Archive

Category Archives for "Networking"

Canada bans Huawei, ZTE in 5G networks

Canada is the latest country to ban Huawei and ZTE equipment from use in the telecommunications field generally and 5G networks in particular, as the government's announcement this week detailed its intention to introduce a broad, new telecom security framework.Canadian telecom companies are to be barred officially from buying new Huawei or ZTE equipment as of September of this year, according to the government's policy statement Thursday. Canada will also mandate the removal of all Huawei and ZTE gear from 5G networks by June 28, 2024, as well as the removal of all those companies' 4G/LTE equipment by the end of 2027.This means that, like the US, Canada's move to ban certain Chinese networking gear extends to equipment already in use, so that telecom companies that have bought such gear will need to replace it. It's unclear from the announcement whether Canada will follow the US' lead in providing financial assistance to companies working to rid their networks of banned equipment, although the statement did say that the government plans to "engage with industry" in order to make sure that logistical considerations for gear replacement are taken into account.To read this article in full, please click here

Heavy Networking 631: Saying No

On today's Heavy Networking we talk about why it's important to say "No" when someone tries to put more work on you than you can handle. Guest Tom Hollingsworth wrote a controversial blog post entitled “No Is A Complete Sentence” about how to say "No," to even when it's hard to do. We talk about the nuances of this stance, the risks you take when you do, time management, balancing workloads, and more.

The post Heavy Networking 631: Saying No appeared first on Packet Pushers.

Heavy Networking 631: Saying No

On today's Heavy Networking we talk about why it's important to say "No" when someone tries to put more work on you than you can handle. Guest Tom Hollingsworth wrote a controversial blog post entitled “No Is A Complete Sentence” about how to say "No," to even when it's hard to do. We talk about the nuances of this stance, the risks you take when you do, time management, balancing workloads, and more.

Intel to build $700M sustainability-focused R&D lab

Intel has announced its intention to invest $700 million in a new research and development lab focused on developing sustainable data center technologies, such as immersion cooling, water usage effectiveness, and heat recapture and reuse.The 200,000-square-foot lab will be located at Intel’s Jones Farm campus in Hillsboro, Oregon. Construction will begin this year, with an estimated opening date of late 2023. To read this article in full, please click here

Intel to build $700M sustainability-focused R&D lab

Intel has announced its intention to invest $700 million in a new research and development lab focused on developing sustainable data center technologies, such as immersion cooling, water usage effectiveness, and heat recapture and reuse.The 200,000-square-foot lab will be located at Intel’s Jones Farm campus in Hillsboro, Oregon. Construction will begin this year, with an estimated opening date of late 2023. To read this article in full, please click here

What is Nmap and why do you need it on your network?

Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, are judged.Nmap has maintained its preeminence because of the large community of developers and coders who help to maintain and update it. The Nmap community reports that the tool, which anyone can get for free, is downloaded several thousand times every week.To read this article in full, please click here

What is Nmap and why do you need it on your network?

Nmap, short for Network Mapper, is a free and open source tool used for vulnerability checking, port scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the gold standard against which all other similar tools, either commercial or open source, are judged.Nmap has maintained its preeminence because of the large community of developers and coders who help to maintain and update it. The Nmap community reports that the tool, which anyone can get for free, is downloaded several thousand times every week.To read this article in full, please click here

Wendy Komadina: No one excited me more than Cloudflare, so I joined.

Wendy Komadina:
No one excited me more than Cloudflare, so I joined.
Wendy Komadina:
No one excited me more than Cloudflare, so I joined.

I joined Cloudflare in March to lead Partnerships & Alliances for Asia Pacific, Japan, and China (APJC). In the last month I’ve been asked many times: “Why Cloudflare?” I’ll be honest, I’ve had opportunities to join other technology companies, but no other organization excited me more than Cloudflare. So I jumped. And I couldn’t be more thrilled for the opportunity to build a strong partner ecosystem for APJC.

Wendy Komadina:
No one excited me more than Cloudflare, so I joined.

When I considered joining Cloudflare, I recall consistently reading the message around “Helping to Build a Better Internet”. At first those words didn’t connect with me, but they sounded like an important mission.

I did my research and read analyst reports to learn about Cloudflare's market position, and then it dawned on me, Cloudflare is leading a transformation. Taking traditional on-premise networking and security hardware and building a transformational cloud-based solution, so customers don’t need to worry about which company supplied their kit. I was excited to learn that Cloudflare customers can simply access the vast global network that has been designed to make everything that customers connect to on the Internet secure, private, fast, and reliable. So hasn’t this been done before? For compute and storage that transformation is almost Continue reading

The Dangers of 5G Technology for Airplanes

The next generation of wireless technology, 5G, is set to revolutionize the way we live and work. 5G works by using higher frequency signals than previous generations of wireless technology. These higher frequency signals are more easily absorbed by obstacles like buildings and trees, which can cause interference. 

What is 5G technology and how does it work

5G uses a higher frequency of radio waves than previous generations of wireless technology. This means that 5G can carry more data and achieve higher speeds than 4G. However, it also means that 5G signals don’t travel as far as 4G signals and are more easily blocked by obstacles like walls and trees.

