This week's podcast asks how many Data Processing Units (DPUs) the market can support, discusses a startup that wants to manage your multi-vendor campus network from the cloud, explores new security capabilities in Forward Networks' network verification software, and more tech news.
The post Network Break 340: Marvell Challenges NVIDIA With 5nm DPU; Startup WiteSand Tackles Multi-Vendor Campus Network Management appeared first on Packet Pushers.
Calico was designed from the ground up with a pluggable data plane architecture. The Enterprise 3.6 release introduces an exciting new eBPF (extended Berkeley Packet Filter) data plane that provides multiple benefits to users.
When compared with the standard Linux data plane (based on iptables), the eBPF data plane:


The application of network address translation (NAT) by kube-proxy to incoming network connections to Kubernetes services (e.g. via a service node port) is a frequently encountered friction point with Kubernetes networking. NAT has the unfortunate side effect of removing the original client source IP address from incoming traffic. When this occurs, Kubernetes network policies can’t restrict incoming traffic from specific external clients. By the time the traffic reaches the pod it no longer has the original client IP address. For some applications, knowing the Continue reading
NFA v 21.06 has just been released. The new version comes with configurable Percentile Reporting, BGP Localpref & BGP MED filtering in
The post Noction Flow Analyzer v21.06: you asked, we listened. appeared first on Noction.
PowerShell can be used to codify Microsoft Windows environments. This post covers the basics of getting started with PowerShell. Software The following software was used in this post. Windows - 10 PowerShell - 5.1.19041.1023 Cmdlets Get a list of cmdlets Getting Help Get help for a...continue reading

Less protection for kids: The U.K.’s Department of Digital, Media, Culture and Sport has recommended that children’s accounts on social media platforms and messaging services should not use end-to-end encryption, TechCrunch reports. In the effort to protect kids against online predators, cyber bullying and other bad stuff, the agency says children shouldn’t be protected against cybercrime, […]
The post The Week in Internet News: U.K. Government says ‘No Encryption for Kids’ appeared first on Internet Society.
You’re standing in front of three doors. Door number one is big, tall, and sturdy. Nothing fancy, but seemingly safe. Door number two has more bells and whistles, fancy engravings, and twice the number of locks. Elevated security for sure, but you suspect more form over function, so you’re not entirely sold. Door number three features a winning combination of practicality and advanced locks. This one has to be the best choice, right?
You can’t see behind any door, so your choice is limited to inference. That’s frustrating. Today, choosing the right security solution for your business is no different. Bells and whistles can distract us from our core objective of ultimate, unwavering security. And old reliable doesn’t seem capable of repelling an onslaught of modern threats and distributed exposures.
Organizations need to make the right network security choice to successfully secure their networks in a highly dynamic, distributed world where it’s not a matter of if intruders will get in, but when. Turns out, the right approach is as much about philosophy as it is about technology: trust no one. But, before we get into the relationship between trust and better security, let’s begin with a review of how Continue reading

We’re halfway through 2021 and it’s been going better than last year. Technology seems to be rebounding and we’re seeing companies trying to find ways to get employees to come back into the office. Of course, that is being met head on by the desire to not go back at all and continue to do the job from home that has been done over the past year. Something is going to have to give and I don’t know what that might be.
Today's Heavy Networking, sponsored by Intel, dives into 5G, virtualization, and AI. Intel's 3rd Gen Xeon processors can support a variety of use cases, including running virtualized network functions in the data center, at the edge, and in the cloud. They also have built-in acceleration for AI and cryptography, giving organizations a flexible platform for a variety of workloads, including service providers building out 5G networks. Our guest is Cristina Rodriguez, Vice President Data Center Group General Manager Wireless Access Network Division at Intel.
The post Heavy Networking 586: Virtualizing And Accelerating 5G RAN With 3rd Gen Intel® Xeon (Sponsored) appeared first on Packet Pushers.