Arista is trusted and powers the world’s largest data centers and cloud providers based on the quality, support and performance of its products. The experience gained from working with over 7000 customers has helped redefine software defined networking and many of our customers have asked us how we plan to address security. To us, security must be a holistic and inherent part of the network. Our customers have been subjected to the fatigue of point products, reactive solutions, proprietary vendor lock-ins and most of all, operational silos created between CloudOps, NetOps, DevOps and SecOps. By leveraging cloud principles, Arista’s cloud network architectures bring disparate operations together to secure all digital assets across client to IoT, campus, data center and cloud protecting them from threats, thefts and compromises.
Arista is trusted and powers the world’s largest data centers and cloud providers based on the quality, support and performance of its products. The experience gained from working with over 7000 customers has helped redefine software defined networking and many of our customers have asked us how we plan to address security. To us, security must be a holistic and inherent part of the network. Our customers have been subjected to the fatigue of point products, reactive solutions, proprietary vendor lock-ins and most of all, operational silos created between CloudOps, NetOps, DevOps and SecOps. By leveraging cloud principles, Arista’s cloud network architectures bring disparate operations together to secure all digital assets across client to IoT, campus, data center and cloud protecting them from threats, thefts and compromises.
In this episode we (Brandon, Phil, and Vince) introduce ourselves and share what drives our passion for network visibility and performance. While we are all from Riverbed, this is not your typical vendor podcast. We have a lot planned to discuss around why visibility is a key that networks must focus on today. We talk about cloud and what that overused blanket term really means to us, and how migrations to the cloud are a key time to ensure that we have visibility into apps that have been forgotten, where our data is, what’s leaving the cloud, and what the performance looks like, before, during, and after. We touch on Security, AI/ML, and performance as well, as we setup shop and plan to discuss these areas in further detail.
Reference Links:
The post Introduction To The Riverbed Technical Podcast appeared first on Network Collective.
Minh Ha left the following rant as a comment on my 5-year-old What Are The Problems with Broadcom Tomahawk? blog post. It’s too good to be left gathering dust there. Counterarguments and other perspectives are highly welcome.
So basically a lot of vendors these days are just glorified Broadcom resellers :p. It’s funny how some of them try to up themselves by saying they differentiate their offerings with their Network OS.
Minh Ha left the following rant as a comment on my 5-year-old What Are The Problems with Broadcom Tomahawk? blog post. It’s too good to be left gathering dust there. Counterarguments and other perspectives are highly welcome.
So basically a lot of vendors these days are just glorified Broadcom resellers :p. It’s funny how some of them try to up themselves by saying they differentiate their offerings with their Network OS.
Kubernetes provides abstraction and simplicity with a declarative model to program complex deployments. However, this abstraction and simplicity create complexity when debugging microservices in this abstract layer. The following four vectors make it challenging to troubleshoot microservices.
Today, DevOps and SRE teams must stitch together an enormous amount of data from multiple, disparate systems that monitor infrastructure and services layers in order to troubleshoot Kubernetes microservices issues. Not only is it overwhelming to stitch this data, but troubleshooting using Continue reading
Amazon Alexa wants me to know that they celebrate International Data Privacy Day. I’m awestruck at the chutzpah of this claim.
Reviews of a Samsung smart television I’m considering express frustration at the crapware loaded onto the system because it is difficult to navigate and tracks viewing habits.
An app I need for my Mac immediately requests access to my Documents and Downloads folders for no obvious reason. Denying the request has no impact on the functioning of the app.
A phone app I use to help me track strength exercises wants me to share my data with the Health app. It won’t stop asking me about it, even though I’ve repeatedly denied the request. Why? It’s not just for my own well-being, I’m certain.
Garmin shares my workout data, all highly personal containing health & location information, with various third parties, and there’s no way to opt out if you want to use their hardware.
Twitter delivers customized ads, even though I had at one time opted out, at a rate of 1 in 3 or 1 in 4 tweets to my timeline.
Facebook rages against Apple for daring to require that apps hosted in the Apple store contain Continue reading
Day Two Cloud podcast co-host Ned Bellavance asks Envoy creator Matt Klein about the insane rate of change in cloud tech, running plain old VMs, and growing hay. Matt’s not a fan of change for the sake of change. Hear this entire discussion on Episode 82 of the Day Two Cloud podcast published January 27, […]
The post New Software Yields New Bugs – Video appeared first on Packet Pushers.
Today’s Tech Bytes dives into the Aruba Fabric Composer. This is data center software that can automate the provisioning of your network underlay and overlay, plus capabilities for orchestration, visibility, and troubleshooting. Aruba Networks is our sponsor. We're joined by Simon McCormack, Senior Manager, Product Management, at Aruba Networks.
The post Tech Bytes: Aruba Fabric Composer Automates And Orchestrates Leaf-Spine Network Provisioning (Sponsored) appeared first on Packet Pushers.
Everyone uses BGP for DC underlays now because … well, just because everyone does. After all, there’s an RFC explaining the idea, every tool in the world supports BGP for the underlay, and every vendor out there recommends some form of BGP in their design documents.
I’m going to swim against the current for the moment and spend a couple of weeks here discussing the case against BGP as a DC underlay protocol. I’m not the only one swimming against this particular current, of course—there are at least three proposals in the IETF (more, if you count things that will probably never be deployed) proposing link-state alternatives to BGP. If BGP is so ideal for DC fabric underlays, then why are so many smart people (at least they seem to be smart) working on finding another solution?
But before I get into my reasoning, it’s probably best to define a few things.
In a properly design data center, there are at least three control planes. The first of these I’ll call the application overlay. This control plane generally runs host-to-host, providing routing between applications, containers, or virtual machines. Kubernetes networking would be an example of an application overlay control plane.
Disinformation bots: Apple CEO Tim Cook raised concerns about social media algorithms promoting disinformation during a speech at an international privacy conference, ZDNet reports. “At a moment of rampant disinformation and conspiracy theories juiced by algorithms, we can no longer turn a blind eye to a theory of technology that says all engagement is good engagement – the longer the better – and all with the goal of collecting as much data as possible,” he said.
Gaming the stock market: In a rebellion against large Wall Street short sellers, a group of individual investors centered around a Reddit forum have been driving up the price of GameStop stock, even as the company faces questions about its long-term viability. One founder of the Reddit community called the effort “a train wreck happening in real time,” CNet reports. GameStop’s stock has shot up by more than 2700 percent since the beginning of the year, even as the bricks-and-mortar game software vendor is facing business challenges.
The power of Big Tech: The head of Saudi Arabia’s sovereign wealth fund is raising concerns about the huge influence of large tech firms, Arabian Business says. The fund is worried about “how some of these technology Continue reading
Today's Network Break explores new Catalyst hardware and micro switches from Cisco, a new security offering from Fortinet that combines endpoint security with cloud analytics, an Internet sleuth tracking IPv4 shenanigans, financial results from Juniper and F5, and a whopping big investment for routing startup DriveNets.
The post Network Break 318: Cisco Unveils New Catalyst Hardware; Internet Sleuth Uncovers Global IPv4 Misuse appeared first on Packet Pushers.