Archive

Category Archives for "Networking"

VMware opens, reinforces hybrid-cloud migration software

VMware customers can now  migrate non-vSphere as well as incresed amounts of on-premises application workloads to a variety of cloud services with a new release of the company’s Hybrid Cloud Extension (HCX) application-mobility software.Introduced in 2017, VMware HCX lets vSphere customers tie together on-premises systems and applications with a variety of cloud services.  vSphere VMware's flagship virtualization platform.  More about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space HCX includes services such as routing and WAN optimization and can utilize other VMware products and services such as the firm’s core networking software, NSX. NSX is targeted at organizations looking to support multivendor cloud-native applications, bare-metal workloads, hypervisor environments and the growing hybrid and multicloud worlds.  HCX is also included in other VMware packages such as its VMware Cloud on AWS.To read this article in full, please click here

VMware opens, reinforces hybrid-cloud migration software

VMware customers can now migrate non-vSphere, as well as increased amounts of on-premises application workloads, to a variety of cloud services with a new release of the company’s Hybrid Cloud Extension (HCX) application-mobility software.Introduced in 2017, VMware HCX lets vSphere customers tie together on-premises systems and applications with a variety of cloud services. vSphere VMware's flagship virtualization platform.  More about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space HCX includes services such as routing and WAN optimization and can utilize other VMware products and services such as the firm’s core networking software, NSX. NSX is targeted at organizations looking to support multivendor cloud-native applications, bare-metal workloads, hypervisor environments and the growing hybrid and multicloud worlds.  HCX is also included in other VMware packages such as its VMware Cloud on AWS.To read this article in full, please click here

VMware opens, reinforces hybrid-cloud migration software

VMware customers can now  migrate non-vSphere as well as incresed amounts of on-premises application workloads to a variety of cloud services with a new release of the company’s Hybrid Cloud Extension (HCX) application-mobility software.Introduced in 2017, VMware HCX lets vSphere customers tie together on-premises systems and applications with a variety of cloud services.  vSphere VMware's flagship virtualization platform.  More about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space HCX includes services such as routing and WAN optimization and can utilize other VMware products and services such as the firm’s core networking software, NSX. NSX is targeted at organizations looking to support multivendor cloud-native applications, bare-metal workloads, hypervisor environments and the growing hybrid and multicloud worlds.  HCX is also included in other VMware packages such as its VMware Cloud on AWS.To read this article in full, please click here

VMware opens, reinforces hybrid-cloud migration software

VMware customers can now migrate non-vSphere, as well as increased amounts of on-premises application workloads, to a variety of cloud services with a new release of the company’s Hybrid Cloud Extension (HCX) application-mobility software.Introduced in 2017, VMware HCX lets vSphere customers tie together on-premises systems and applications with a variety of cloud services. vSphere VMware's flagship virtualization platform.  More about backup and recovery: Backup vs. archive: Why it’s important to know the difference How to pick an off-site data-backup method Tape vs. disk storage: Why isn’t tape dead yet? The correct levels of backup save time, bandwidth, space HCX includes services such as routing and WAN optimization and can utilize other VMware products and services such as the firm’s core networking software, NSX. NSX is targeted at organizations looking to support multivendor cloud-native applications, bare-metal workloads, hypervisor environments and the growing hybrid and multicloud worlds.  HCX is also included in other VMware packages such as its VMware Cloud on AWS.To read this article in full, please click here

Kernel of Truth season 2 episode 12: Innovation in the data center

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

In this podcast we have an in-depth conversation about the different types and levels of innovation in the data center and where we see it going. Spiderman aka Rama Darbha and host Brian O’Sullivan are joined by a new guest to the podcast, VP of Marketing Ami Badani. They share that while innovation in the data center doesn’t appear sexy, outside of network engineers, in reality there has been a huge paradigm shift in the way data centers have built and operated last 3 years. So what does that mean? How is automation involved in this conversation? Listen here to find out.

