Archive

Category Archives for "Networking"

How IoT will rescue aviation

A biotech company that develops sensors to detect explosives and other chemicals on planes and in airports is teaming up with Airbus to create a sensor that could detect passengers who are positive for COVID-19.California-based Koniku and Airbus, which have been working since 2017 on contactless equipment that sniffs out chemicals, are trying to adapt that technology to sniff out pathogens, says Osh Agabi, founder and CEO of Koniku, in a blog post.To read this article in full, please click here

Day Two Cloud 048: Migrating Your Data Center To The Cloud

If you're thinking about migrating applications from your data center to the cloud, prepare to do a lot of planning. Today's Day Two Cloud podcast delves into the gritty details with guest Sarah Lean, a Cloud Advocate at Microsoft. We discuss migration business drivers, what apps are better off staying on prem, tips to minimize migration pain, and more.

The post Day Two Cloud 048: Migrating Your Data Center To The Cloud appeared first on Packet Pushers.

The Hedge Episode 35: Peter Jones and Single Pair Ethernet

When you think of new Ethernet standards, you probably think about faster and optical. There is, however, an entire world of buildings out there with older copper cabling, particularly in the industrial realm, that could see dramatic improvements in productivity if their control and monitoring systems could be moved to IP. In these cases, what is needed is an Ethernet standard that runs over a single copper pair, and yet offers enough speed to support industrial use cases. Peter Jones joins Jeremy Filliben and Russ White to discuss single pair Ethernet.

download

NTC – NetDevOps Report

The network automation community is continuously expanding and evolving. This can make it challenging to get a feel for where you are at on the automation journey. To shed some light on the current state of network automation, the NetDevOps survey was created. It’s an independent survey of network practitioners that collects information about the state of NetDevOps in the real world. As you might expect, it reveals some interesting trends within the community. In this episode we speak with the organizers of the NetDevOps survey to discuss how it came to be and some of the interesting results from the 2019 report.

2019 NetDevOps Survey Report

Damien Garros
Guest
Francois Caen
Guest
Rick Sherman
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post NTC – NetDevOps Report appeared first on Network Collective.

Essential Job Skills to Advance Your Business Degree

Obtaining a business degree does not guarantee you a job in these tough economic times. It is no guarantee that you will be able to obtain or maintain a job in the career of your choice. If you want to have a career in business, you need to develop some essential job skills. Here is a look at some of the essential job skills you need if you want to advance your business degree.

6 Necessary Skills to Advance Your Business Degree

Networking

Many people don’t consider networking an essential job skill, but it actually is one of the most important skills you need if you want to get a good job and advance in your career. Like other skills, networking is a learned skill. By becoming skilled at networking, you open yourself to a lot of available information and assistance in moving forward in the career of your choice.

Computer Skills

In today’s world of business, you need to have at least basic computer skills. You need to become familiar with word processing programs and spreadsheets, as well as powerpoint presentations and other types of computer programs necessary to perform business basic tasks associated with your business.

Communication Skills

Continue reading

The Internet Is Resilient Enough to Withstand Coronavirus – But There’s a Catch

Earlier this year, as COVID-19 began to dominate our lives, the world turned to the Internet. This sudden shift to distance learning, working from home, and families sheltering in place drove up online streaming demand, placing additional load on Internet application platforms like Zoom, Netflix, and educational tools such as Kahoot. There was also a dramatic traffic increase across supporting network providers.

Faced with the specter of millions of daily Zoom calls and endless hours of Netflix binging, many wondered if the Internet could handle the strain of such rapid traffic growth and increased latency. Would it cause a catastrophic failure of the Internet? Our answer then: not likely.

But were we right? As the world is now more than a month into mandatory lockdowns and stay-at-home orders, with anticipated growth in application platform usage, media consumption, and overall Internet traffic, we can now state:

No – increased Internet usage will not cause a catastrophic Internet failure.

As expected, the Internet has remained resilient. There is no single “Internet” to catastrophically fail, thanks to its foundational “network of networks” architecture.

