Archive

Category Archives for "Networking"

Back to Bare Metal with Dell EMC and Ironic

As the world makes progress towards Software Defined Everything, Bare Metal is becoming the center...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Carrier Supporting Carrier with OSPF and LDP

I know we haven’t gotten to the point of actually discussing inter-as option B or option C but we did cover all of the mechanics required for them to work (at least briefly). Before we go there though – I did want to cover a different technology that can also help solve our end to end LSP problems. Carrier Supporting Carrier – or more commonly just referred to as CsC (or in Cisco parlance Carrier of Carriers or CoC (or maybe I have that backwards?)) is a means to nest MPLS VPN sessions. Think of it this way. If you’re a huge backbone provider (we’ll call you the “uber provider”) selling transport to customers (we’ll call them customer carriers) – there’s a good chance that those customer carriers will need a way to isolate their customer on their backbone. How do we do that? Well MPLS VPNs of course! However you, the uber provider, also need a means to keep the customer carriers isolated as they traverse your backbone. So what do we do? Sounds a lot like a carrier supporting a carrier huh? CsC to the rescue!

At this point you might be wondering how we got here. Continue reading

Electrodes for Neck Pain – Do They Work?

People suffering from severe neck pain who want to reduce their reliance on pain medications often turn to TENS (transcutaneous electrical nerve stimulation)  treatments to relieve the pain, reducing their dependence on prescription medications to get the pain relief they so badly need. TENS uses electrodes for neck pain or back pain, and while some people swear by such treatments, others find themselves wondering whether or not TENS really work to relieve pain. Keep reading to learn more about these electrodes for neck pain.

Why Try Electrodes for Neck Pain

A TENS treatment consists of electrodes for neck pain and other bodily pains through electrical stimulation therapy. Found in physical therapy and pain clinics, TENS uses electrodes placed on the skin around a painful or injured area with a small electrical charge running through the device to temporarily reduce pain.

The use of electrodes for pain is believed to reduce pain by using electrical impulses to flood the nervous system and reduce the nerves’ ability to transmit pain signals to the brain, while at the same time producing the body’s natural pain relievers called endorphins. While some studies suggest that this type of therapy does work, other studies are not Continue reading

Owning Your Keys: The Technical and Human Side of Encryption

Ever wonder if your next doctor’s appointment will result in jail time? Luckily most of us never have to think about that. But LGBT Tech Executive Director Chris Wood says for people in countries where their truth is outlawed, the prospect of finding a trusted healthcare provider without encrypted messaging apps is worse than grim. It could be deadly.

Efforts to weaken encryption threaten our ability to keep our most vulnerable communities safe online. As the best tool available to protect our digital security, encryption helps ensure that data and messages are kept private and make it much more difficult for outside parties to get access to sensitive information. Encryption helps ensure that your digital bank transactions are secure, your passwords are kept safe, and your stored data can’t be accessed by any unintended parties.

This security tool protects all Internet users, but it is critical for vulnerable communities. For example, there is an alarming and growing threat of abusive partners using Internet-connected devices and other online tools to surveil and control their partners. This can make it even more difficult for victims to seek help. However, by using devices and services that encrypt web traffic, communications, and location info, Continue reading

Prepare for the CompTIA certification exams with this $69 training bundle

No modern tech company can operate without a capable IT department, and as new companies launch each year, the demand for IT professionals will continue to grow. However, IT professionals must earn their certifications first, and CompTIA certifications are among the most versatile because they’re vendor-neutral. If you’re interested in earning a CompTIA certification, you can prepare with this $69 training bundle.To read this article in full, please click here

