Archive

Category Archives for "Networking"

Creating serendipity with Python

Creating serendipity with Python

We've been experimenting with breaking up employees into random groups (of size 4) and setting up video hangouts between them. We're doing this to replace the serendipitous meetings that sometimes occur around coffee machines, in lunch lines or while waiting for the printer. And also, we just want people to get to know each other.

Which lead to me writing some code. The core of which is divide n elements into groups of at least size g minimizing the size of each group. So, suppose an office has 15 employees in it then it would be divided into three groups of sizes 5, 5, 5; if an office had 16 employees it would be 4, 4, 4, 4; if it had 17 employees it would be 4, 4, 4, 5 and so on.

I initially wrote the following code (in Python):

    groups = [g] * (n//g)

    for e in range(0, n % g):
        groups[e % len(groups)] += 1

The first line creates n//g (// is integer division) entries of size g (for example, if g == 4 and n == 17 then groups == [4, 4, 4, 4]). The for loop deals with the 'left over' parts that Continue reading

Does Unequal-Cost Multipathing Make Sense?

Every now and then I’m getting questions along the lines “why doesn’t X support unequal-cost multipathing (UCMP)?” for X in [ OSPF, BGP, IS-IS ].

To set the record straight: BGP does support some rudimentary form of unequal-cost multipathing with the DMZ Bandwidth community, but it only works across multiple egress points from a single autonomous system. Follow-up nerd knobs described how to use the same community over EBGP sessions; not sure whether anyone implemented that part (comments welcome).

Does Unequal-Cost Multipathing Make Sense?

Every now and then I’m getting questions along the lines “why doesn’t X support unequal-cost multipathing (UCMP)?” for X in [ OSPF, BGP, IS-IS ].

To set the record straight: BGP does support some rudimentary form of unequal-cost multipathing with the DMZ Bandwidth community, but it only works across multiple egress points from a single autonomous system. Follow-up nerd knobs described how to use the same community over EBGP sessions; not sure whether anyone implemented that part (comments welcome).

DeepLearning – Intro Fun

I am enjoying insights into deep learning and computer vision and how machine learning is applied on images. While Deep Learning and Nueral networks are subjects for experts in field, I wanted simply to be an end user to do some experiments on my dog and nothing more. I have to mention that I had internal resources to get training on image augmentation techniques, DLL Nueral network frameworks pretrained to be used readily but am still trying to find some way into what this technology is all about and how to implement in my AWS Deeplens.

https://pytorch.org/assets/deep-learning/Deep-Learning-with-PyTorch.pdf

This is a good book to get introduced into pytorch and deep learning terminology. There is a very interesting examples of doing image manipulation of a horse to zebra, and how you can transfer that learning to anything.

Below is how I used on my Dog and results, I had fun starting this and hope you will have fun too, you dont need any great programming or math to just access some of the Neural networks and do some analysis

Normal Image

I wrote this post to let anyone interested to know that I dint had to write any complicated coding Continue reading

Cisco issues 3 critical warnings around ACI, NS-OX security holes

Cisco has issued three security advisories rated “critical” for some of its high-end software systems—two aimed at its Application Services Engine (ASE) implementation and one at the NX-OS operating system.The most concerning warning came for Cisco Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) installed with the ASE which was rated a worse-case scenario, 10 out of a possible 10 on the Common Vulnerability Scoring System (CVSS).  The ACI Multi-Site Orchestrator lets customers control application-access policies across Cisco Application Policy Infrastructure Controller-based fabrics.To read this article in full, please click here

Cisco issues 3 critical warnings around ACI, NS-OX security holes

Cisco has issued three security advisories rated “critical” for some of its high-end software systems—two aimed at its Application Services Engine (ASE) implementation and one at the NX-OS operating system.The most concerning warning came for Cisco Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) installed with the ASE which was rated a worse-case scenario, 10 out of a possible 10 on the Common Vulnerability Scoring System (CVSS).  The ACI Multi-Site Orchestrator lets customers control application-access policies across Cisco Application Policy Infrastructure Controller-based fabrics.To read this article in full, please click here

Tech Bytes: Monitoring Remote Access VPN Performance With ThousandEyes (Sponsored)

On today's Tech Bytes podcast, we talk with sponsor ThousandEyes about monitoring remote access VPNs to get a clearer picture of connectivity and performance issues and to speed troubleshooting. Our guest is Alex Cruz Farmer, Principal Product Manager at ThousandEyes.