This architecture means that many interconnected participants all have a role in keeping the Internet resilient:

Backblaze B2 and the S3 Compatible API on Cloudflare

Backblaze B2 and the S3 Compatible API on Cloudflare

In May 2020, Backblaze, a founding Bandwidth Alliance partner announced S3 compatible APIs for their B2 Cloud Storage service. As a refresher, the Bandwidth Alliance is a group of forward-thinking cloud and networking companies that are committed to discounting or waiving data transfer fees for shared customers. Backblaze has been a proud partner since 2018. We are excited to see Backblaze introduce a new level of compatibility in their Cloud Storage service.

History of the S3 API

First let’s dive into the history of the S3 API and why it’s important for Cloudflare users.

Prior to 2006, before the mass migration to the Cloud, if you wanted to store content for your company you needed to build your own expensive and highly available storage platform that was large enough to store all your existing content with enough growth headroom for your business. AWS launched to help eliminate this model by renting their physical computing and storage infrastructure.

Amazon Simple Storage Service (S3) led the market by offering a scalable and resilient tool for storing unlimited amounts of data without building it yourself. It could be integrated into any application but there was one catch: you couldn’t use any existing standard Continue reading

Do We Need Bare Metal Servers in Public and Private Clouds?

Whenever I was comparing VMware NSX and Cisco ACI a few years ago (in late 2010s in case you’re reading this in a far-away future), someone would inevitably ask “and how would you connect a bare metal server to a VMware NSX environment?

While NSX-T has that capability since release 2.5 (more about that in a later blog post), let’s start with the big question: why would you need to?

Beyond “Hello World”: Sorting Algorithms in Rust

This year I’ve been picking up Rust as not only a new learning opportunity but also in service to a few side-projects I’ve been getting involved with. Like a lot of developers, I learn by doing. After spending a few weeks reading the Rust book and watching videos, I looked for some easy project ideas that I could use to explore the language that goes further than a simple “Hello World” which often doesn’t actually give you much breadth at all.

NodeJS Notes: Functions

Functions allow you to implement repeatable block of code. Functions are first class objects. Functions are called in order to execute the code within the function. Functions have a variable scope that is local to the function itself. Standard Functions // Typescript version with type...

How synthetic full backup works and why you might need it

The invention of synthetic full backups is one of the most important advancements in backup technology in the last few decades, right up there witih disk-based backups, deduplication, continuous data protection (CDP), and the cloud.Here’s how they came to be and an explanation of what benefits they might offer.[Get regularly scheduled insights by signing up for Network World newsletters.] Traditional backup options There are essentially two very broad categories of what the backup industry calls backup levels;you are either backing up everything (full backup) or you are backing up only what has changed (incremental backup). There are different types of incremental backups, but that's really not relevant to this particular discussion. A typical set up runs incremental backups every night and full backups every week – or even less often than that.To read this article in full, please click here

Cisco, others, shine a light on VPN split-tunneling

As work-from-home becomes the norm due to the COVID-19 pandemic, the need for secure access to enterprise resources continues to grow and with it the demand for ever-more VPN.For example demand for commercial virtual private networks in the U.S. jumped by 41% between March 13 and March 23, according to research from Top10VPN.com, a VPN research and testing company in the U.K. The VPN market will hit $70 billion by 2026, according to market research and management consulting company Global Market Insights. In an April blog AT&T pointed to a 700% increase in connections to its cloud-based SD-WAN Static Network Based (ANIRA) VPN service.To read this article in full, please click here

Encryption: The Digital PPE We All Need

In the midst of a global pandemic, Internet security can be a matter of life and death.

Think of how critical the Internet has been to address the COVID-19 public health crisis. It has allowed half the world fortunate enough to have access to stay on top of critical public health updates and stay in touch with loved ones at a safe distance. Some can even continue activities like distance education, work from home, and access vital telehealth services.

But what if it weren’t safe to do these things?  Would the world be as willing to follow social isolation measures?

