Stream 1 October 2013: CCIE#1346 didn’t like it. In fact, he despised it so much that even after the edits he never posted the recommendation on his LinkedIn profile. The endorsement passage was strong and to the point; after having had his book, Developing IP Multicast Networks, for years and using it constantly, I […]
The post Beau Williamson: The Man Who Lived His Bucket List appeared first on Packet Pushers.
This post is also available in 日本語.
I’m excited to announce that I recently joined Cloudflare in Japan as Vice-President and Managing Director, to help build and expand our customer, partner base, and presence in Japan. Cloudflare expanded its network in Japan in 2010, just months after launching. Now, 12 years later, Cloudflare is continuing its mission to help build a better Internet in Japan and across the globe, and I’m looking forward to being able to contribute to that mission!
In my 35-year career in the IT industry, I have been fortunate enough to work with some of the biggest technology companies in the world, working in various roles in both sales and technical sides of the business. I consider this one of my biggest strengths. In addition, working in the IT industry has allowed me to acquire industry knowledge across a number of different solutions such as custom development, packaged systems (ERP, CRM), MS Office products, and cloud solutions.
Most recently, I was director of the Enterprise Business Group for Japan at AWS, where I was responsible for all commercial industries such as Manufacturing, Process, Distribution, Retail, Telecommunications, Utility, Media, Service, Pharmaceuticals, among others. Continue reading
Monitoring is a critical part of any computer system that has been brought in to a production-ready state. No IT system exists in true isolation, and even the simplest systems interact in interesting ways with the systems “surrounding” them. Since compute time, memory, and long-term storage are all finite, it’s necessary at the very least to understand how these things are being allocated.
Perhaps this question seems contrived. However, it’s always worth spending a moment thinking about reasons before adding any technical complexity to a distributed system! After all, they are already quite complicated! So why does the Calico eBPF data plane support metrics through Prometheus and Grafana?
Well, the Calico eBPF data plane is production ready and widely deployed, so a well-configured Kubernetes cluster with the Calico eBPF data plane correctly enabled will be stable and reliable. However, distributed systems are inherently complex and when dealing with them, it is generally good practice to instrument and baseline metrics wherever they are available. Doing so provides many benefits, especially for capacity planning, change management, and as an early-warning or smoke-testing system.
Additionally, seeing a running distributed system fully instrumented can be Continue reading
The Full Stack Journey is back for 2022, and kicking off the year Scott shares recommendations for learning new technologies based on his own career experiences and the technology transitions he's lived through, including virtualization to networking and networking to containers. Scott also shares four key takeaways for learners in the tech industry.
The post Full Stack Journey 062: Advice And Recommendations For Tech Learners appeared first on Packet Pushers.
This article was originally posted on the Packet Pushers Ignition site on June 15, 2021. There’s a growing need at the provider edge to let customers provision services closer to users and data sources. What do I mean by the ‘provider edge’? In the case of application infrastructure with low-latency connectivity for mobile, industrial, and […]
The post VaporIO Brings Infrastructure, Networking On-Demand For Dynamic Edge Services, And VMware Is Interested appeared first on Packet Pushers.
One of ipSpace.net subscribers asked for my opinion about Adaptive IP, a concept promoted by one of the optical connectivity vendors. As he put it:
My interest in Carrier Ethernet moving up to Layer 3 is to see if it would be something to account for in the future.
A quick search resulted in a marketecture using Segment Routing (of course) and an SDN controller (what else could one be using today) using Path Computation Element Protocol (PCEP) to program the network devices… and then I hit a regwall. They wanted to collect my personal details to grace me with their whitepaper, and I couldn’t find even a link to the product documentation.
On today’s Tech Bytes podcast we’re talking security clouds; that is, cloud services that offer capabilities including firewalls, traffic inspection, Web gateways, and more. We explore why these clouds aren’t all the same, and why the architecture, including networking, makes a difference. Netskope is this episode's sponsor.
The post Tech Bytes: Why Network Design Matters For Security Clouds (Sponsored) appeared first on Packet Pushers.
This week on Network Break we discuss why Salesforce is requiring multi-factor authentication from customers starting in February 2022, examine an SFP module that comes with a tiny computer running Linux, highlight the vast gap between cloud hype and cloud spending compared to traditional IT gear, and cover more IT news.
The post Network Break 365: Salesforce Forces Multi-Factor Authentication; FAA Implements 5G Buffer Zones appeared first on Packet Pushers.
We’re excited to announce that customers using our Free plan can now get real-time alerts about HTTP DDoS attacks that were automatically detected and mitigated by Cloudflare. The real-time DDoS alerts were originally announced over a year ago but were made available to customers on the Pro plan or higher. This announcement extends the DDoS alerts feature to Free plan users. You can read the original announcement blog post here.
A Distributed Denial of Service (DDoS) attack is a cyber-attack that attempts to disrupt your online business. Whether your business relies on VoIP servers, UDP-based gaming servers, or HTTP servers, DDoS attacks can be used to disrupt any type of Internet property, server, or network.
In this blog post, we’ll focus on DDoS attacks that target HTTP servers. Whether your HTTP server is powering a mobile app, an eCommerce website, an API gateway, or any other HTTP application, if an attacker sends you more requests than it can handle, your server won't be able to serve your real users. A flood of requests can cause service disruptions or even take your entire server offline. DDoS attacks can have real-world consequences such as a blow to Continue reading