Archive

Category Archives for "Networking"

Cisco to buy Epsagon for application, microservice management

Cisco is looking to bolster its enterprise application management suite by buying cloud-based application-performance firm Epsagon for $500M.Founded in 2017, the Israel-based Epsagon develops cloud-based application monitoring software focused on scrutinizing cloud microservices and applications.The benefits of converged network and application performance management Businesses are adopting cloud-native technologies, microservices, and containerized components on a large scale while leveraging an extensive web of traditional components, third-party services and application programming interfaces, wrote Liz Centoni, Cisco’s chief strategy officer and general manager, applications, in a blog about the acquisition.   To read this article in full, please click here

Heavy Networking 593: Network Observability With VMware vRealize Network Insight (Sponsored)

On today’s Heavy Networking, we drill into VMware’s vRealize Network Insight (vRNI) to learn how it provides end-to-end monitoring, how it uses flow records and other data sources, and its architecture. We’ll also discuss modeling/digital twin capabilities, and applying vRNI to security, troubleshooting, and other use cases. VMware is our sponsor.

The post Heavy Networking 593: Network Observability With VMware vRealize Network Insight (Sponsored) appeared first on Packet Pushers.

Heavy Networking 593: Network Observability With VMware vRealize Network Insight (Sponsored)

On today’s Heavy Networking, we drill into VMware’s vRealize Network Insight (vRNI) to learn how it provides end-to-end monitoring, how it uses flow records and other data sources, and its architecture. We’ll also discuss modeling/digital twin capabilities, and applying vRNI to security, troubleshooting, and other use cases. VMware is our sponsor.

Slow and Steady and Complete

StepTiles

I was saddened to learn last week that one of my former coworkers passed away unexpectedly. Duane Mersman started at the same time I did at United Systems and we both spent most of our time in the engineering area working on projects. We worked together on so many things that I honestly couldn’t keep count of them if I tried. He’s going to be missed by so many people.

A Hare’s Breadth

Duane was, in many ways, my polar opposite at work. I was the hard-charging young buck that wanted to learn everything there was to know about stuff in about a week and just get my hands dirty trying to break it and learn from my mistakes. If you needed someone to install a phone system next week with zero formal training or learn how iSCSI was supposed to operate based on notes sketched on the back of a cocktail napkin I was your nerd. That meant we could often get things running quickly. It also meant I spent a lot of time trying to figure out why things weren’t working. I left quite a few forehead-shaped dents in data center walls.

Duane was not any of those Continue reading

Cloudflare Developer Summer Challenge

Cloudflare Developer Summer Challenge
Cloudflare Developer Summer Challenge

There are a lot of experiences we have all grown to miss over the last year and a half. After hearing from our community, two of the top experiences they miss are collaborating with peers, and getting Cloudflare swag. Perhaps even in the reverse order! In-person events like conferences were once a key channel to satisfy both these interests, however today’s remote world makes that much harder. But does it have to?

Today, we are excited to introduce the Cloudflare Developer Summer Challenge. We will be rewarding 300 participants with boxes of our most popular swag, while enabling collaboration with other participants through our Workers Discord channel.

To participate, you have to build a project that uses Cloudflare Workers and at least one other product in our rapidly expanding developer platform. We will judge submissions and award swag boxes to those with the most innovative projects, limited to one box per person. The Challenge will be open for submissions between today, and closing November 1, 2021. See a full list of terms and conditions here.

Cloudflare Developer Summer Challenge

What are the details?

Cloudflare’s developer platform offers all the building blocks to create end-to-end applications with products across compute, storage, and frontend services. To Continue reading

Building the Cloudflare Summer Challenge Application

Building the Cloudflare Summer Challenge Application
Building the Cloudflare Summer Challenge Application

If you haven’t already heard, we’re hosting the Cloudflare Summer Developer Challenge, a contest for the Cloudflare community at large. Anybody – yes, including you – can sign up for free and compete for a chance to win one of 300 available prizes. To submit you need to use  at least two products from the Cloudflare developer platform — which makes this contest a great opportunity to give them a try if you haven’t already! The top 300 submissions will receive a box of our most popular swag, so you should give it a go!

Coincidentally, the Cloudflare Summer Developer Challenge’s landing page and signup workflow qualifies as a valid project submission (so meta), so if you’re looking for some inspiration, this walkthrough will shed some light on how it was built.