Red Hat announces RHEL 8.1 with predictable release cadence

Red Hat has just today announced the availability of Red Hat Enterprise Linux (RHEL) 8.1, promising improvements in manageability, security and performance.RHEL 8.1 will enhance the company’s open hybrid-cloud portfolio and continue to provide a consistent user experience between on-premises and public-cloud deployments.[Get regularly scheduled insights by signing up for Network World newsletters.] RHEL 8.1 is also the first release that will follow what Red Hat is calling its "predictable release cadence". Announced at Red Hat Summit 2019, this means that minor releases will be available every six months. The expectation is that this rhythmic release cycle will make it easier both for customer organizations and other software providers to plan their upgrades.To read this article in full, please click here

Red Hat announces RHEL 8.1 with predictable release cadence

Red Hat has just today announced the availability of Red Hat Enterprise Linux (RHEL) 8.1, promising improvements in manageability, security and performance.RHEL 8.1 will enhance the company’s open hybrid-cloud portfolio and continue to provide a consistent user experience between on-premises and public-cloud deployments.[Get regularly scheduled insights by signing up for Network World newsletters.] RHEL 8.1 is also the first release that will follow what Red Hat is calling its "predictable release cadence". Announced at Red Hat Summit 2019, this means that minor releases will be available every six months. The expectation is that this rhythmic release cycle will make it easier both for customer organizations and other software providers to plan their upgrades.To read this article in full, please click here

IDG Contributor Network: AI and 5G: Entering a new world of data

Today the telecom industry has identified the need for faster end-user-data rates. Previously users were happy to call and text each other. However, now mobile communication has converted our lives in such a dramatic way it is hard to imagine this type of communication anymore.Nowadays, we are leaning more towards imaging and VR/AR video-based communication. Therefore, considering such needs, these applications are looking for a new type of network. Immersive experiences with 360° video applications require a lot of data and a zero-lag network.To give you a quick idea, VR with a resolution equivalent to 4K TV resolution would require a bandwidth of 1Gbps for a smooth play or 2.5 Gbps for interactive; both requiring a minimal latency of 10ms and minimal delay. And that's for round-trip time. Soon these applications will target the smartphone, putting additional strains on networks. As AR/VR services grow in popularity, the proposed 5G networks will yield the speed and the needed performance.To read this article in full, please click here

Cisco forges tighter SD-WAN links to Microsoft Azure cloud, Office 365

Cisco and Microsoft this week extended their relationship to make it easier and more efficient for SD-WAN customers to set up and run direct Internet access to enterprise applications such as Office 365 and other Azure Cloud services.Specifically Cisco said it would integrate its SD-WAN package with Microsoft’s Azure Virtual WAN and Office365.  This amalgamation will let customers extend their WAN to Microsoft Azure Cloud and, in parallel, deliver optimized, secure Office 365 communications, according to Sachin Gupta, senior vice president, product management with Cisco’s Enterprise Networking Business.   To read this article in full, please click here

Cisco forges tighter SD-WAN links to Microsoft Azure cloud, Office 365

Cisco and Microsoft this week extended their relationship to make it easier and more efficient for SD-WAN customers to set up and run direct Internet access to enterprise applications such as Office 365 and other Azure Cloud services.Specifically Cisco said it would integrate its SD-WAN package with Microsoft’s Azure Virtual WAN and Office365.  This amalgamation will let customers extend their WAN to Microsoft Azure Cloud and, in parallel, deliver optimized, secure Office 365 communications, according to Sachin Gupta, senior vice president, product management with Cisco’s Enterprise Networking Business.   To read this article in full, please click here

Delivering a Multi Cloud and Cloud Native Operator Experience

Right around the same time I joined Arista in 2009, Amazon Web Services developed the concept of the Virtual Private Cloud, one of the seminal technologies that became a core construct deployed throughout public clouds enabling enterprise customers to corral and protect resources and provision them into logical groups, align security policies, and simplify their management. Following this, Google developed a model for Virtual Private Clouds that spanned regions allocating one subnet per region by default - creating the first multi-region VPC within a single cloud provider.

