Archive

Category Archives for "Networking"

Heavy Networking 520: Cloud Architects’ Multi-Cloud Network Adoption With Alkira (Sponsored)

Today's Heavy Networking, sponsored by Alkira, dives into multi-cloud networking. Alkira's Cloud Service Exchange is an on-demand, as-a-service offering that lets customers deploy multi-cloud networks with integrated security services using an intuitive digital design canvas. We talk with two Alkira customers using the service, as well as with Alkira co-founder and CTO Atif Khan.

Heavy Networking 520: Cloud Architects’ Multi-Cloud Network Adoption With Alkira (Sponsored)

Today's Heavy Networking, sponsored by Alkira, dives into multi-cloud networking. Alkira's Cloud Service Exchange is an on-demand, as-a-service offering that lets customers deploy multi-cloud networks with integrated security services using an intuitive digital design canvas. We talk with two Alkira customers using the service, as well as with Alkira co-founder and CTO Atif Khan.

The post Heavy Networking 520: Cloud Architects’ Multi-Cloud Network Adoption With Alkira (Sponsored) appeared first on Packet Pushers.

In a Time of Crisis, A Global Lockdown Needs a Digital Unlocking

We are at a very special moment in history right now. Never before in modern times have we seen such a global impact and a global response to a crisis which largely ignores geopolitical borders. The COVID-19 outbreak and its repercussions have put cities, countries, entire regions on hold.

One saving grace of this crisis is that the global digital infrastructure – the terrestrial and mobile networks, the data centers, the undersea cables, and the satellite connections that support the global Internet – is by now well enough developed for people in many countries to stay in constant contact despite isolation.

This means that, today, lockdown does not necessarily need to mean shut down.

Digital applications are key to enduring the crisis

Digital communication is vital to this. It enables companies to send their workforce home to work. It enables people to stay in contact with loved ones they can’t meet with. It enables children and students of all ages to continue with their education. Even the researchers who we all pin our hopes on finding a vaccine are using digital applications to remain in contact and share data in their efforts to understand the virus.

So digital applications that Continue reading

SD-WAN Security: A Product Liability Insurance Law Would Certainly Help

On May 14th 2020, Marcel Gamma, tech industry journalist, and editor-in-chief at inside-it.ch and inside-channels.ch, published an article discussing several glaring security vulnerabilities in Silver Peak’s SD-WAN products on inside-it.ch. The original article was written in German; Marcel was kind enough to translate it into English and get permission from his publisher to have the English version published on ipSpace.net.


Security researchers make serious accusations against SD-Wan manufacturer Silver Peak. The latter disagrees. Swiss experts are analyzing the case.

By Marcel Gamma,

Silver Peak is accused of laxity in dealing with security issues and in dealing with security researchers who act within the framework of Responsible Disclosure.

Getting Over My Fear of Network Automation

People that know me know that I like to be open on sharing thoughts, insights, things I’ve learned, and my struggles. Many people have put their trust in me and I consider it important to show that perceived leaders of the networking industry have the same thoughts and struggles as everyone else.

I wrote this tweet which gained a lot of response and positive comments (thank you).

I’ve dabbled with Python a couple of times the last couple of years. I know the very basics but I haven’t done much more beyond that. Why haven’t I done more automation? There are some different clues as to why, including the fear of not being very good at it.

Job role – I’m a Network Architect. What I enjoy the most, my passion if you will, is to engage in discussions with customers and create Continue reading

Dell, VMware Supercharge AI With Bitfusion

The new Dell EMC Ready Solutions use the Bitfusion feature in vSphere 7 to manage and allocate a...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Everything You Need to Know about Kubernetes Services Networking

As a leading, open-source multi-cluster orchestration platform, Rancher lets operations teams deploy, manage and secure enterprise Kubernetes. Rancher also gives users a set of CNI options to choose from, including open-source Project Calico. Calico provides native Layer 3 routing capability for Kubernetes pods which simplifies the networking architecture, increases networking performance and provides a rich network policy model makes it easy to lock down communication so the only traffic that flows is the traffic you want to flow.

