Continued job losses at one of the world’s largest network operators underlines the impact...
Cumulus added open source network automation; Telefónica to lead yet another edge alliance; and...
Retail SD-branch can help a business retain customers, offer them better service, and increase...
Results from CNCF's annual survey indicate growing ubiquity of the use of cloud native technologies...
While “smart,” the facility initially counts approximately 100 employees. The facility itself...
It’s not illogical to argue that since we all use the same networking technologies that all networks are essentially the same. Routing protocols, layer two technologies, and overlays all behave the same whether they are run in SOHO, enterprise, or service provider environments. That being said, it feels like there can be worlds of difference between the application of these technologies in different environments. In this episode Nick Buraglio, Kevin Myers, and I discuss just how interchangeable these technologies are and why it feels like engineers who work on the same technologies can feel worlds apart when their paths intersect.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Are All Networks Created Equal? appeared first on Network Collective.
Today's Day Two Cloud podcast focuses on third-party cloud storage. While cloud providers have native storage offerings, there may be times when you want an alternative. Guest Stephen Foskett discusses why third-party storage in the cloud is viable, describes common enterprise use cases, and examines key issues including performance, data management, and operations.
The post Day Two Cloud 038: Making The Case For Third-Party Cloud Storage appeared first on Packet Pushers.
Internet Society community members,
Due to concerns associated with the COVID-19 coronavirus, including the possibility of quarantines and other travel restrictions, the Internet Society Board of Trustees has decided to hold its meeting on 13-14 March, 2020, as a virtual meeting instead of a physical meeting in Cancun, Mexico. This board meeting was originally planned to follow the ICANN 67 meeting in Cancun, which was also changed to a virtual meeting.
The agenda and remote participation information will be published to https://www.internetsociety.org/board-of-trustees/meetings/ within the next few days.
The post Internet Society Board of Trustees Meeting on March 13-14, 2020, changed to a virtual meeting appeared first on Internet Society.
Oracle, which holds a $40 million stake in Ampere, has announced plans to leverage the Altra...
Today, Cumulus Networks is announcing the release of its production-ready automation solution for organizations moving towards fully automated networks in order to take advantage of infrastructure-as-code deployment models.
At the forefront of the networking industry, we see our customers caught in the shifting tides as the modern data center moves toward fully automated networking. As they look to take advantage of innovative technology like 5G, cloud, IoT and more, organizations are looking to innovative networking deployments that incorporate new ways of thinking about automation like infrastructure-as-code, CI/CD and more. As network traffic continues to grow at an exponential rate, organizations are left with infrastructure that is harder to manage and deploy. Bogged down by the cost and time it takes to build out bits and pieces of fully automated solutions, these organizations are in need of a solution to help them innovate their networks at the speed business demands.
Cumulus is now offering the first open source, out-of-the-box, robust, end-to-end automated configuration and testing solution using Ansible. Customers no longer have to piece together their network automation from disparate and untested scripts and proof-of-concept playbooks. Cumulus is offering a framework for an elegant push-button solution for those looking for cutting-edge Continue reading
The Pwned Passwords API (part of Troy Hunt’s Have I Been Pwned service) is used tens of millions of times each day, to alert users if their credentials are breached in a variety of online services, browser extensions and applications. Using Cloudflare, the API cached around 99% of requests, making it very efficient to run.
From today, we are offering a new security advancement in the Pwned Passwords API - API clients can receive responses padded with random data. This exists to effectively protect from any potential attack vectors which seek to use passive analysis of the size of API responses to identify which anonymised bucket a user is querying. I am hugely grateful to security researcher Matt Weir who I met at PasswordsCon in Stockholm and has explored proof-of-concept analysis of unpadded API responses in Pwned Passwords and has driven some of the work to consider the addition of padded responses.
Now, by passing a header of “Add-Padding” with a value of “true”, Pwned Passwords API users are able to request padded API responses (to a minimum of 800 entries with additional padding of a further 0-200 entries). The padding consists of randomly generated hash suffixes with the usage Continue reading
On 27 February 2020, I took and passed the Cisco Certified DevNet Professional Core (DEVCOR) exam on my first attempt. For those who like to memorize dates, yes, I did pass DEVASC and DEVCOR on the same day to cut down on trips to the test center. Like DEVASC, this exam was fair and all blueprint topics were appropriately represented. You can read about my DEVASC blog here (provide link to other blog).
I want to focus on what I did to succeed and less about the exam structure itself. You can learn more about the official certification here. This blog is focused primarily on the DEVCOR exam. Before talking about the exam, just know that you need to pass the core exam plus one concentration exam to earn the Cisco Certified DevNet Professional certification. I also passed the ENAUTO exam, which focuses on enterprise network automation. I’ll write about it in “part 2” later.
Before attempting this certification, you should already have a DevNet Associate certification (not required) or comparable knowledge, plus at least 3 years of software development/automation experience. The DEVCOR exam was no joke. It was harder than the CCIE RS and SP written exams, and about Continue reading
AI is the new SDN, and we’re constantly bombarded with networking vendor announcements promising AI-induced nirvana, from reinventing Clippy to automatic anomaly- and threat identifications.
If you still think these claims are realistic, it’s time you start reading what people involved in AI/ML have to say about hype in their field. I posted a few links in the past, and the Packet Pushers Human Infrastructure magazine delivered another goodie into my Inbox.
You REALLY SHOULD read the original article, here’s the TL&DR summary for differently-attentive:
Read more ...AI is the new SDN, and we’re constantly bombarded with networking vendor announcements promising AI-induced nirvana, from reinventing Clippy to automatic anomaly- and threat identifications.
If you still think these claims are realistic, it’s time you start reading what people involved in AI/ML have to say about hype in their field. I posted a few links in the past, and the Packet Pushers Human Infrastructure magazine delivered another goodie into my Inbox.
You REALLY SHOULD read the original article, here’s the TL&DR summary for differently-attentive: