Archive

Category Archives for "Networking"

From Content Blocking to National Shutdowns: Understanding Internet Disruptions

In March 2019, in a move described in one news report as a “government-imposed Internet shutdown,” the president of Sri Lanka temporarily blocked Facebook, WhatsApp, Instagram, Viber, and other services. In this case, limited access to a class of applications was inaccurately painted as a full-scale Internet shutdown. Unfortunately, this isn’t unusual. Media coverage and general discussion of Internet disruptions often misclassify what happened. The confusion is likely unintentional. Many journalists, as well as the general public, are not well-versed in the various ways Internet access and access to content can be disrupted.

When people can’t get to their favorite social media site, chat app, or video platform, there can be many causes. Maybe there’s a local Internet outage, or access to these sites has been blocked because of a government decree, or a nationwide Internet shutdown has been ordered by the government. Internet disruptions can take several forms, but end users experience the same problem across all of them – an inability to use the Internet to communicate and access content.

If, in the end, the end user experience is the same, why is it important to delineate between the various types of Internet disruptions? Proper delineation can help Continue reading

Telefónica, flexiWAN Drive Open Source SD-WAN Development

The goal is to develop a proof-of-concept SD-WAN service designed to run on white-box consumer...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

That’s It for 2019 ;))

Yesterday we ran the last live webinar session for 2019, and all we have to do before locking the virtual office doors and returning to our families is to get the videos back from our editor and publish them. The “this is what we did in 2019” and “this is what we plan to do in 2020” blog posts will have to wait till we come back.

We’ll be (mostly) gone until early January… unless of course you have an urgent support problem. The desperate paperwork ideas like “I need you to sign, stamp, and notarize this legal document written in a language you’ve never seen in your life” will have to survive for a few weeks without our immediate attention (but then they usually don’t disappear on their own).

I hope you’ll be able to do something similar, disconnect from the crazy pace of networking world, forget all the unicorns you’ve been trying to tame during this year, and focus on your loved ones - they need you more than the router sitting in the basement of your building. We would also like to wish you all the best in 2020!

Oh, and Continue reading

Data center operators not keen on green: survey

Most data center operators are not prioritizing power and other "green" issues. While enterprises are making incremental improvements toward energy-efficient initiatives, they're advancing at a very slow rate, according to new research data.Supermicro surveyed more than 5,000 IT professionals for its Data Centers and the Environment report. One of the goals of the annual report is to help IT leaders to lessen the long-term environmental impact of their data center equipment purchases.Those surveyed said total cost of ownership (TCO) and return on investment (ROI) are their primary measures of success. Less than 15% said that energy efficiency, corporate social responsibility, and environmental impact are key considerations for their facilities. At the same time, 22% of respondents noted that environmental considerations are too expensive to be considered a priority.To read this article in full, please click here

Data center operators not keen on green: survey

Most data center operators are not prioritizing power and other "green" issues. While enterprises are making incremental improvements toward energy-efficient initiatives, they're advancing at a very slow rate, according to new research data.Supermicro surveyed more than 5,000 IT professionals for its Data Centers and the Environment report. One of the goals of the annual report is to help IT leaders to lessen the long-term environmental impact of their data center equipment purchases.Those surveyed said total cost of ownership (TCO) and return on investment (ROI) are their primary measures of success. Less than 15% said that energy efficiency, corporate social responsibility, and environmental impact are key considerations for their facilities. At the same time, 22% of respondents noted that environmental considerations are too expensive to be considered a priority.To read this article in full, please click here

Podcast with Cumulus on Infrastructure-as-a-code in real life.

Hello my friend,

I had an honour to be invited to Cumulus Linux podcast, where we had quite an interesting discussion about the role of network automation and real-life challenges.

The discussion covered the experience we collected in THG (The Hut Group) Hosting during driving the build of the open network data centres implementing the latest achievements of white boxes, disaggregation and (add your marketing buzzword here). And yes, we speak about real-life experience, not the lab tests in Cumulus VX ?