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a variety of jobs, including Continue reading

A data-transmission revolution is underway

Radical data communications technologies are in development in a slew of academic scientific labs around the world. While we’ve already seen, and gotten used, to a shift from data sent being over copper wire to light-based, fiber-optic channels (and the resulting capacity and speed increases), much of the thrust by engineers today is in the area of semiconductor improvements, in part to augment those pipes.The work includes a potential overall shift to photons and light, not wires on chips, and even more revolutionary ideas such as the abandonment of not only silicon, but also the traditional electron.To read this article in full, please click here

IPv6 Buzz 032: LinkedIn Recruits IPv6 – Challenges And Lessons Learned

LinkedIn has been working with IPv6 for years. On today's IPv6 Buzz episode, LinkedIn engineer Franck Martin discusses the technical and cultural challenges of adoption, explores why the company engaged with IPv6, and shares lessons to help others with their own deployments.

The post IPv6 Buzz 032: LinkedIn Recruits IPv6 – Challenges And Lessons Learned appeared first on Packet Pushers.

Save the Date: 4th Summit on Community Networks in Africa


The 4th Summit on Community Networks (CNs) in Africa will take place in Dodoma, Tanzania from 28 October to 2 November 2019. The Summit hopes to promote the creation and growth of CNs, increase collaboration between CN operators in the region, and provide an opportunity for them to engage with other stakeholders.

The main activities planned include:

  • Training Workshop: 28-29 October
  • CN Summit Plenary: 30-31 October
  • Site Visit to Kondoa Community Network: 1-2 November

The event is targeted at CN operators, policy makers, researchers, evangelists, sponsors, and related networks such as community radio.

Last year over 100 participants from 20 countries, 13 of them African, gathered in Wild Lubanzi, in one of the deepest rural areas of the Eastern Cape. The 3rd Summit on CNs in Africa was organized by the Internet Society,Zenzeleni Networks NPC, and APC from 2-7 September 2018. For the approximate 40 participants from surrounding communities, the Summit was their first international conference – or conference of any kind. It was exciting to see them absorb everything and feel proud of their neighbors in Mankosi, home of the Zenzeleni project, one of many community networks in Africa.

CNs offer local solutions to the connectivity Continue reading

How to manipulate PDFs on Linux

While PDFs are generally regarded as fairly stable files, there’s a lot you can do with them on both Linux and other systems. This includes merging, splitting, rotating, breaking into single pages, encrypting and decrypting, applying watermarks, compressing and uncompressing, and even repairing. The pdftk command does all this and more.The name “pdftk” stands for “PDF tool kit,” and the command is surprisingly easy to use and does a good job of manipulating PDFs. For example, to pull separate files into a single PDF file, you would use a command like this:$ pdftk pg1.pdf pg2.pdf pg3.pdf pg4.pdf pg5.pdf cat output OneDoc.pdf That OneDoc.pdf file will contain all five of the documents shown and the command will run in a matter of seconds. Note that the cat option directs the files to be joined together and the output option specifies the name of the new file.To read this article in full, please click here

REST API 2. Basics cheat sheet (Ansible, Bash, Postman, and Python) for POST/DELETE using NetBox and Docker as examples

Hello my friend,

In the previous blogpost, we started the exciting journey in the world of REST API, where you have learned how to collect the information using GET method. Today you will learn how to create the objects using POST method and remove them using DELETE.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Disclaimer

This article is a continuation of the previous one. You should start with that to get the full picture.

What are we going to test?

You will learn how to use two requests

  1. POST for adding new information
  2. DELETE for removing the entries

As you might remember, the interaction with the REST API is described by CRUD model, what stands for Create, Read, Update, and Delete. In this concept, HTTP POST method represents Create and DELETE represents Delete operaions.

To put the context, Digital Ocean NetBox and Docker are the applications, which we will manage over the REST API.

