather than through a central data center. This improves application performance and makes more efficient use of bandwidth.

To read this article in full or to leave a comment, please click here

The Design Mindset (4)—Interaction Surfaces

Before talking the final point in the network design mindset, ,act, I wanted to answer an excellent question from the comments from the last post in this series: what is surface?

The concept of interaction surfaces is difficult to grasp primarily because it covers such a wide array of ideas. Let me try to clarify by giving a specific example. Assume you have a single function that—

  • Accepts two numbers as input
  • Adds them
  • Multiplies the resulting sum by 100
  • Returns the result

This single function can be considered a subsystem in some larger system. Now assume you break this single function into two functions, one of which does the addition, and the other of which does the multiplication. You’ve created two simpler functions (each one only does one thing), but you’ve created an interaction surface between the two functions—you’ve created two interacting subsystems within the system where there only used to be one. This is a really simple example, I know, but consider a few more that might help.

  • The routing information carried in OSPF is split up into external routes being carried in BGP, and internal rotues being carried in OSPF. You’ve gone from one system with more Continue reading

Karamba brings cybersecurity to the automotive market for connected cars  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you happen to be driving around California roads this summer, don't be surprised if a car with no driver pulls up next to you at an intersection. Google expects to be road-testing its prototype of a driverless car soon. If all goes well with this and other tests, BI Intelligence believes there could be 10 million cars with self-driving features on our roads by 2020.Fully autonomous cars – those that don't need any interaction at all from a driver, like Google's – still seem futuristic to most of us, but there are plenty of semi-autonomous cars sharing our roads today. This latter category includes all sorts of features to increase safety and convenience, everything from lane-keeping assist systems designed to keep a car in an open lane, to adaptive cruise control that matches the car's speed to that of the vehicle ahead,To read this article in full or to leave a comment, please click here

Karamba brings cybersecurity to the automotive market for connected cars  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you happen to be driving around California roads this summer, don't be surprised if a car with no driver pulls up next to you at an intersection. Google expects to be road-testing its prototype of a driverless car soon. If all goes well with this and other tests, BI Intelligence believes there could be 10 million cars with self-driving features on our roads by 2020.Fully autonomous cars – those that don't need any interaction at all from a driver, like Google's – still seem futuristic to most of us, but there are plenty of semi-autonomous cars sharing our roads today. This latter category includes all sorts of features to increase safety and convenience, everything from lane-keeping assist systems designed to keep a car in an open lane, to adaptive cruise control that matches the car's speed to that of the vehicle ahead,To read this article in full or to leave a comment, please click here