The whole podcast you can list at the Cumulus Website.

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,

Anton Karneliuk 

How to tell if you’re using a bash builtin in Linux

If you’re not sure if you’re running a Linux command or you’re using a bash builtin, don’t stress, it isn’t all that obvious. In fact, you can get very used to commands like cd without realizing that they’re part of your shell, unlike commands like date and whoami that invoke executables (/bin/date and /usr/bin/whoami).Builtins in general are commands that are built into shell interpreters, and bash is especially rich in them, which is a good thing because built-ins by their very nature run a bit faster than commands which have to be loaded into memory when you call them into play.To read this article in full, please click here

Kernel of Truth season 2 episode 14: Infrastructure as code in action

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

In this episode we continue the conversation about “infrastructure as code.” Last time we chatted about it we talked to Nick Mitchell and Eric Pulvino, two of our consultants, and shared not only what it is but what the problems infrastructure as code is solving for and why you should care. In this latest episode we go a step further.​ Kernel of Truth hosts Brian O’Sullivan and Pete Lumbis are joined by​ Anton Karneliuk who talk more about what it is and also discuss how to evolve it, what the challenges are and Anton shares his real-life experiences implemented it at The Hut Group.

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a Continue reading

Fortinet Leapfrogs Cisco With 21,000 SD-WAN Customers

Late last month Cisco announced it had 20,000 SD-WAN customers spread across its Viptela and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tenancy and the importance of defining it.

One of the common starting points during the IT architecture process is trying to define and identify tenancy. Part of the problem is that the term “tenant” has various definitions depending on the business unit. As a network engineer, I don’t care about one of those definitions of the word: “Layer 3 subnet isolation with a unified set of routing and security policies.” Trying to communicate that to technical leaders in other IT organizations is hard enough, but trying to communicate this to a non-technical business leader can feel like an impossible task.

The goal then becomes trying to distill the complexities of a tenant into a consumable morsel.

What happened?

In my most recent consulting engagement, I worked with a company that had three key players during the design stage:

  • Server team
  • Network team
  • Business team

We kept using the word “tenancy” thinking we were speaking the same language , but we slowly realized that we weren’t speaking with the same definitions. In my network-first definition, I only cared about the subnets allocated to the servers and whether the servers were able to talk to each other. From my definition of tenancy, any server allocated to a tenant Continue reading

Full Stack Journey 037: The Influence Of Open Source In A Tech Career With Matt Broberg

Open source software has had a significant influence on the tech career of today's Full Stack Journey podcast guest, Matt Broberg. We discuss why open source has been so influential, the importance of community in IT, and topics such as how to stay technical when your role changes, and why business fundamentals should matter to technologists.

The post Full Stack Journey 037: The Influence Of Open Source In A Tech Career With Matt Broberg appeared first on Packet Pushers.

Amazon Snaps at New York Times Open Source Critique

“AWS has not copied anybody’s software or services," wrote Andi Gutmans, VP for analytics and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Wins Latest Battle in War Against Chinese Counterfeiters

Cisco has been battling Chinese manufacturers over the sale of spurious versions of its products...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Intel Chip Flaw Plunderbolt Hits Secure Enclaves

The chipmaker issued a patch for the vulnerability, which could allow attackers to change...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Heavy Networking 495: Smart, Effective, Automated SecOps With Tufin (Sponsored)

The growing complexity of IT environments make it harder for SecOps teams to keep pace with developers, manage access to resources, and ensure that the right controls are in place and policies are met. Sponsor Tufin joins the Heavy Networking podcast to discuss how automation can boost SecOps effectiveness while tackling initiatives such as zero trust and network segmentation on premises and in the cloud.

The post Heavy Networking 495: Smart, Effective, Automated SecOps With Tufin (Sponsored) appeared first on Packet Pushers.

Corsa’s Eduardo Cervantes Talks Scaling Network Security for Encrypted Traffic Inspection

Hear from Corsa's Eduardo Cervantes and his thoughts on security, the data explosion, and why...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Related Stories