Our last blog on how NSX secures physical servers provided background on why physical server security is crucial. We cover the percentage share of physical servers to all workloads in the data center and the specific roles physical servers still play. Today, physical servers by percentage are playing a decreasing role in the data center. However, it’s still a vital one, as we pointed out in our last blog on Securing Physical Servers with NSX Service-defined Firewall. In this blog, we will cover a primary way VMware NSX provides secure connectivity for physical servers using a bare metal agent. VMware NSX-T can now offer secure connectivity for Linux and Windows Server physical servers.
There are several ways in which NSX can provide security for physical servers. Our original article, Extending the Power of NSX to Bare Metal, outlines each of these methods.
VMware NSX Continue reading
Today's Network Break podcast discusses critical security patches from F5 and Palo Alto Networks, examines the implications of a Senate bill that targets encryption, and dives into VMware's latest acquisition. We also explore a new space-oriented business unit at AWS and more tech news analysis.
The post Network Break 291: F5 Patches Severe Vulnerability; Senate Bill Aims To Weaken Encryption appeared first on Packet Pushers.
SD-WAN has been one of the most hyped technologies in a long time but as the hype settles out and real world deployments start to take shape, the picture is becoming clearer on what SD-WAN is and is not. In this episode we take a look at the original promises, where we are today in relation to those promises, and what SD-WAN might look like in the years to come.
![]() |
A considerable thank you to Unimus for sponsoring today’s episode. Unimus is a fast to deploy and easy to use Network Automation and Configuration Management solution. You can learn more about how you can start automating your network in under 15 minutes at unimus.net/nc. |
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post The Future of SD-WAN appeared first on Network Collective.
Voting with their dollars: Hundreds of companies have pulled their advertising from Facebook because of the social media giant’s lax policing of misinformation and hate speech, CNN reports. Still, most of the company’s biggest advertisers haven’t joined the boycott, and Facebook CEO Mark Zuckerberg has reportedly predicted “these advertisers will be back on the platform soon enough.”
Driving as a service: German car maker BMW is exploring ways to offer common features, like heated seats and cruise control, in a subscription-based, as-a-service model, The Independent reports. The Next Web called the subscription model “anti-consumer rubbish.” Video game maker Brianna Wu also tweeted her disappointment: “Sorry, but if this catches on, I will never buy another new car. Never.”
Networked threats: The U.S. Federal Communications Commission has designated Chinese networking companies Huawei and ZTE as national security threats, Al Jazeera says. This follows long-term concerns about the companies’ relationship with the Chinese Communist Party and the possibility of surveillance through their equipment. The FCC has proposed that rural telecom carriers be required to replace equipment from the two vendors.
Paying for speed: The Japanese government plans to subsidize local 5G companies as a way to catch up Continue reading
Since I seem to have a lot more time on my hands without travel thanks to current…things, I’ve been consuming podcasts more and more during my morning workouts. I’ve got a decent list going now and I wanted to share it with you. Here are my favorite podcasts (not including the one that I do for Gestalt IT, the On-Premise IT Roundtable:
In this short post I explain what are YAML aliases and anchors. I then show you how to stop PyYAML from using these when serializing data structures.
While references are absolutely fine to use in YAML files meant for programmatic consumption I find that it sometimes confuses humans, especially if they’ve never seen these before. For this reason I tend to disable anchors and aliases when saving data to YAML files meant for human consumption.
YAML specification has provision for preserving information about nodes pointing to the same data. This basically means that if you have some data that is referenced in multiple places in your data structure then YAML dumper will:
Now, how do these anchors and aliases look like?
&id001
- example of an anchor, placed with the first occurrence of data
*id001
- example of an alias, replaces subsequent occurrence Continue reading
Insider threats can be accidental or intentional, but the impact of insider breaches remain the same. Negligence at the organization regarding data privacy requirements and compliance can cause catastrophic data loss. To implement effective mitigation measures, employees must be aware of their Continue reading
A couple of weeks ago Scott Morris, Ethan Banks, and I sat down to talk about a project I’ve been working on for a while—a different way of looking at reaching for and showing your skills as a network engineer.
You can listen over at Packet Pushers, or download the show directly here.
The research and education community in the U.S. relies on a critical infrastructure to meet our education and research missions: the global Internet. This has been especially true during the COVID-19 pandemic, when it has enabled the rapid transition from on-campus to at-home learning.
