Today's Network Break is an Analyst Holiday Party. Instead of news coverage, we examine a few broad topics including whether Kubernetes has legs in the enterprise, the complexities of multi-cloud, the recent financial woes of legacy networking vendors, and more. Our party guests are Eric Hanselman, Chief Analyst at 451 Research; Brad Casemore, Research VP of Data Center Networks at IDC; and Keith Townsend, founder of The CTO Advisor.
The post Network Break 263: The Holiday Analyst Party Episode appeared first on Packet Pushers.
Now that T-Mobile US has laid a widespread 5G footprint, much of its future plans hang on the...
The integrated product combines AWS, Intel, and Adlink software and services to automate edge...
The company today said it hired Raj Yavatkar as the new CTO. Like Koley, Yavatkar previously headed...
Gold-plated Internet access: Ulukhaktok, a small town in Canada’s Northwest Territories, is exploring ways to build its own broadband network after complaints of slow speeds and data caps, Vice.com reports. The price for exceeding the 10 GB data cap cost one resident $1,200 for the month. As part of the community-led effort, several residents have completed training on community networks with the Internet Society, which is supporting the project.
Editing ordered: Singapore’s government has ordered Facebook to “correct” a user’s post that contained accusations about the arrest of a supposed whistleblower and election rigging, in the first use of the country’s fake news law, Reuters says. The government called the allegations “false” and “scurrilous” and ordered blogger Alex Tan to issue a correction. But Tan does not live in Singapore and says he is an Australian citizen, and he refused to comply.
China joins in: Meanwhile, the Chinese government is targeting fake news and deep fake videos under new Internet content rules, Reuters reports. In addition, any use of AI or virtual reality needs to be clearly marked in a prominent manner in the government’s efforts against deep fakes. Failure to follow the rules could be considered a criminal Continue reading
I stumbled upon a great MIT Technology Review article (warning: regwall ahead) with a checklist you SHOULD use whenever considering a machine-learning-based product.
While the article focuses on machine learning at least some of the steps in that list apply to any new product that claims to use a brand new technology in a particular problem domain like overlay virtual networking with blockchain:
Read more ...Juniper Guns for Cisco, Aruba With Mist AI; Michael Dell: The Future of Tech Is Autonomous; and HPE...
Industry observers agree that the outlook for IoT is up, but the trajectory of that growth and...
Starting with my faking disaster recovery tests blog post Terry Slattery wrote a great article delving into the intricacies of DR testing, types of expected disasters, and resilience engineering. As always, a fantastic read from Terry.
It’s the Thanksgiving holiday weekend in the US which means lots of people discussing things with their relatives. And, as is often the case, lots of arguments. It’s the nature of people to have a point of view and then to want to defend it. And it’s not just politics or other divisive topics. We see it all the time in networking too.
EIGRP vs OSPF. Cisco vs Juniper. ACI vs NSX. You name it and we’ve argued about it. Every viewpoint has a corresponding counterpart. Yes, there are good points for using one versus the other. But there are also times when every piece of factual information doesn’t matter because we “know” the right answer.
It’s those times when we run into what I call the “Perry Mason Problem”. It’s a reminder of the old Perry Mason TV show when the lawyer in the title would win a case with a carefully crafted statement that just ends any arguments. It’s often called a Wham Line or an Armor-Piercing Question. Basically, Mr. Mason would ask a question or make a statement that let all the air out of the argument. And often it would result in him winning the case Continue reading
Welcome to part four of this series. This this final part, we will explore our options for networking a composed application, from a de-composed monolith or set of microservices.
Here is a logical set of options:
Proxy: Having a network kernel, ADC or proxy for every component to handle implementation of the service chain. Sidecars quickly solve an issue, but double component count within a mesh. Proxies work well in public and private clouds, but for commercial applications may incur license costs as well as higher resource utilisation to cover the sidecar container.
Language specific libraries: which wrap your application packets in a NSH handling outer encapsulation. No sidecar required, no modification of a host. This adds complexity to software development in terms of modified socket libraries, but a well designed and implemented library does not expose the complexity. All your code has to do, is accept connections through a modified socket library. This works in the cloud providing security policies and routing domains allow it.
Overlay: Add flow data to forwarding entities. Let’s face it, this isn’t going to happen in a cloud environment unless you’ve implemented a full overlay. An OpenVSwitch (OVS) overlay network would Continue reading