Archive

Category Archives for "Networking"

The Time for Zero Trust Networking is Now

Arista is trusted and powers the world’s largest data centers and cloud providers based on the quality, support and performance of its products. The experience gained from working with over 7000 customers has helped redefine software defined networking and many of our customers have asked us how we plan to address security. To us, security must be a holistic and inherent part of the network. Our customers have been subjected to the fatigue of point products, reactive solutions, proprietary vendor lock-ins and most of all, operational silos created between CloudOps, NetOps, DevOps and SecOps. By leveraging cloud principles, Arista’s cloud network architectures bring disparate operations together to secure all digital assets across client to IoT, campus, data center and cloud protecting them from threats, thefts and compromises.

The Time for Zero Trust Networking is Now

Arista is trusted and powers the world’s largest data centers and cloud providers based on the quality, support and performance of its products. The experience gained from working with over 7000 customers has helped redefine software defined networking and many of our customers have asked us how we plan to address security. To us, security must be a holistic and inherent part of the network. Our customers have been subjected to the fatigue of point products, reactive solutions, proprietary vendor lock-ins and most of all, operational silos created between CloudOps, NetOps, DevOps and SecOps. By leveraging cloud principles, Arista’s cloud network architectures bring disparate operations together to secure all digital assets across client to IoT, campus, data center and cloud protecting them from threats, thefts and compromises.

Introduction To The Riverbed Technical Podcast

In this episode we (Brandon, Phil, and Vince) introduce ourselves and share what drives our passion for network visibility and performance.  While we are all from Riverbed, this is not your typical vendor podcast.  We have a lot planned to discuss around why visibility is a key that networks must focus on today.  We talk about cloud and what that overused blanket term really means to us, and how migrations to the cloud are a key time to ensure that we have visibility into apps that have been forgotten, where our data is, what’s leaving the cloud, and what the performance looks like, before, during, and after. We touch on Security, AI/ML, and performance as well, as we setup shop and plan to discuss these areas in further detail.

Reference Links:

Brandon Carroll
Host
Phil Gervasi
Host
Vince Berk
Host

The post Introduction To The Riverbed Technical Podcast appeared first on Network Collective.

Dell partners to provide 5G networking, edge solution

Dell Technologies, its VMware subsidiary, and SK Telecom have partnered to provide OneBox MEC, a single-box approach that provides enterprises with an integrated, private-5G and edge-computing platform. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Consulting giant Deloitte believes private 5G networks will become the preferred choice of networks for many of the world’s largest businesses, especially for industrial environments such as manufacturing plants, logistics centers, and ports.To read this article in full, please click here

Dell partners to provide 5G networking, edge solution

Dell Technologies, its VMware subsidiary, and SK Telecom have partnered to provide OneBox MEC, a single-box approach that provides enterprises with an integrated, private-5G and edge-computing platform. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Consulting giant Deloitte believes private 5G networks will become the preferred choice of networks for many of the world’s largest businesses, especially for industrial environments such as manufacturing plants, logistics centers, and ports.To read this article in full, please click here

Factorials and unscrambling words with bash on Linux

In this post, we examine a bash script that takes a string of letters, rearranges them in every possible way and checks each permutation to identify those that are English words. In the process, we'll take a close look at the script and calculate how hard it might have to work.Note that, in the algorithm used, each letter arrangement must use all of the letters in the string provided. Words formed by substrings are not considered.How to loop forever in bash on Linux First, the script expects the scrambled string to be provided as an argument and prompts for it if none is provided. It then checks out each arrangement of letters to find those that exist in the system's words file – in this case, that's /usr/share/dict/words. Here are the first lines in the script:To read this article in full, please click here

Factorials and unscrambling words with bash on Linux

In this post, we examine a bash script that takes a string of letters, rearranges them in every possible way and checks each permutation to identify those that are English words. In the process, we'll take a close look at the script and calculate how hard it might have to work.Note that, in the algorithm used, each letter arrangement must use all of the letters in the string provided. Words formed by substrings are not considered.How to loop forever in bash on Linux First, the script expects the scrambled string to be provided as an argument and prompts for it if none is provided. It then checks out each arrangement of letters to find those that exist in the system's words file – in this case, that's /usr/share/dict/words. Here are the first lines in the script:To read this article in full, please click here

Rant: Broadcom and Network Operating System Vendors

Minh Ha left the following rant as a comment on my 5-year-old What Are The Problems with Broadcom Tomahawk? blog post. It’s too good to be left gathering dust there. Counterarguments and other perspectives are highly welcome.


So basically a lot of vendors these days are just glorified Broadcom resellers :p. It’s funny how some of them try to up themselves by saying they differentiate their offerings with their Network OS.

Rant: Broadcom and Network Operating System Vendors

Minh Ha left the following rant as a comment on my 5-year-old What Are The Problems with Broadcom Tomahawk? blog post. It’s too good to be left gathering dust there. Counterarguments and other perspectives are highly welcome.


So basically a lot of vendors these days are just glorified Broadcom resellers :p. It’s funny how some of them try to up themselves by saying they differentiate their offerings with their Network OS.

Kubernetes Observability Challenges: The Need for an AI-Driven Solution

Kubernetes provides abstraction and simplicity with a declarative model to program complex deployments. However, this abstraction and simplicity create complexity when debugging microservices in this abstract layer. The following four vectors make it challenging to troubleshoot microservices.

