Archive

Category Archives for "Networking"

Cloud providers should unify virtual networking and SD-WAN

I’ve predicted that virtual networks will be hot in 2023, but that begs the question of what exactly a “virtual network” is. One definition says, “not physically existing as such but made by software to appear to do so”, and that surely makes you wonder how businesses would be willing to commit to such a thing. Truth is, they already have, but I think it’s time to look closely at the concept of virtual networks, and to categorize what exactly is going on there. Why look at something that isn’t real and only appears to be?  We’ll see.I could offer a lot of discussions on the early days of virtual network evolution here, but they’re probably as useless as a debate on where your lap goes when you stand up, an example of worthless effort I recall from a childhood book. Instead, let’s look at virtual networks from two directions—the user and the application—and see how those two directions are shaping virtual network technology, increasing its importance, and converging on a new network model overall.To read this article in full, please click here

IT supply issues have organizations shifting from just-in-time to just-in-case buying

The past three years have been an unprecedented period of disruption in the semiconductor industry. The Covid pandemic and ensuing lockdowns shut down manufacturing, there were interruptions in shipping, and then the war in Ukraine adversely impacted supplies of critical raw materials.The first half of 2022 saw 46% more supply chain disruptions than the first half of 2021, according to a research report released this fall by Resilinc, a supply chain resiliency company.To read this article in full, please click here

IT supply issues have organizations shifting from just-in-time to just-in-case buying

The past three years have been an unprecedented period of disruption in the semiconductor industry. The Covid pandemic and ensuing lockdowns shut down manufacturing, there were interruptions in shipping, and then the war in Ukraine adversely impacted supplies of critical raw materials.The first half of 2022 saw 46% more supply chain disruptions than the first half of 2021, according to a research report released this fall by Resilinc, a supply chain resiliency company.To read this article in full, please click here

Kubernetes Unpacked 016: Taking On Kubernetes As A New Engineer

On today's Kubernetes Unpacked podcast we talk about taking on Kubernetes as a young engineer. As all IT pros know, learning Kubernetes isn’t the easiest thing, especially when you’re first entering the field. Guest Alero Awani, a college student, talks about her transition from Data Engineering to cloud and DevOps, and how and why she came to learn Kubernetes.

The post Kubernetes Unpacked 016: Taking On Kubernetes As A New Engineer appeared first on Packet Pushers.

BGP in 2022 – The Routing Table

This past year marks a significant point in the evolution of the Internet where the strong growth numbers that were a constant feature of the past thirty years are simply not present in the data. The Internet’s growth is slowing down significantly. Have we got to the point of market saturation and there is no more demand capacity to fuel further growth? Or are we reeling from the combinations of a global pandemic, turmoil in energy markets and the signs of increased climate instability so that we are no longer as interested to throw more resources into more network infrastructure investment? Let’s take a look at the BGP view of 2022 and see how these larger economic and social considerations are reflected in the behaviour of the Internet’s inter-domain routing system.

Case study: How Mulligan Funding built a SOC 2-compliant fintech SaaS platform with Calico Cloud

The rise of fintech has pushed traditional financial institutions to provide online-based services and launch fintech applications. But these services must be secure and meet certain regulatory requirements, such as the Payment Card Industry Data Security Standard (PCI DSS), the General Data Protection Regulation (GDPR), or SOC 2.

When our customer, Mulligan Funding, needed to launch a new fintech SaaS platform, they had to ensure that all communication to and from the application would be secure and SOC 2 compliant, since the platform would handle sensitive personal and financial data. To achieve this, Mulligan Funding decided to standardize on Microsoft Azure Kubernetes Service (AKS) and chose Calico Cloud for its security and compliance needs.

Case study highlights

Mulligan Funding faced two major challenges when it came to achieving SOC 2 compliance:

  1. Ensure compliance and be notified of any control changes 24/7 in a way that’s scalable
  2. Gain visibility into clusters to immediately pinpoint issues that require troubleshooting

Read the case study to learn:

  • How Mulligan Funding bolstered its security posture at scale through unified security policy management.
  • Why deploying Calico Cloud not only helped Mulligan Funding achieve compliance, but also helped the company reduce service distributions and optimize troubleshooting.

Read Continue reading

Arista floats its answer to the strain AI puts on networks

If networks are to deliver the full power of AI they will need a combination of high-performance connectivity and no packet lossThe concern is that today’s traditional network interconnects cannot provide the required scale and bandwidth to keep up with AI requests, said Martin Hull, vice president of Cloud Titans and Platform Product Management with Arista Networks. Historically, the only option to connect processor cores and memory have been proprietary interconnects such as InfiniBand, PCI Express and other protocols that connect compute clusters with offloads but for the most part that won’t work with AI and its workload requirements.Arista AI Spine To address these concerns, Arista is developing a technology it calls AI Spine, which calls for switches with deep packet buffers and networking software that provides real-time monitoring to manage the buffers and efficiently control traffic.To read this article in full, please click here