Arista Strives to Ease Networking, Development With CloudEOS

Blending the needs of DevOps and NetOps best positions companies to deliver the business outcomes...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Digital Realty acquisition of Interxion to reshape data-center landscape

Digital Realty Trust, one of the largest data center operators in the U.S., has agreed to acquire European data center provider Interxion for $8.4 billion. The deal will put DRT ahead of Equinix in terms of size and give the San Francisco company a massive move into Europe as well as the Middle East and AsiaThe deal is strategic and complementary. DRT has about 200 data centers, mostly in the U.S but with some foreign locations as well. Interxion is a major European player, with 53 data centers in 13 of the biggest European markets, including London, Paris, Frankfurt, and Amsterdam. READ MORE: Gartner’s top 10 strategic technology trends for 2020To read this article in full, please click here

Digital Realty acquisition of Interxion to reshape data-center landscape

Digital Realty Trust, one of the largest data center operators in the U.S., has agreed to acquire European data center provider Interxion for $8.4 billion. The deal will put DRT ahead of Equinix in terms of size and give the San Francisco company a massive move into Europe as well as the Middle East and AsiaThe deal is strategic and complementary. DRT has about 200 data centers, mostly in the U.S but with some foreign locations as well. Interxion is a major European player, with 53 data centers in 13 of the biggest European markets, including London, Paris, Frankfurt, and Amsterdam. READ MORE: Gartner’s top 10 strategic technology trends for 2020To read this article in full, please click here

Executing a Jinja2 Loop for a Subset of Elements

Imagine you want to create a Jinja2 report that includes only a select subset of elements of a data structure… and want to have header, footer, and element count in that report.

Traditionally we’d solve that challenge with an extra variable, but as Jinja2 variables don’t survive loop termination, the code to do that in Jinja2 gets exceedingly convoluted.

Fortunately, Jinja2 provides a better way: using a conditional expression to select the elements you want to iterate over.

Heavy Networking 483: SD-WAN Incompetence, Myths, And Fallacies

Managed Service Providers (MSPs) are trying to sell SD-WAN services by convincing you that you don't have the staff, training, or competence to operate an SD-WAN. On today's Heavy Networking, Greg Ferro and Ethan Banks pick this argument apart to see if there's anything to it.

The post Heavy Networking 483: SD-WAN Incompetence, Myths, And Fallacies appeared first on Packet Pushers.

Ansible vs. Nornir: Speed Challenge

When talking about Nornir and Ansible, speed is one of the topics that come up from time to time. A common argument for Nornir is that it performs better when working with either many hosts or lots of data. For some who hear this, it isn’t entirely clear what we mean. This article will look at some numbers. Recently I came across a quote by Kelsey Hightower that stuck with me.

“You haven’t mastered a tool until you understand when it should not be used.”

Let’s see if any of that can be applied here. Continue reading

Tech Bytes: Monitoring 100Gbps Circuits With AppNeta (Sponsored)

Today's Tech Bytes podcast explores active and passive monitoring techniques employed by sponsor AppNeta to monitor performance and end user experience on 100Gbps links. Our guests are Adam Edwards, Chief Customer Officer; and Mike Hustler, VP of Engineering at AppNeta.

The post Tech Bytes: Monitoring 100Gbps Circuits With AppNeta (Sponsored) appeared first on Packet Pushers.

Forrester: Edge computing is about to bloom

The next calendar year will be the one that propels edge computing into the enterprise technology limelight for good, according to a set of predictions from Forrester Research.While edge computing is primarily an IoT-related phenomenon, Forrester said that addressing the need for on-demand compute and real-time app engagements will also play a role in driving the growth of edge computing in 2020.[Get regularly scheduled insights by signing up for Network World newsletters.] What it all boils down to, in some ways, is that form factors will shift sharply away from traditional rack, blade or tower servers in the coming year, depending on where the edge technology is deployed. An autonomous car, for example, won’t be able to run a traditionally constructed server.To read this article in full, please click here