The next generation of networking is more complex and multi-functional compared to the networks of today. Networks are moving from “connectivity as a service” to “multi- service platform. Takeaways SDN & NFV are complementary technologies NFV depends on SDN to deliver network features that enable it. Both use controller concepts for Operations and Administration (OAM). […]
The post Basics: Explaining the Difference Between Software Defined Networking (SDN) and Network Functions Virtualization (NFV) appeared first on EtherealMind.
Kemp Technologies joins the Packet Pushers for this sponsored episode to talk about how application and network owners can leverage SDN, NFV, and hybridity to deliver applications more effectively.
The post Show 258: Application Centricity With Kemp Technologies (Sponsored) appeared first on Packet Pushers.
Next Tuesday, we’re heading down to Cambridge, MA to participate in the second annual Tech Mixer hosted by Forrester. The goal of the event is to bring together emerging technology companies in an informal, relaxed setting to make connections and have conversations about current trends in the industry. We’ll be attending alongside some innovative companies and are looking forward to learning more about their platforms and predictions for the future at the event. If you’re in the Boston area, we hope to see you there. Details are listed below!
Date: October 13, 2015
Time: 4:00 – 6:00 p.m.
Forrester Research HQ
60 Acorn Park Drive
Cambridge, MA 02140
Below please find a few of our top picks for our favorite news articles of the week. Enjoy!
Forbes: Inside The Crystal Ball: Five Data Center Trends For 2020 And Beyond
By Michael Levy
Standing at more than one million square feet, the United States Intelligence Community’s Utah Data Center is one of the world’s largest infrastructures. Costing nearly $2 billion, the site boasts storage capacity of almost 12 exabytes. That’s impressive considering the first electronic programmable computer was turned on at the University of Pennsylvania less than 75 years ago. Continue reading
The world’s largest and most innovative operators are taking the next step toward vCPE
A Coriant CTO says the YANG model is key to its controller enhancements.
In a previous post we discussed the performance limitations of the Linux kernel network stack. We detailed the available kernel bypass techniques allowing user space programs to receive packets with high throughput. Unfortunately, none of the discussed open source solutions supported our needs. To improve the situation we decided to contribute to the Netmap project. In this blog post we'll describe our proposed changes.

CC BY-SA 2.0 image by Binary Koala
At CloudFlare we are constantly dealing with large packet floods. Our network constantly receives a large volume of packets, often coming from many, simultaneous attacks. In fact, it is entirely possible that the server which just served you this blog post is dealing with a many-million packets per second flood right now.
Since the Linux Kernel can't really handle a large volume of packets, we need to work around it. During packet floods we offload selected network flows (belonging to a flood) to a user space application. This application filters the packets at very high speed. Most of the packets are dropped, as they belong to a flood. The small number of "valid" packets are injected back to the kernel and handled in the same way Continue reading
Amazon Internet of Things PaaS platform was announced yesterday with the buzz line "Cloud Services for Connected Devices". I am comparing the strategic differences with Cisco Fog Computing.
The post AWS IoT vs Cisco Fog Computing – Cloud vs Network IoT appeared first on EtherealMind.
After ARIN ran out of IPv4 address space (in a totally uncontrolled “let’s party till it’s over” way) US enterprise IT shops (RFC 6919) OUGHT TO learn how to spell IPv6 (US service providers are already ahead of the pack).
You may also decide to ignore IPv6 indefinitely, but do keep in mind that consultants love panicking clients.
Read more ...On this week's show we're checking in with Katie Moussouris of HackerOne. She's an ex Microsoftie who's spent something like a decade working on vulnerability disclosure policies. She even helped get a vuln disclosure ISO standard ratified!
And she'll be joining us this week to discuss disclosure politics, I guess you'd call it... for those of us who've been around infosec for a while, most of us would rather stick our face in a blender than talk about it, but Katie will be along to point out why people should fight their "disclosure debate fatigue" and get involved.