As the world makes progress towards Software Defined Everything, Bare Metal is becoming the center...
I know we haven’t gotten to the point of actually discussing inter-as option B or option C but we did cover all of the mechanics required for them to work (at least briefly). Before we go there though – I did want to cover a different technology that can also help solve our end to end LSP problems. Carrier Supporting Carrier – or more commonly just referred to as CsC (or in Cisco parlance Carrier of Carriers or CoC (or maybe I have that backwards?)) is a means to nest MPLS VPN sessions. Think of it this way. If you’re a huge backbone provider (we’ll call you the “uber provider”) selling transport to customers (we’ll call them customer carriers) – there’s a good chance that those customer carriers will need a way to isolate their customer on their backbone. How do we do that? Well MPLS VPNs of course! However you, the uber provider, also need a means to keep the customer carriers isolated as they traverse your backbone. So what do we do? Sounds a lot like a carrier supporting a carrier huh? CsC to the rescue!
At this point you might be wondering how we got here. Continue reading
People suffering from severe neck pain who want to reduce their reliance on pain medications often turn to TENS (transcutaneous electrical nerve stimulation) treatments to relieve the pain, reducing their dependence on prescription medications to get the pain relief they so badly need. TENS uses electrodes for neck pain or back pain, and while some people swear by such treatments, others find themselves wondering whether or not TENS really work to relieve pain. Keep reading to learn more about these electrodes for neck pain.
A TENS treatment consists of electrodes for neck pain and other bodily pains through electrical stimulation therapy. Found in physical therapy and pain clinics, TENS uses electrodes placed on the skin around a painful or injured area with a small electrical charge running through the device to temporarily reduce pain.
The use of electrodes for pain is believed to reduce pain by using electrical impulses to flood the nervous system and reduce the nerves’ ability to transmit pain signals to the brain, while at the same time producing the body’s natural pain relievers called endorphins. While some studies suggest that this type of therapy does work, other studies are not Continue reading
Ever wonder if your next doctor’s appointment will result in jail time? Luckily most of us never have to think about that. But LGBT Tech Executive Director Chris Wood says for people in countries where their truth is outlawed, the prospect of finding a trusted healthcare provider without encrypted messaging apps is worse than grim. It could be deadly.
Efforts to weaken encryption threaten our ability to keep our most vulnerable communities safe online. As the best tool available to protect our digital security, encryption helps ensure that data and messages are kept private and make it much more difficult for outside parties to get access to sensitive information. Encryption helps ensure that your digital bank transactions are secure, your passwords are kept safe, and your stored data can’t be accessed by any unintended parties.
This security tool protects all Internet users, but it is critical for vulnerable communities. For example, there is an alarming and growing threat of abusive partners using Internet-connected devices and other online tools to surveil and control their partners. This can make it even more difficult for victims to seek help. However, by using devices and services that encrypt web traffic, communications, and location info, Continue reading
Right around the same time I joined Arista in 2009, Amazon Web Services developed the concept of the Virtual Private Cloud, one of the seminal technologies that became a core construct deployed throughout public clouds enabling enterprise customers to corral and protect resources and provision them into logical groups, align security policies, and simplify their management. Following this, Google developed a model for Virtual Private Clouds that spanned regions allocating one subnet per region by default - creating the first multi-region VPC within a single cloud provider.
Blending the needs of DevOps and NetOps best positions companies to deliver the business outcomes...
Imagine you want to create a Jinja2 report that includes only a select subset of elements of a data structure… and want to have header, footer, and element count in that report.
Traditionally we’d solve that challenge with an extra variable, but as Jinja2 variables don’t survive loop termination, the code to do that in Jinja2 gets exceedingly convoluted.
Fortunately, Jinja2 provides a better way: using a conditional expression to select the elements you want to iterate over.
Managed Service Providers (MSPs) are trying to sell SD-WAN services by convincing you that you don't have the staff, training, or competence to operate an SD-WAN. On today's Heavy Networking, Greg Ferro and Ethan Banks pick this argument apart to see if there's anything to it.
The post Heavy Networking 483: SD-WAN Incompetence, Myths, And Fallacies appeared first on Packet Pushers.
When talking about Nornir and Ansible, speed is one of the topics that come up from time to time. A common argument for Nornir is that it performs better when working with either many hosts or lots of data. For some who hear this, it isn’t entirely clear what we mean. This article will look at some numbers. Recently I came across a quote by Kelsey Hightower that stuck with me.
“You haven’t mastered a tool until you understand when it should not be used.”
Let’s see if any of that can be applied here. Continue reading
Today's Tech Bytes podcast explores active and passive monitoring techniques employed by sponsor AppNeta to monitor performance and end user experience on 100Gbps links. Our guests are Adam Edwards, Chief Customer Officer; and Mike Hustler, VP of Engineering at AppNeta.
The post Tech Bytes: Monitoring 100Gbps Circuits With AppNeta (Sponsored) appeared first on Packet Pushers.