Operators are showing increasing signs of launching both NB-IoT and LTE-M, although NB-IoT...
Lightbits Labs has announced a software defined storage with hardware acceleration product. In a nutshell, the product is a global flash translation layer that decouples SSDs and compute. Put your compute wherever, mount a box full of fast storage via Lightbits using the NVMe over TCP protocol, and get storage latency that performs like directly attached storage, but without the waste of space. Lightbits is aiming this offering at folks running their own composable stack who want an API and storage speed. But another big winning use case? iSCSI replacement. Hmm...interesting!
The post BiB 074: Replace iSCSI With NVMe/TCP From Lightbits Labs appeared first on Packet Pushers.
An attendee of our Building Network Automation Solutions online course decided to automate his NSX-T environment and sent me this question:
I will be working on NSX-T quite a lot these days and I was wondering how could I automate my workflow (lab + production) to produce a certain consistency in my work.
I’ve seen that VMware relies a lot on PowerShell and I’ve haven’t invested a lot in that yet … and I would like to get more skills and become more proficient using Python right now.
Always select the most convenient tool for the job, and regardless of personal preferences PowerShell seems to be the one to use in this case.
Read more ...AWS built encryption into nearly all of its 165 cloud services, Vogels said. “Make use of it.”
This follows data from Synergy Research Group that hyperscale operators increased their capex by 48...
Fundamentally, the Internet model is that independent networks connect to one another and, all together, provide the global Internet.
The independent networks may be enterprises with business services and employees connected to them, they may be cloud service providers or residential Internet service providers. They are independent in the way that they choose their business models, build and manage their networks, and compete with their neighbors; they offer, however, global connectivity by adhering (voluntarily) to a set of open Internet standards that enable interoperability. To connect on the Internet is inherently to do so voluntarily via open protocols. A different architecture might use different choices, but these are the ones the Internet uses.
All these independent networks interoperate and form an Internet by participating in a global routing system, subject only to technical standards and agreements with neighbors (the technical terms here are peering and transit). The magic of the Internet is that in order to communicate between a mobile phone connected to a broadband provider in the Netherlands and a server in a data center in Kenya, the two networks at either end of the connection do not need a relationship with each other. The magic of the Continue reading
The European Commission is seeking unity among member states on future 5G security, and leaves any...
If there is one question I get most often, it is “how do you get so much done?” One answer to this question is: I limit my use of social media. There is, another angle to social media use which is a bit more… philosophical.
Some of you might know that I am currently working on a PhD in Philosophy—which might seem like an odd thing to do for someone who has been in the engineering world for, well, pretty much my entire life. My particular area of study, however, is what might be called media ecology and humanness. How do these two interact? What impact does, for instance, social media have on things like human freedom and dignity?
Social media (and mediated reality in general) has a bad habit of making people into objects—objectification is just part of the mediation process. If you go “all in” to the mediated world, then you become wholly mediated. This is ultimately dehumanizing, and a very bad thing.
Returning to the first question I raised above: what impact does social media have on my use of time? Does it make me more or less productive?
If we think social media does have Continue reading
We are pleased to announce that nominations for the 2019 Jonathan B. Postel Service Award are now open. Do you know someone who should be a recipient?
This annual award is presented to an individual or organization that has made outstanding contributions in service to the data communications community and places particular emphasis on those who have supported and enabled others.
Nominations are encouraged for individuals or teams of individuals from across the data communications industry around the world who are dedicated to the efforts of advancing the Internet for the benefit of everybody.
Past Postel award winners include Steven G. Huter for “his leadership and personal contributions at the Network Startup Resource Center that enabled countless others to develop the Internet in more than 120 countries,” kc claffy for her pioneering work on Internet measurement, Mahabir Pun for his key role in bringing the Internet to rural Nepal with the founding of the Nepal Wireless Networking Project, and Bob Braden and Joyce K. Reynolds for their stewardship of the RFC (Request for Comments) series.
The signature crystal globe and a USD 20,000 prize will be presented at the IETF 105 in Montreal, Canada (20-26 July 2019) to the chosen Continue reading
Programmable chip and analytics software are helping deliver on the 5G promises of lower latency...
Just because your application is in the cloud doesn't mean you can forget about resiliency. On today's Datanauts episode, guest Tom Vachon shares insights and tips on how to design a resilient infrastructure in Azure. We discuss availability zones, availability sets, paired regions, and more, as well as how to balance cost against resilience, and the role of DNS.
The post Datanauts 161: Building Application Resilience On Azure appeared first on Packet Pushers.
Industry analysts remain convinced that operators and the global ecosystem of vendors will...
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – OpenConfig – Anees Shaikh and Rob Shakir appeared first on Network Collective.
Today we are happy to release the source code of a project we’ve been working on for the past few months. It is called BoringTun, and is a userspace implementation of the WireGuard® protocol written in Rust.
WireGuard is relatively new project that attempts to replace old VPN protocols, with a simple, fast, and safe protocol. Unlike legacy VPNs, WireGuard is built around the Noise Protocol Framework and relies only on a select few, modern, cryptographic primitives: X25519 for public key operations, ChaCha20-Poly1305 for authenticated encryption, and Blake2s for message authentication.
Like QUIC, WireGuard works over UDP, but its only goal is to securely encapsulate IP packets. As a result, it does not guarantee the delivery of packets, or that packets are delivered in the order they are sent.
The simplicity of the protocol means it is more robust than old, unmaintainable codebases, and can also be implemented relatively quickly. Despite its relatively young age, WireGuard is quickly gaining in popularity.
While evaluating the potential value WireGuard could provide us, we first considered the existing implementations. Currently, there are three usable implementations