In addition to being intense Internet users, we also operate a significant part of the Internet that’s tuned to meet higher education’s unique needs. The Internet2 network interconnects more than 1,000 individual networks across the U.S., and collectively we coordinate our activities and operations to ensure researchers and educators have the capabilities they need.
Whether from accidental misconfiguration or malicious hijack, the results are often more than just inconvenient. As academic and business critical functions are hosted or off-prem, the Internet is no longer a nice to have, but a key component of an organization’s IT infrastructure.
Colleges and universities have a long history of being connected to the Internet, and there was a time when connecting to the Internet was nearly “set it and forget it.”
But, today, Continue reading
Today's Heavy Networking explores ideas for designing a new networking certification program built around a network design challenge that focuses on broad, systems-oriented knowledge. The goal isn't to replace current certifications, but to create an option that emphasizes deep knowledge of protocols and networking concepts. Our guests are Russ White and Scott Morris.
The post Heavy Networking 527: New Ideas For A Network Certification Program appeared first on Packet Pushers.
When the EARN IT Act was introduced in March 2020, technologists, civil society organizations, academics, and even a former FBI General Counsel blasted the bill as a thinly veiled attempt to prevent platforms from keeping users safe with strong encryption. The bill had implications for intermediary liability, of course, but it was clearly a play to take down the strongest digital security tool we have online.
The EARN IT Act is now a monstrous version of its previous self. It would not only weaken the ability of platforms to protect users through encryption, but fundamentally alter how platforms operate, leading to dangerous consequences for users and the global Internet.
While the new version of the bill would prevent the federal government from forcing platforms to weaken encryption to maintain their intermediary liability protection (a foundational aspect of most companies’ business plans), it would essentially allow states to pass their own version of the original EARN IT Act. This would create a chaotic patchwork of state-level laws, threatening user security across the country and creating borders for a networking system that was never meant to recognize them. This bill would not only weaken the ability of platforms to protect users through Continue reading
Following up from our previous post on Bayesian Finite Mixture Models, here are my notes on Non-Finite mixture model.
Bayesian finite mixture models can be used when we have a prior knowledge or some good guess on the number of groups present in the dataset. But if we do not know this beforehand, then we can use Non-Finite mixture models. Bayesian solution for this kind of problems is related to Dirichlet process.
We briefly mentioned about Dirichlet distribution in the previous post Bayesian Finite Mixture Models,
which is a generalization of beta distribution, similarly Dirichlet Process is an infinite-dimensional generalization of Dirichlet
distribution. The Dirichlet distribution is a probability distribution on the space of probabilities, while Dirichlet Process
is a probability distribution on the space of distributions. A Dirichlet Process is a distribution over distributions.
When I first read this, my mind went
.
What this means is, that a single draw from a Dirichlet distribution will give us a probability and a single draw from a Dirichlet Process will give us a Dirichlet distribution. For finite mixture models, we used Dirichlet distribution to assign a prior for the fixed number of clusters, Continue reading
The easiest way to meet interesting people in your industry is to attend a networking event, work related conference, or a training course. These types of event usually do attract a high turnout so as well as the information on offer; you do get a chance to network with others who are in the same business as you.
The good thing about industry events is that you will meet people at all different levels and stages of their career. This can seem daunting if you are just starting out, but remember that everyone had to start somewhere and most people are going to be supportive and friendly if you have the right approach.
To handle a networking event and actually get to meet interesting people, you can employ some handy strategies to make introductions and social interaction much easier. One tip is to email the organizers and let them know that you are new. You will probably find that they offer to meet you and introduce you to a couple of people which will help get the ball rolling.
In addition, it is a good idea to arrive a bit early, rather than fashionably late Continue reading
The Internet plays a more important role than ever, serving as a lifeline so that children can continue learning, families and friends can stay connected, and vital public health information can keep circulating. At the Internet Society Foundation, we believe access to the Internet and its solutions can create healthier and safer communities, reduce vulnerabilities, and help build the resilience communities need to navigate the COVID-19 pandemic and emerge better prepared in the future.
That’s why we’re thrilled to announce that we’ve completed the selection process for our Emergency Response: COVID-19 grants, awarding USD$1.5 million in funding to four innovative projects that are using the Internet to help communities respond and adapt to the challenges created by the current pandemic.
The funding will support the following efforts around the globe:
Established Continue reading