Arista floats its answer to the strain AI puts on networks

If networks are to deliver the full power of AI they will need a combination of high-performance connectivity and no packet lossThe concern is that today’s traditional network interconnects cannot provide the required scale and bandwidth to keep up with AI requests, said Martin Hull, vice president of Cloud Titans and Platform Product Management with Arista Networks. Historically, the only option to connect processor cores and memory have been proprietary interconnects such as InfiniBand, PCI Express and other protocols that connect compute clusters with offloads but for the most part that won’t work with AI and its workload req uirements.Arista AI Spine To address these concerns, Arista is developing a technology it calls AI Spine, which calls for data-center switches with deep packet buffers and networking software that provides real-time monitoring to hep manage the buffers and efficiently control traffic.To read this article in full, please click here

Hedge 160: Avishai Ish-Shalom and Jurassic Cloud

Cloud might seem shiny and new—but that’s just the way it looks on the outside. Most cloud services are still built on decades old technology, from networking to file access. Avishai Ish-Shalom joins Tom Ammon and Russ White to discuss the impact of changes in hardware on the design of operating systems, and think through how things will need to change to continue the drive for more performance.

download

original article on USENIX here

How Cloudflare can help stop malware before it reaches your app

How Cloudflare can help stop malware before it reaches your app
How Cloudflare can help stop malware before it reaches your app

Let’s assume you manage a job advert site. On a daily basis job-seekers will be uploading their CVs, cover letters and other supplementary documents to your servers. What if someone tried to upload malware instead?

Today we’re making your security team job easier by providing a file content scanning engine integrated with our Web Application Firewall (WAF), so that malicious files being uploaded by end users get blocked before they reach application servers.

Enter WAF Content Scanning.

If you are an enterprise customer, reach out to your account team to get access.

Making content scanning easy

At Cloudflare, we pride ourselves on making our products very easy to use. WAF Content Scanning was built with that goal in mind. The main requirement to use the Cloudflare WAF is that application traffic is proxying via the Cloudflare network. Once that is done, turning on Content Scanning requires a single API call.

Once on, the WAF will automatically detect any content being uploaded, and when found, scan it and provide the results for you to use when writing WAF Custom Rules or reviewing security analytics dashboards.

The entire process runs inline with your HTTP traffic and requires no change to your Continue reading

AI is coming to the network

AI-enabled management platforms and infrastructure are beginning to make their way into enterprise networks. I say “beginning” because despite lots of AI-washing marketing efforts over the last few years, a lot of what has been characterized as “AI-driven” or “powered by AI” hasn’t really materialized. It's not that these systems don’t do what the marketers say, so much as they don't do it in the way they imply.Even some tools that do truly employ AI in meaningful ways, and with visibly different results than are possible without it, don’t feel qualitatively different from what has come before. They may be better, for example by dramatically reducing the number of false positives in alert traffic, but not different.To read this article in full, please click here

AI is coming to the network

AI-enabled management platforms and infrastructure are beginning to make their way into enterprise networks. I say “beginning” because despite lots of AI-washing marketing efforts over the last few years, a lot of what has been characterized as “AI-driven” or “powered by AI” hasn’t really materialized. It's not that these systems don’t do what the marketers say, so much as they don't do it in the way they imply.Even some tools that do truly employ AI in meaningful ways, and with visibly different results than are possible without it, don’t feel qualitatively different from what has come before. They may be better, for example by dramatically reducing the number of false positives in alert traffic, but not different.To read this article in full, please click here

9 steps to protecting backup servers from ransomware

Now that ransomware organizations are specifically targeting on-site backup servers, it’s even more important that enterprises defend them vigorously.Here are nine steps to protect your backups and why you should take them.Patch religiously Make sure your backup server is among in the first group to receive the latest operating system updates. Most ransomware attacks exploit vulnerabilities for which patches have been available for a long time, but that didn’t get installed. Also, subscribe to whatever automatic updates your backup software provides, again to take advantage of whatever new protections they might include.To read this article in full, please click here

Using the Linux locale command

The locale settings in Linux systems help ensure that information like dates and times are displayed in a format that makes sense in the context of where you live and what language you speak. Here's how to use them.NOTE: None of the commands described in this post will change your locale settings. Some merely use a different locale setting to display the response you might be seeing from a different location.List your settings If you’re in the US, you should see something like this when you use the locale command to list your settings:$ locale LANG=en_US.UTF-8 LC_CTYPE="en_US.UTF-8" LC_NUMERIC="en_US.UTF-8" LC_TIME="en_US.UTF-8" LC_COLLATE="en_US.UTF-8" LC_MONETARY="en_US.UTF-8" LC_MESSAGES="en_US.UTF-8" LC_PAPER="en_US.UTF-8" LC_NAME="en_US.UTF-8" LC_ADDRESS="en_US.UTF-8" LC_TELEPHONE="en_US.UTF-8" LC_MEASUREMENT="en_US.UTF-8" LC_IDENTIFICATION="en_US.UTF-8" LC_ALL= The en_US.UTF-8 settings in the above output all represent US English. If you’re in France, this response is more likely:To read this article in full, please click here