Overview

At its core, the application is a series of static HTML pages, most of which have a form to submit, with a backend API to handle those submissions, and a storage layer to persist the data. In a Cloudflare lens, this would point towards using Pages, a Worker, and Workers KV. And while this should be the preferred stack for a project like this, truthfully, this Continue reading

Private 5G as a service is now a thing

A private 5G platform designed to offer the latest-generation licensed wireless technology to enterprise users as a service was announced today by Japanese telecom giant NTT.The company said its private 5G-as-a-service platform, which it calls P5G, would use CBRS and other licensed spectrum in the U.S. to provide businesses with their own 5G networks. The company said also that its platform is highly flexible, working with a wide variety of software standards and networking partners to ensure availability around the country.To read this article in full, please click here

Atos reportedly trying to dump on-prem consulting business

Just months after it was considering buying DXC Technology, Atos is reportedly looking to sell some of its legacy business operations, including its data-center and communications businesses. If true, it’s a further sign that the on-prem consulting business is falling out of favor.Bloomberg reported on Tuesday that Atos is exploring a sale of its legacy information technology business, including some outsourcing operations. One day later, Atos CEO Elie Girard said during its earnings call with analysts that the company is definitely looking to make some kind of changes to its businesses.To read this article in full, please click here

Atos reportedly trying to dump on-prem consulting business

Just months after it was considering buying DXC Technology, Atos is reportedly looking to sell some of its legacy business operations, including its data-center and communications businesses. If true, it’s a further sign that the on-prem consulting business is falling out of favor.Bloomberg reported on Tuesday that Atos is exploring a sale of its legacy information technology business, including some outsourcing operations. One day later, Atos CEO Elie Girard said during its earnings call with analysts that the company is definitely looking to make some kind of changes to its businesses.To read this article in full, please click here

Juniper touts cloud-ready data center, AI, automation

Enterprise networks are focused on buying full-stack offerings that include key software components such as management, automation and AI but also routing, switching and security rather than a piecemeal approach.That trend is being driven by a post-COVID rethinking of network architecture but also the need to simplify the network and access to cloud resources, says  Juniper Networks’ executive vice president and chief product officer Manoj Leelanivas. SD-WAN buyers guide: Key questions to ask vendors Juniper Networks Manoj LeelanivasTo read this article in full, please click here

What’s New in VMware HCX 4.2

Real-time Estimation of vMotion and Replication Assisted vMotion Migration 

HCX analyzes migration metrics and provides an estimate of the time required to complete the relocation phase of every configured vMotion, as well as the time required to complete the transfer phase of every RAV migration. Foreach virtual machine migration, the estimate is shown in the progress bar displayed on both the Migration Tracking and Migration Management pages while the transfer is underway. 

 The following snapshot shows an estimate of time remaining for the vMotion-based migration to complete. 

Here we see a similar estimate for a RAV (Replication Assisted vMotion) based migration.  

Predictive Estimation of Replication Assisted vMotion (RAV) Migrations 

For RAV migrations in draft state, HCX uses machine learning to generate an estimate of the time required to complete the migration. The estimate is shown in the progress bar displayed on the Migration Management page. Predictive estimationis available for Early Adoption (EA) with both RAV and Bulk migration. 

5The following snapshot shows how the user can get a predictive estimate of the time needed for Replication Assisted vMotion (RAV) to migrate workloads of virtual machines in a Mobility group. 

OS Assisted Migration (OSAM) with HCX for VMware Cloud 

HCX OS Assisted Migrations enable transitions from non-vSphere-based environments to vSphere-based environments. OSAM can now be runin VMware Cloud Continue reading

More devices, fewer CAPTCHAs, happier users

More devices, fewer CAPTCHAs, happier users
More devices, fewer CAPTCHAs, happier users

Earlier this year we announced that we are committed to making online human verification easier for more users, all around the globe. We want to end the endless loops of selecting buses, traffic lights, and convoluted word diagrams. Not just because humanity wastes 500 years per day on solving other people's machine learning problems, but because we are dedicated to making an Internet that is fast, transparent, and private for everyone. CAPTCHAs are not very human-friendly, being hard to solve for even the most dedicated Internet users. They are extremely difficult to solve for people who don’t speak certain languages, and people who are on mobile devices (which is most users!).

Today, we are taking another step in helping to reduce the Internet’s reliance on CAPTCHAs to prove that you are not a robot. We are expanding the reach of our Cryptographic Attestation of Personhood experiment by adding support for a much wider range of devices. This includes biometric authenticators — like Apple's Face ID, Microsoft Hello, and Android Biometric Authentication. This will let you solve challenges in under five seconds with just a touch of your finger or a view of your face -- without sending this private Continue reading

Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware

Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware

A few weeks ago we introduced Cryptographic Attestation of Personhood to replace CAPTCHAs with USB security keys, and today we announced additional support for on-device biometric hardware. While doing that work, it occurred to us that hardware attestation, proving identity or other properties of a user with a piece of hardware, could have many wider applications beyond just CAPTCHA alternatives and user authentication via WebAuthn. Really, why should someone have to have an account to prove they exist, when their own trusted device can do so?

Attestation in the WebAuthn standard lets websites know that your security key is authentic. It was designed to have good privacy properties baked into policies that must be followed by device manufacturers. The information your security key sends to websites is indistinguishable from that of myriad other keys.  Even so, we wanted to do better. If we’re taking attestation out of authentication, then we need to learn only that your security key is authentic — and we’ve designed a new Zero-Knowledge Proof for the browser to do that.

This is part of our work to improve privacy across the Internet. We’ve yet to put this proof of personhood in production, but you can see Continue reading