The post Tech Bytes: Monitoring Remote Access VPN Performance With ThousandEyes (Sponsored) appeared first on Packet Pushers.

The Hedge #72: Lisa Caywood and Marketectures

The open source world is not much different than the commercial world in terms of building marketectures rather than useable software—largely because open source projects still rely on sources of funding and material support to build and maintain a product. Many times, however, the focus on these marketectures get in the way of real work. Join Tom Ammon, Russ White, and Lisa Caywood as we discuss the problem of marketectures and the broader world of open source software.

download

Juniper extends AI platform to acquired SD-WAN technology, unveils secure access switch

Juniper Networks continues to integrate and expand its portfolio of cloud-based, AI-driven services that are aimed at helping customers manage and control enterprise networks. At the core of those services is technology Juniper gained in its acquisition of wireless and AI software maker Mist in 2019 for $405 million. Mist's technology includes an AI-based engine called Marvis that uses machine learning to automatically identify, adapt to, and fix network issues.  Read more: Juniper's big push: AI in all areas of enterprise networkingTo read this article in full, please click here

Natural Remedies For Dry Mouth When Public Speaking

Are you suffering from dry mouth? Well, anyone would be worried. But, you do not need to worry anymore. The good news is that there are some extremely handy natural and home remedies that will help you overcome the problem. Just follow the remedies and you will be able to get over the condition in no time. Want to know more about these remedies? Keep reading then. You will find everything that you need to know about dry mouth and natural remedies for it below.

Drink A Lot Of Water

The most common cause of dry mouth is dehydration. When your body does not get enough water, it tries to send you the message in its own ways. Dry mouth is also one of the ways in which your body might try to send you the message that it is not getting enough water intake. So, if you are facing this condition lately, then you should definitely increase the amount of water that you are taking daily. 

Suck On Sugarless Candies

The next thing that you can do to cure the condition is to suck on sugarless candies. Although this is not the permanent solution to the problem, it Continue reading

Introducing HCX 4.0: Migration Event Details and Estimation, In-Service Upgrades, and more

VMware HCX is indeed a swiss army knife — a mobility platform with several options to streamline and optimize workload migrations between on-premises and VMC-based environments. HCX delivers secure, seamless app mobility and infrastructure hybridity across vSphere 6.0 and later versions, both on-premises and in the cloud. Thousands of customers worldwide use HCX for faster, safer, and large-scale migrations, cost-savings, and efficient operations. 

Today, we are excited to announce an important milestone in this journey — HCX 4.0, a major release that introduces new functionality and enhancements. This release focuses on providing enhanced visibility, reducing service downtime during upgrades, and simplifying the reconfiguration of NSX security policies post-migration.  

Let’s take a look at some of the new capabilities in HCX 4.0: 

New Release Versioning and Lifecycle Policies 

Starting with the HCX 4.0.0 release, HCX is switching its naming convention from ‘R’ releases to Major.Minor.Maintenance semantic versioning to align with VMware convention. VMware HCX will now use X.Y.Z.P where: 

  • X is a major version. 
  • Y is a minor version. 
  • Z is a maintenance version. 
  • P is a patch version. This is a unique bit that uses the build number.  

Please also note that the  VMware N-2 Lifecycle Policy will be applicable with the new convention, providing extended support and additional flexibility to customers. 

Each Major or Minor release will have a minimum support duration of 12 months (*).   
Refer Continue reading

Day Two Cloud 086: AWS Succession – Does It Matter Who’s The Next CEO?

AWS needs a new CEO now that Andy Jassy has been tapped to run the Amazon mothership. Does the cloud giant need a high-powered, Type-A successor to drive AWS's growth, or is it now so dominant that a ham sandwich could run the company? That's the topic for discussion on today's Day Two Cloud podcast.

The post Day Two Cloud 086: AWS Succession – Does It Matter Who’s The Next CEO? appeared first on Packet Pushers.