If you're thinking about migrating applications from your data center to the cloud, prepare to do a lot of planning. Today's Day Two Cloud podcast delves into the gritty details with guest Sarah Lean, a Cloud Advocate at Microsoft. We discuss migration business drivers, what apps are better off staying on prem, tips to minimize migration pain, and more.
The post Day Two Cloud 048: Migrating Your Data Center To The Cloud appeared first on Packet Pushers.
When you think of new Ethernet standards, you probably think about faster and optical. There is, however, an entire world of buildings out there with older copper cabling, particularly in the industrial realm, that could see dramatic improvements in productivity if their control and monitoring systems could be moved to IP. In these cases, what is needed is an Ethernet standard that runs over a single copper pair, and yet offers enough speed to support industrial use cases. Peter Jones joins Jeremy Filliben and Russ White to discuss single pair Ethernet.
Respnding to Phil's assertion that DHCP isn't Intent
The post Response: DHCP is not Intent Based Networking – Networkphil appeared first on EtherealMind.
The network automation community is continuously expanding and evolving. This can make it challenging to get a feel for where you are at on the automation journey. To shed some light on the current state of network automation, the NetDevOps survey was created. It’s an independent survey of network practitioners that collects information about the state of NetDevOps in the real world. As you might expect, it reveals some interesting trends within the community. In this episode we speak with the organizers of the NetDevOps survey to discuss how it came to be and some of the interesting results from the 2019 report.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post NTC – NetDevOps Report appeared first on Network Collective.
Obtaining a business degree does not guarantee you a job in these tough economic times. It is no guarantee that you will be able to obtain or maintain a job in the career of your choice. If you want to have a career in business, you need to develop some essential job skills. Here is a look at some of the essential job skills you need if you want to advance your business degree.
Many people don’t consider networking an essential job skill, but it actually is one of the most important skills you need if you want to get a good job and advance in your career. Like other skills, networking is a learned skill. By becoming skilled at networking, you open yourself to a lot of available information and assistance in moving forward in the career of your choice.
In today’s world of business, you need to have at least basic computer skills. You need to become familiar with word processing programs and spreadsheets, as well as powerpoint presentations and other types of computer programs necessary to perform business basic tasks associated with your business.
Earlier this year, as COVID-19 began to dominate our lives, the world turned to the Internet. This sudden shift to distance learning, working from home, and families sheltering in place drove up online streaming demand, placing additional load on Internet application platforms like Zoom, Netflix, and educational tools such as Kahoot. There was also a dramatic traffic increase across supporting network providers.
Faced with the specter of millions of daily Zoom calls and endless hours of Netflix binging, many wondered if the Internet could handle the strain of such rapid traffic growth and increased latency. Would it cause a catastrophic failure of the Internet? Our answer then: not likely.
But were we right? As the world is now more than a month into mandatory lockdowns and stay-at-home orders, with anticipated growth in application platform usage, media consumption, and overall Internet traffic, we can now state:
“No – increased Internet usage will not cause a catastrophic Internet failure.”
As expected, the Internet has remained resilient. There is no single “Internet” to catastrophically fail, thanks to its foundational “network of networks” architecture.
This architecture means that many interconnected participants all have a role in keeping the Internet resilient:
In May 2020, Backblaze, a founding Bandwidth Alliance partner announced S3 compatible APIs for their B2 Cloud Storage service. As a refresher, the Bandwidth Alliance is a group of forward-thinking cloud and networking companies that are committed to discounting or waiving data transfer fees for shared customers. Backblaze has been a proud partner since 2018. We are excited to see Backblaze introduce a new level of compatibility in their Cloud Storage service.
First let’s dive into the history of the S3 API and why it’s important for Cloudflare users.
Prior to 2006, before the mass migration to the Cloud, if you wanted to store content for your company you needed to build your own expensive and highly available storage platform that was large enough to store all your existing content with enough growth headroom for your business. AWS launched to help eliminate this model by renting their physical computing and storage infrastructure.