Calico utilizes Kubernetes Services, an abstraction layer which defines a logical set of pods and enables load balancing and service discovery for those pods. Services are one of the key Kubernetes primitives you need to understand to glue microservices together and expose your applications outside of the cluster. The Service resource provides an abstract way to expose an application running on a set of Pods as a network service. Sounds simple, but what’s the difference between a Cluster IP, Node Port, and Load Balancer service? And how do all these abstractions translate to real under the covers networking behavior?

Here is a short 7-minute video that explains all this and more!

In the video you’ll learn:

Chipmakers Lobby for $37B in Aid for US Fabs

Lobbyists within the semiconductor industry are pushing for $37 billion in subsidies to support the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SDxCentral To No Longer Support FeedBlitz

Starting on July 30, 2020, SDxCentral will no longer support FeedBlitz.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Is quantum computing ready to leap into the real world?

Market research firm IDC predicts that by 2023, 25% of Fortune 500 companies will gain a competitive advantage from quantum computing.  It’s a bold prediction given the current dearth of real-world examples of quantum computing in action. However, there’s plenty of industry activity to back up IDC’s forecast. In fact, early this year at the Consumer Electronics Show the biggest buzz wasn’t the newest smartphone, wearable device or autonomous-driving technology, but rather unprecedented computing power based on an area of quantum physics Albert Einstein described as "spooky action at a distance."To read this article in full, please click here

Daily Roundup: What Will the New Normal Look Like?

Dell and Nutanix execs shared their visions of a new normal; Equinix expanded into Canada;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google’s Anthos Expansion Follows Technical Track

The company is targeting Amazon first with its Anthos platform because it has a similar operational...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

To Route or Not?

When you are building a data center fabric, should you run a control plane all the way to the host? This is question I encounter more often as operators deploy eVPN-based spine-and-leaf fabrics in their data centers (for those who are actually deploying scale-out spine-and-leaf—I see a lot of people deploying hybrid sorts of networks designed as “mini-hierarchical” designs and just calling them spine-and-leaf fabrics, but this is probably a topic for another day). Three reasons are generally given for deploying the control plane all on the hosts attached to the fabric: faster down detection, load sharing, and traffic engineering. Let’s consider each of these in turn.

Faster Down Detection. There’s no simple way for ToR switches to determine when the connection to a host has failed, whether the host is single or dual-homed. Somehow the set of routes reachable through the host must be related to the interface state, or some underlying fast hello state (such as BFD), so that if a link fails the ToR knows to pull the correct set of routes from the routing table. It’s simpler to just let the host itself advertise the correct reachability information; when the link fails, the routing session will Continue reading

Finding Nuance In A Time Of Negative Noise

I am put off by the mainstream media, the American president, and Twitter these days. We’re living in a media world that lacks nuance. Nearly all discussions are polarized. That polarization results in a mockery of clear thought. A polarized world views issues as binary. Good or evil. Red or blue. Masks or freedom. Shelter at home or open it all up.

No more anger, agendas, or simple-minded retweets for me. I want facts without bias and reflection on what that data might mean. I want difficult conversations with no clear answers today, in the hopes of progressing towards a decent answer eventually.

Thankfully, I’ve discovered a few folks having nuanced, engaging discussions that attempt to analyze the difficulties of our world honestly and thoroughly. If these sorts of conversations might be interesting to you, here’s what I’ve found so far.

Eric Weinstein’s The Portal Podcast

On this long-form podcast, Eric interviews heterodox thinkers about both current events and goings-on in the scientific community, physics especially. Eric is a brutal interviewer at times, refusing to let folks go down obvious trains of thought, instead forcing them to get to the point with haste. This tactic, although often uncomfortable to listen Continue reading

Tech Bytes: Improving NPM And Threat Management With Enriched Flow From VIAVI Solutions (Sponsored)

Today's Tech Bytes podcast dives into using enriched flow--that is, flow records enhanced with logs and data from sources such as firewalls and directories--to improve your network performance monitoring and threat management. Our guest is Warren Caron, Sales Engineer at VIAVI Solutions. VIAVI is our sponsor for today's episode.

The post Tech Bytes: Improving NPM And Threat Management With Enriched Flow From VIAVI Solutions (Sponsored) appeared first on Packet Pushers.