Encryption keeps billions of people and countries secure online every day. It protects the integrity of news online, keeps your banking information out of the hands of criminals, and allows communications over messaging and videoconference platforms to stay confidential.

That’s a good thing. With people spending more time online than ever, cyber criminals are targeting the increasing amount of private data and commercially or government sensitive information traveling across the Internet. We’ve already seen proof in the corresponding rise in criminal activity over the last few months. The United States Federal Bureau of investigation, for instance, said cybercrime reports Continue reading

May Customer Newsletter

Welcome to the May 2020 edition of Calicomm! – our monthly newsletter for customers and partners. In the April edition, we discussed audit logs. This edition covers egress access control, which is an important aspect of micro-segmentation.

What problems are we solving?

Consider an enterprise datacenter deployment with hundreds of nodes and thousands of pods. These systems are running business applications with different levels of security requirements. A first-order security and compliance requirement in such a scenario is to ensure that a pod or host is only allowed to talk to authorized destinations. Now consider the real life scenario where there’s a churn rate (pods/hosts being added/removed) of hundreds of pods/minute. The challenge is to continue enforcing the microsegmentation in near real time despite a high churn rate.

An efficient mechanism for micro-segmentation has a direct impact on productivity. Ideally, you do not want to wait days for an access policy to be granted through a ticketing process, nor do you want to wait precious minutes for a policy change to take effect.

Micro-segmentation has two broad categories, East-West (E-W) and North-South (N-S). The following are typical use cases of egress access control within the N-S category:

Security Field Day #XFD3 with the VMware NSX Security Team

#SFD

The Gestalt IT team is back with another exciting set of  Field Day presentations. Multiple IT product vendors, including VMware, and independent thought leaders will share information and opinions in a presentation and discussion format. The complete VMware agenda and speaker lineup for the morning of the 14th is listed in detail below.

In summary, VMware’s focus for #XFD3 is why a new approach to security is required in the modern era. This security vision is present across all of the solutions, technologies, and bundles that we are bringing to the market. The VMware speakers, Dhruv, Stijn, Ray, and Ashish are planning to cover diverse topics ranging across Service-defined Firewall (SDFW), IDS/IPS, NSX Intelligence, DDoS, and WAF.

We will live-stream the virtual event this Thursday, May 14th from 8-10am PST. Don’t worry if you are unable to make it live, all videos will be posted here,  for On-Demand viewing post-event.
Live streaming now complete. The OnDemand videos follow.  Please see the full agenda with the detailed description of each presentation below. 
Video 1: Dhruv and Stijn discuss the  VMware Service-defined Firewall is an innovative approach to internal firewalling

 

Video 2: Dhruv Continue reading

Real-time network and system metrics as a service

The sFlow-RT real-time analytics engine receives industry standard sFlow telemetry as a continuous stream from network and host devices and coverts the raw data into useful measurements that can be be queried through a REST API. A single sFlow-RT instance can monitor the entire data center, providing a comprehensive view of performance, not just of the individual components, but of the data center as a whole.

This article is an interactive tutorial intended to familiarize the reader with the REST API. The examples can be run on a laptop using recorded data so that access to a live network is not required.

The data was captured from the leaf and spine test network shown above (described in Fabric View).
curl -O https://raw.githubusercontent.com/sflow-rt/fabric-view/master/demo/ecmp.pcap
First, download the captured sFlow data.

You will need to have a system with Java or Docker to run the sFlow-RT software.
curl -O https://inmon.com/products/sFlow-RT/sflow-rt.tar.gz
tar -xzf sflow-rt.tar.gz
./sflow-rt/get-app.sh sflow-rt browse-metrics
./sflow-rt/get-app.sh sflow-rt browse-flows
./sflow-rt/get-app.sh sflow-rt prometheus
./sflow-rt/start.sh -Dsflow.file=$PWD/ecmp.pcap
The above commands download and run sFlow-RT, with browse-metrics, browse-flows, and prometheus applications on a system with Java 1.8+ installed.
docker  Continue reading