Amazon Simple Storage Service (S3) led the market by offering a scalable and resilient tool for storing unlimited amounts of data without building it yourself. It could be integrated into any application but there was one catch: you couldn’t use any existing standard Continue reading
Whenever I was comparing VMware NSX and Cisco ACI a few years ago (in late 2010s in case you’re reading this in a far-away future), someone would inevitably ask “and how would you connect a bare metal server to a VMware NSX environment?”
While NSX-T has that capability since release 2.5 (more about that in a later blog post), let’s start with the big question: why would you need to?
Functions allow you to implement repeatable block of code. Functions are first class objects. Functions are called in order to execute the code within the function. Functions have a variable scope that is local to the function itself. Standard Functions // Typescript version with type...continue reading
In the midst of a global pandemic, Internet security can be a matter of life and death.
Think of how critical the Internet has been to address the COVID-19 public health crisis. It has allowed half the world fortunate enough to have access to stay on top of critical public health updates and stay in touch with loved ones at a safe distance. Some can even continue activities like distance education, work from home, and access vital telehealth services.
But what if it weren’t safe to do these things? Would the world be as willing to follow social isolation measures?
Encryption keeps billions of people and countries secure online every day. It protects the integrity of news online, keeps your banking information out of the hands of criminals, and allows communications over messaging and videoconference platforms to stay confidential.
That’s a good thing. With people spending more time online than ever, cyber criminals are targeting the increasing amount of private data and commercially or government sensitive information traveling across the Internet. We’ve already seen proof in the corresponding rise in criminal activity over the last few months. The United States Federal Bureau of investigation, for instance, said cybercrime reports Continue reading
Welcome to the May 2020 edition of Calicomm! – our monthly newsletter for customers and partners. In the April edition, we discussed audit logs. This edition covers egress access control, which is an important aspect of micro-segmentation.
Consider an enterprise datacenter deployment with hundreds of nodes and thousands of pods. These systems are running business applications with different levels of security requirements. A first-order security and compliance requirement in such a scenario is to ensure that a pod or host is only allowed to talk to authorized destinations. Now consider the real life scenario where there’s a churn rate (pods/hosts being added/removed) of hundreds of pods/minute. The challenge is to continue enforcing the microsegmentation in near real time despite a high churn rate.
An efficient mechanism for micro-segmentation has a direct impact on productivity. Ideally, you do not want to wait days for an access policy to be granted through a ticketing process, nor do you want to wait precious minutes for a policy change to take effect.
Micro-segmentation has two broad categories, East-West (E-W) and North-South (N-S). The following are typical use cases of egress access control within the N-S category:
The Gestalt IT team is back with another exciting set of Field Day presentations. Multiple IT product vendors, including VMware, and independent thought leaders will share information and opinions in a presentation and discussion format. The complete VMware agenda and speaker lineup for the morning of the 14th is listed in detail below.
In summary, VMware’s focus for #XFD3 is why a new approach to security is required in the modern era. This security vision is present across all of the solutions, technologies, and bundles that we are bringing to the market. The VMware speakers, Dhruv, Stijn, Ray, and Ashish are planning to cover diverse topics ranging across Service-defined Firewall (SDFW), IDS/IPS, NSX Intelligence, DDoS, and WAF.
Video 2: Dhruv Continue reading
curl -O https://raw.githubusercontent.com/sflow-rt/fabric-view/master/demo/ecmp.pcapFirst, download the captured sFlow data.
curl -O https://inmon.com/products/sFlow-RT/sflow-rt.tar.gzThe above commands download and run sFlow-RT, with browse-metrics, browse-flows, and prometheus applications on a system with Java 1.8+ installed.
tar -xzf sflow-rt.tar.gz
./sflow-rt/get-app.sh sflow-rt browse-metrics
./sflow-rt/get-app.sh sflow-rt browse-flows
./sflow-rt/get-app.sh sflow-rt prometheus
./sflow-rt/start.sh -Dsflow.file=$PWD/ecmp.pcap
docker Continue reading