  1. The first vector is the Kubernetes microservices architecture, where tens to hundreds of microservices communicate. Debugging such a componentized application is challenging and requires specialized tools.
  2. The second vector is the distributed infrastructure spread across heterogeneous on-premises and cloud environments.
  3. The third vector of complexity is the dynamic nature of Kubernetes infrastructure. The platform spins up required resources and provides an ephemeral infrastructure environment to scale the application based on demand.
  4. Lastly, in such a distributed environment, Kubernetes deployments need fine-grained security and an observability model with defense-in-depth to keep them secure. While modern security controls effectively protect your workloads, they can have unintended consequences by preventing applications from running smoothly and creating an additional layer of complexity when debugging applications.

Today, DevOps and SRE teams must stitch together an enormous amount of data from multiple, disparate systems that monitor infrastructure and services layers in order to troubleshoot Kubernetes microservices issues. Not only is it overwhelming to stitch this data, but troubleshooting using Continue reading

The Dystopian Reality Of Human Data Trafficking

Amazon Alexa wants me to know that they celebrate International Data Privacy Day. I’m awestruck at the chutzpah of this claim.

Reviews of a Samsung smart television I’m considering express frustration at the crapware loaded onto the system because it is difficult to navigate and tracks viewing habits.

An app I need for my Mac immediately requests access to my Documents and Downloads folders for no obvious reason. Denying the request has no impact on the functioning of the app.

A phone app I use to help me track strength exercises wants me to share my data with the Health app. It won’t stop asking me about it, even though I’ve repeatedly denied the request. Why? It’s not just for my own well-being, I’m certain.

Garmin shares my workout data, all highly personal containing health & location information, with various third parties, and there’s no way to opt out if you want to use their hardware.

Twitter delivers customized ads, even though I had at one time opted out, at a rate of 1 in 3 or 1 in 4 tweets to my timeline.

Facebook rages against Apple for daring to require that apps hosted in the Apple store contain Continue reading

Tech Bytes: Aruba Fabric Composer Automates And Orchestrates Leaf-Spine Network Provisioning (Sponsored)

Today’s Tech Bytes dives into the Aruba Fabric Composer. This is data center software that can automate the provisioning of your network underlay and overlay, plus capabilities for orchestration, visibility, and troubleshooting. Aruba Networks is our sponsor. We're joined by Simon McCormack, Senior Manager, Product Management, at Aruba Networks.

The post Tech Bytes: Aruba Fabric Composer Automates And Orchestrates Leaf-Spine Network Provisioning (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Aruba Fabric Composer Automates And Orchestrates Leaf-Spine Network Provisioning (Sponsored)

Today’s Tech Bytes dives into the Aruba Fabric Composer. This is data center software that can automate the provisioning of your network underlay and overlay, plus capabilities for orchestration, visibility, and troubleshooting. Aruba Networks is our sponsor. We're joined by Simon McCormack, Senior Manager, Product Management, at Aruba Networks.

Rethinking BGP on the DC Fabric

Everyone uses BGP for DC underlays now because … well, just because everyone does. After all, there’s an RFC explaining the idea, every tool in the world supports BGP for the underlay, and every vendor out there recommends some form of BGP in their design documents.

I’m going to swim against the current for the moment and spend a couple of weeks here discussing the case against BGP as a DC underlay protocol. I’m not the only one swimming against this particular current, of course—there are at least three proposals in the IETF (more, if you count things that will probably never be deployed) proposing link-state alternatives to BGP. If BGP is so ideal for DC fabric underlays, then why are so many smart people (at least they seem to be smart) working on finding another solution?

But before I get into my reasoning, it’s probably best to define a few things.

In a properly design data center, there are at least three control planes. The first of these I’ll call the application overlay. This control plane generally runs host-to-host, providing routing between applications, containers, or virtual machines. Kubernetes networking would be an example of an application overlay control plane.

Continue reading

The Week in Internet News: Cook Blasts Social Media Algorithms

"In the news" text on yellow background

Disinformation bots: Apple CEO Tim Cook raised concerns about social media algorithms promoting disinformation during a speech at an international privacy conference, ZDNet reports. “At a moment of rampant disinformation and conspiracy theories juiced by algorithms, we can no longer turn a blind eye to a theory of technology that says all engagement is good engagement – the longer the better – and all with the goal of collecting as much data as possible,” he said.

Gaming the stock market: In a rebellion against large Wall Street short sellers, a group of individual investors centered around a Reddit forum have been driving up the price of GameStop stock, even as the company faces questions about its long-term viability. One founder of the Reddit community called the effort “a train wreck happening in real time,” CNet reports. GameStop’s stock has shot up by more than 2700 percent since the beginning of the year, even as the bricks-and-mortar game software vendor is facing business challenges.

The power of Big Tech: The head of Saudi Arabia’s sovereign wealth fund is raising concerns about the huge influence of large tech firms, Arabian Business says. The fund is worried about “how some of these technology Continue reading

Network Break 318: Cisco Unveils New Catalyst Hardware; Internet Sleuth Uncovers Global IPv4 Misuse

Today's Network Break explores new Catalyst hardware and micro switches from Cisco, a new security offering from Fortinet that combines endpoint security with cloud analytics, an Internet sleuth tracking IPv4 shenanigans, financial results from Juniper and F5, and a whopping big investment for routing startup DriveNets.

The post Network Break 318: Cisco Unveils New Catalyst Hardware; Internet Sleuth Uncovers Global IPv4 Misuse appeared first on Packet Pushers.