The more debate I hear over protocols and product positioning in the networking market today, the more I realize that networking has a very big problem with myopia when it comes to building products. Sometimes that’s good. But when you can’t even see the trees for the bark, let alone the forest, then it’s time to reassess what’s going on.
Sit down in a bar in Silicon Valley and you’ll hear all kinds of debates about which protocols you should be using in your startup’s project. OpenFlow has its favorite backers. Others say things like Stateless Transport Tunneling (STT) are the way to go. Still others have backed a new favorite draft protocol that’s being fast-tracked at the IETF meetings. The debates go on and on. It ends up looking a lot like this famous video.
But what does this have to do with the product? In the end, do the users really care which transport protocol you used? Is the forward table population mechanism of critical importance to them? Or are they more concerned with how the system works? How easy it is to install? How effective it is at letting them do their jobs?
The Continue reading
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Web advertisers and many others have long appreciated the volumes of information they can collect on us based only on our web browsing patterns. The data can be quite telling, revealing our locations, incomes, family status, interests and many other facts that advertisers can use to target you.
Understandably, most of us would prefer that “big brother like” advertising networks aren’t always watching over our shoulder, while going about regular activities including product research and purchase option exploration and especially not while investigating medical or other highly sensitive topics.
To read this article in full or to leave a comment, please click here
“The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion.” – Albert Camus
In my role as a Customer Solutions Engineer (affectionately known as CSE) at Cumulus Networks, I am on the frontlines discussing customer requirements, use cases and networking architectures. A frequent question that customers ask me is “what can an open network operating system (OS) do for me?”
Most customers have lived in the world of black boxes where the OS and hardware are vertically integrated and your vendor keeps you in a sandbox that controls what you can and cannot do. In the black box world, if you want a new feature, application or a different operational model, you have to request it from your account team and wait while the vendor decides if your use case is important enough or you are a big enough customer.
The idea of having direct access to the different operational aspects of the OS is a foreign concept Continue reading
Want to know even more about Tail-F NCS after listening to Episode 22 of Software Gone Wild? Boštjan Šuštar and Marko Tišler from NIL Data Communications continue their deep dive into the secrets of NCS in Software Gone Wild Episode 23.
Over the last year we have seen and written about numerous BGP routing incidents that looked out of the ordinary, straight-up suspicious or were just configuration mistakes. In this blog post we will highlight a few of them and look at the impact and cause of each of the observed incidents and try to determine if there was any malicious intent.
I presented the same data last week at NANOG 63, in San Antonio, a recording of this presentation can be found below:
We have all heard of Bitcoin, it’s been in the news quite a bit and chances are that some of you are mining Bitcoins right now. There are now computing devices optimized for Bitcoin mining and even dedicated Bitcoin mining data centers. In addition to the dedicated data centers, many Bitcoin miners use cloud compute instances from Amazon, OVH, Digital Ocean, etc. So it’s obvious that there is a lot of money spent on Bitcoin mining & trading; and as such there is also an opportunity to make a quick buck.
This summer we blogged about a series of BGP hijacks where an attacker cleverly misused the Bitcoin stratum protocol. By Continue reading
Overlay Networking and Coarse Flow Table are two ways to scale up the flow networking for SDN.
The post Overlay Networking as a Method to Scale Flow Networking and Handling appeared first on EtherealMind.