To overcome this challenge, 5G networks use a process called beamforming. Beamforming involves using multiple antennas to focus the signal in a specific direction. This allows the signal to travel further and Penetrate obstacles more easily. As a result, beamforming is a key technology that makes 5G possible.

In addition to beamforming, 5G networks also rely on a process called massive MIMO (multiple-input, multiple-output). Massive MIMO involves using dozens or even hundreds of antennas to send and receive data. This allows 5G networks to handle large amounts of traffic Continue reading

Monitoring our monitoring: how we validate our Prometheus alert rules

Monitoring our monitoring: how we validate our Prometheus alert rules

Background

Monitoring our monitoring: how we validate our Prometheus alert rules

We use Prometheus as our core monitoring system. We’ve been heavy Prometheus users since 2017 when we migrated off our previous monitoring system which used a customized Nagios setup. Despite growing our infrastructure a lot, adding tons of new products and learning some hard lessons about operating Prometheus at scale, our original architecture of Prometheus (see Monitoring Cloudflare's Planet-Scale Edge Network with Prometheus for an in depth walk through) remains virtually unchanged, proving that Prometheus is a solid foundation for building observability into your services.

One of the key responsibilities of Prometheus is to alert us when something goes wrong and in this blog post we’ll talk about how we make those alerts more reliable - and we’ll introduce an open source tool we’ve developed to help us with that, and share how you can use it too. If you’re not familiar with Prometheus you might want to start by watching this video to better understand the topic we’ll be covering here.

Prometheus works by collecting metrics from our services and storing those metrics inside its database, called TSDB. We can then query these metrics using Prometheus query language called PromQL using ad-hoc queries (for example to power Grafana Continue reading

IPv6 Buzz 101: Innovating With IPv6

In this episode of IPv6 Buzz, Ed, Scott, and Tom talk about innovation using IPv6. The limitless supply of addresses creates new opportunities for network engineers and application developers, including flat networks with many more nodes, robust segmentation options, supporting overlays, and more.

Mitigating controls for cloud-native applications: Why you need them and how Calico Cloud can help

Fixing vulnerabilities can be hard—especially so for cloud-native applications. Let’s take a deeper look at why this is, and how mitigating controls can help secure your cloud-native applications.

Vulnerabilities are like earthquakes—its best to be prepared

The trials and tribulations of Log4j are now safely in our rearview mirror. Most of us responsible for operating a container platform like Kubernetes have navigated through the remediation efforts and disaster has been averted.

But it was a wake-up call for many, and at the very least a healthy reminder for all of us. There have been many infamous vulnerabilities before Log4j, and much like living in an area of the world where earthquakes can strike at any moment, much can be learned from the big ones that came before.

When Heartbleed was publicly disclosed in 2014 it sent shockwaves around the world. It was a critical vulnerability in the ubiquitous OpenSSL library—a cryptographic software library that is used to implement the Transport Layer Security (TLS) protocol. Most of the web relies on TLS to secure communication between clients and servers, and the vulnerability came about through a simple bug that resulted in improper input validation for heartbeats.

The bug existed in OpenSSL Continue reading

Addressing the Challenges of Real-Time Data Sharing

While conventional data warehouses and data lakes have become common practice for analytics workloads, they don’t solve the broader enterprise problems of sharing real-time operational data among departments or across companies. This three-part series explores the challenges and solutions that arise when integrating business data across different applications, clouds and organizations in a modern IT stack. Part 1 highlights the challenges of real-time data sharing, discusses operational vs. analytical data, and legacy solutions and their limitations. Part 2 defines the real-time data mesh and discusses the key tenets for incorporating them into modern IT stacks. Part 3 focuses on what’s needed to effectively evaluate real-time data-sharing solutions. Canyon Spanning — The Foundational IT Challenge Tim Wagner Tim is the inventor of AWS Lambda and a former general manager of AWS Lambda and Amazon API Gateway services. He has also served as vice president of engineering at Coinbase, where he managed design, security and product management teams. Tim co-founded Vendia to help organizations of all sizes share data more effectively across clouds and companies, and he serves as its CEO. One of the most enduring and foundational challenges for IT professionals regardless of their organization’s size or industry is getting data Continue reading

Eurovision 2022, the Internet effect version

Eurovision 2022, the Internet effect version
Eurovision 2022, the Internet effect version

There’s only one song contest that is more than six decades old and not only presents many new songs (ABBA, Celine Dion, Julio Iglesias and Domenico Modugno shined there), but also has a global stage that involves 40 countries — performers represent those countries and the public votes. The 66th edition of the Eurovision Song Contest, in Turin, Italy, had two semi-finals (May 10 and 12) and a final (May 14), all of them with highlights, including Ukraine’s victory. The Internet was impacted in more than one way, from whole countries to the fan and official broadcasters sites, but also video platforms.

On our Eurovision dedicated page, it was possible to see the level of Internet traffic in the 40 participant countries, and we tweeted some highlights during the final.

First, some technicalities. The baseline for the values we use in the following charts Continue reading