Archive

Category Archives for "Networking"

Mist’s AI-driven virtual assistant speeds up network troublshooting

The use of digital or virtual assistants and chatbots has picked up momentum with the rise of artificial intelligence (AI). These automated assistants have been around for years, but they haven't been all that useful, as they required a significant amount of programming to look for certain keywords and then the responses were based on logical guesses. The infusion of AI, however, has made these systems much smarter and now natural language queries can be made and responses are in plain English (or other languages).Many businesses have adopted digital assistants and chatbots to improve customer service. For example, Atom Tickets uses conversational AI to enable people to book movie tickets and even dinner with just a short sentence instead of having to go through the rigmarole of going back and forth with discrete commands.To read this article in full, please click here

Mist’s AI-driven virtual assistant speeds up network troubleshooting

The use of digital or virtual assistants and chatbots has picked up momentum with the rise of artificial intelligence (AI). These automated assistants have been around for years, but they haven't been all that useful, as they required a significant amount of programming to look for certain keywords and then the responses were based on logical guesses. The infusion of AI, however, has made these systems much smarter and now natural language queries can be made and responses are in plain English (or other languages).Many businesses have adopted digital assistants and chatbots to improve customer service. For example, Atom Tickets uses conversational AI to enable people to book movie tickets and even dinner with just a short sentence instead of having to go through the rigmarole of going back and forth with discrete commands.To read this article in full, please click here

Analysis: Extreme Buys Aerohive. Not bad.

I’ve been trawling through the Extreme Networks Announces Intent to Acquire Aerohive Networks – Investor Presentation – https://investor.extremenetworks.com/static-files/16c92f7a-212b-48ae-86bc-aa132251b1af I’ve picked out some highlights for those people wondering about Key Takeaways Aerohive can be positioned to compete with Meraki which is good fit for existing customers. Extreme gets a basis on which to build SDWAN products that […]

The post Analysis: Extreme Buys Aerohive. Not bad. appeared first on EtherealMind.

Day Two Cloud 012: Cloud Data Warehouse Migration – A Layer Cake Of Complexity

Data warehouses are complex beasts. If you want to migrate a warehouse to the cloud, there's a lot of layers to consider including encryption and security, automation, data sovereignty, right-sizing, which migration tools to use, and more. Today's Day Two Cloud podcast slices through the layers of complexity of data warehouse migration with guest Deepak Kaushik.

The post Day Two Cloud 012: Cloud Data Warehouse Migration – A Layer Cake Of Complexity appeared first on Packet Pushers.

Day Two Cloud 012: Cloud Data Warehouse Migration – A Layer Cake Of Complexity

Data warehouses are complex beasts. If you want to migrate a warehouse to the cloud, there's a lot of layers to consider including encryption and security, automation, data sovereignty, right-sizing, which migration tools to use, and more. Today's Day Two Cloud podcast slices through the layers of complexity of data warehouse migration with guest Deepak Kaushik.

Extremely Hive Minded

I must admit that I was wrong. After almost six years, I was mistake about who would end up buying Aerohive. You may recall back in 2013 I made a prediction that Aerohive would end up being bought by Dell. I recall it frequently because quite a few people still point out that post and wonder what if it’s happened yet.

Alas, June 26, 2019 is the date when I was finally proven wrong when Extreme Networks announced plans to purchase Aerohive for $4.45/share, which equates to around $272 million paid, which will be adjust for some cash on hand. Aerohive is the latest addition to the Extreme portfolio, which now includes pieces of Brocade, Avaya, Enterasys, and Motorola/Zebra.

Why did Extreme buy Aerohive? I know that several people in the industry told me they called this months ago, but that doesn’t explain the reasoning behind spending almost $300 million right before the end of the fiscal year. What was the draw that have Extreme buzzing about this particular company?

Flying Through The Clouds

The most apparent answer is HiveManager. Why? Because it’s really the only thing unique to Aerohive that Extreme really didn’t have already. Aerohive’s APs Continue reading

SoftBank plans drone-delivered IoT and internet by 2023

A Japanese telecommunications giant and a California-based drone builder intend to start a drone-delivered internet service by 2023. The two companies, Softbank and AeroVironment, say they’ve assembled the first one already, according to materials (pdf) on SoftBank’s website in April.The HAWK30 drone has a wingspan of 260 feet and is powered by solar panels mounted on the wings that drive 10 electric motors. The unmanned aerial vehicle (UAV) will fly in the stratosphere at 65,000 feet above sea level (12 miles), AeroVironment says in a press release. That’s around twice the altitude that many passenger planes fly at.To read this article in full, please click here

Network-as-a-Service Part 3 – Authentication and Admission control

In the previous two posts, we’ve seen how to build a custom network API with Kubernetes CRDs and push the resulting configuration to network devices. In this post, we’ll apply the final touches by enabling oAuth2 authentication and enforcing separation between different tenants. All of these things are done while the API server processes incoming requests, so it would make sense to have a closer look at how it does that first.

Kubernetes request admission pipeline

Every incoming request has to go through several stages before it can get accepted and persisted by the API server. Some of these stages are mandatory (e.g. authentication), while some can be added through webhooks. The following diagram comes from another blogpost that covers each one of these stages in detail:

Specifically for NaaS platform, this is how we’ll use the above stages:

  1. All users will authenticate with Google and get mapped to individual namespace/tenant based on their google alias.
  2. Mutating webhook will be used to inject default values into each request and allow users to define ranges as well as individual ports.
  3. Object schema validation will do the syntactic validation of each request.
  4. Validating webhook will perform the semantic validation to make Continue reading

The deep-dive into how Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Monday

A recap on what happened Monday

The deep-dive into how Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Monday

On Monday we wrote about a painful Internet wide route leak. We wrote that this should never have happened because Verizon should never have forwarded those routes to the rest of the Internet. That blog entry came out around 19:58 UTC, just over seven hours after the route leak finished (which will we see below was around 12:39 UTC). Today we will dive into the archived routing data and analyze it. The format of the code below is meant to use simple shell commands so that any reader can follow along and, more importantly, do their own investigations on the routing tables.

This was a very public BGP route leak event. It was both reported online via many news outlets and the event’s BGP data was reported via social media as it was happening. Andree Toonk tweeted a quick list of 2,400 ASNs that were affected.

Using RIPE NCC archived data

The RIPE NCC operates a very useful archive of BGP routing. Continue reading

The deep-dive into how Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Monday

A recap on what happened Monday

The deep-dive into how Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Monday

On Monday we wrote about a painful Internet wide route leak. We wrote that this should never have happened because Verizon should never have forwarded those routes to the rest of the Internet. That blog entry came out around 19:58 UTC, just over seven hours after the route leak finished (which will we see below was around 12:39 UTC). Today we will dive into the archived routing data and analyze it. The format of the code below is meant to use simple shell commands so that any reader can follow along and, more importantly, do their own investigations on the routing tables.

This was a very public BGP route leak event. It was both reported online via many news outlets and the event’s BGP data was reported via social media as it was happening. Andree Toonk tweeted a quick list of 2,400 ASNs that were affected.

This blog contains a large number of acronyms and those are explained at the end of Continue reading