Archive

Category Archives for "Networking"

Upcoming Events and Webinars (November 2019)

In November 2019 we’ll continue the crazy pace of autumn 2019 webinar season:

Read more ...

Looping your way through bash

There are a lot of options for looping in bash whether on the command line or in a script. The choice depends on what you're trying to do.You may want to loop indefinitely or quickly run through the days of the week. You might want to loop once for every file in a directory or for every account on a server. You might want to loop through every line in a file or have the number of loops be a choice when the script is run. Let's check out some of the options.[Get regularly scheduled insights by signing up for Network World newsletters.] Simple loops Probably the simplest loop is a for loop like the one below. It loops as many times as there are pieces of text on the line. We could as easily loop through the words cats are smart as the numbers 1, 2, 3 and 4.To read this article in full, please click here

Juniper set to reinforce core edge networking, cloud technologies

There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the  overarching networking landscape laid out by  Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here

Juniper set to reinforce edge networking, cloud

There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the  overarching networking landscape laid out by  Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here

Digital Realty Pays $8.4B for Interxion’s European Data Centers

The deal expands San Francisco-based Digital Realty’s European footprint and better positions it...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Juniper set to reinforce edge, cloud technologies

There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the  overarching networking landscape laid out by  Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here

How SD-Branch Changes The Business Game

SD-branch is the next logical step from SD-WAN, creating a software-defined branch that's easily...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Deutsche Telekom Tackles Cyber Theft, Cloud Management

The operator also unveiled a partnership with Siemens to deliver corporate services to German...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

NetApp Financial Woes Loom Over Keystone Launch

NetApp executives say the company’s all-flash and hybrid storage arrays have been a burden on...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Everything you need to know about 10G, the future of broadband technology

With the emergence of more connected devices and immersive content experiences happening alongside an unparalleled boom of video streaming platforms, there’s never been a more critical time to have a powerful and reliable network than can meet the demands of the future. And that next big leap for digital mankind is 10G.What is 10G?  Not to be confused with the cellular industry’s 5G (meaning fifth generation), the “G” in 10G means gigabits per second, a blazing fast internet speed. 10G is the cable industry’s vision for delivering a remarkable 10 gigabits per second to homes in the U.S. and around the globe. Home internet speeds will be 10 times faster than today’s fastest broadband networks, staying ahead of your digital demands, especially as technology becomes even more integral in our day-to-day lives. To read this article in full, please click here

Observability in Data Center Networks


Observability in Data Center Networks: In this session, you’ll learn how the sFlow protocol provides broad visibility in modern data center environments as they migrate to highly meshed topologies. Our data center workloads are shifting to take advantage of higher speeds and bandwidth, so visibility to east-west traffic within the data center is becoming more important. Join Peter Phaal—one of the inventors of sFlow—and Joe Reves from SolarWinds product management as they discuss how sFlow differs from other flow instrumentation to deliver visibility in the switching fabric.
THWACKcamp is SolarWinds’ free, annual, worldwide virtual IT learning event connecting thousands of skilled IT professionals with industry experts and SolarWinds technical staff. This video was one of the sessions.

Qualcomm-Backed Particle Banks $40M to Expand IoT Platform

“We have the largest developer community in the [IoT] industry. Almost 200,000 folks build their...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Day Two Cloud 021: Nice Design; We Need To Change It – The Reality Of Building A Cloud Service

How does technical implementation and user feedback shape a cloud-based solution? When is it time to make a significant change in your design? And how do you know you’re headed in the right direction? This Day Two Cloud podcast episode tackles these questions with guest Michael Fraser, co-founder and CEO of Refactr.

The post Day Two Cloud 021: Nice Design; We Need To Change It – The Reality Of Building A Cloud Service appeared first on Packet Pushers.

The TLS Post-Quantum Experiment

The TLS Post-Quantum Experiment
The TLS Post-Quantum Experiment

In June, we announced a wide-scale post-quantum experiment with Google. We implemented two post-quantum (i.e., not yet known to be broken by quantum computers) key exchanges, integrated them into our TLS stack and deployed the implementation on our edge servers and in Chrome Canary clients. The goal of the experiment was to evaluate the performance and feasibility of deployment in TLS of two post-quantum key agreement ciphers.

In our previous blog post on post-quantum cryptography, we described differences between those two ciphers in detail. In case you didn’t have a chance to read it, we include a quick recap here. One characteristic of post-quantum key exchange algorithms is that the public keys are much larger than those used by "classical" algorithms. This will have an impact on the duration of the TLS handshake. For our experiment, we chose two algorithms: isogeny-based SIKE and lattice-based HRSS. The former has short key sizes (~330 bytes) but has a high computational cost; the latter has larger key sizes (~1100 bytes), but is a few orders of magnitude faster.

During NIST’s Second PQC Standardization Conference, Nick Sullivan presented our approach to this experiment and some initial results. Quite accurately, Continue reading