Software version

The following Continue reading

How to get a handle on multicloud management

As enterprises pile more cloud activities onto the platforms of more cloud providers, many IT and network managers are feeling overwhelmed because each cloud provider comes with its own toolset, rules and user demands. In a multicloud environment, this convoluted mixture quickly leads enterprises into a pit of complexity, confusion and cost.Coming to the rescue are more than a dozen vendors, ranging from IT stalwarts to startups, offering multicloud management tools designed to bring order, control and insight to data centers juggling multiple cloud services. IBM, BMC Software, Cisco, Dell Technologies Cloud, DXC Technology, VMware, HyperGrid, and Divvycloud are just some of the firms promising stable and reliable multicloud management. Many cloud services also provide some degree of management and integration with other cloud providers.To read this article in full, please click here

BrandPost: WAN Transformation: It’s More Than SD-WAN

As an IT leader, you’re expected to be the technology vanguard of your organization. It is you who must deflate technology hype and devise the technology plan to keep the organization competitive.Addressing the WAN is, of course, essential to that plan. The high costs and limited agility of legacy MPLS-based networks are well known. What’s less clear is how to transform the enterprise network in a way that will remain agile and efficient for decades to come.Many mistakenly assume SD-WAN to be that transformation. After all, SD-WAN brings agility, scalability, and cost efficiencies lacking in telco-managed MPLS services.  But while a critical step, SD-WAN alone is insufficient to address the networking challenges you’re likely to face today — and tomorrow. Here’s why.To read this article in full, please click here

Real Robots That Look Or Act Like Humans

Technology has been advancing by leaps and bounds. Currently, scientists and tech experts are designing artificial intelligence (AI)-programmed robots that look and act like humans. While they’re not a standard in our society quite yet, this social robot technology is real and has drastically advanced over the last few decades to the point where these humanistic look-alike robots called androids are springing up all over the place – even in Whitney Cummings’ latest Netflix standup special!

These robots are being developed to someday take over jobs in retail, hospitality, health care, child and elderly care, and even as policemen. But are these android robots as human-looking and acting as scientists would have you believe? Let’s take a closer look and see if they really are as humane as their real-life counterparts.

Superficial Robots that Resemble … Us

Scientists have built AI-driven robots that have two arms, two legs, a complete and realistic face with hair and facial expressions. Some of them can smile or frown, sit or stand, and do a number of human jobs. 

From photographs and YouTube videos, many of these robots look like humans wearing a wig. However, a more close-up view leaves them resembling life-sized Continue reading

Day Two Cloud 015: How To Prepare For And Run Azure Stack

What exactly are Day Two operations for Azure Stack? Does your company have the skill sets to properly manage and support your newly deployed hybrid cloud infrastructure? Today's episode, with guest Kristopher Turner, examines all the things you have to account for when planning and then running this integrated system.

The post Day Two Cloud 015: How To Prepare For And Run Azure Stack appeared first on Packet Pushers.

Working Together for an Internet for Women

How can we get more girls and young women involved in the Internet?

Since 2017, the Internet Society’s Women SIG has developed global actions to promote gender equality and to develop digital skills and leadership among girls and young women.

With the support of several Chapters of the Internet Society, we’ve organized global face-to-face and virtual events on security and privacy issues focused on girls and women. But this work can’t be done alone, which is why we’ve promoted collaboration within organizations, government, civil society, companies, academia, and the technical community to organize events that have a positive impact on the Internet community. (We also collaborate with EQUALS Global Partnership.)

This year, to commemorate the International Day of Girls in ICT, promoted by the International Telecommunications Union (ITU), which aims to reduce the digital gender gap and to encourage and motivate girls to participate in tech careers, we organized a series of workshops focused on digital skills for girls. The main node was organized in conjunction with the Internet Society Chapter in Guatemala and the Spain Cultural Center in Guatemala.

We also had a global celebration in El Salvador, Mexico, Panama, Honduras, Hong Kong, Burkina Faso, Senegal, Armenia, Continue reading

Tigera Secure 2.5 – Implement Kubernetes Network Security Using Your Firewall Manager

We are excited to announce the general availability of Tigera Secure 2.5. With this release, security teams can now create and enforce security controls for Kubernetes using their existing firewall manager.

Containers and Kubernetes adoption are gaining momentum in enterprise organizations. Gartner estimates that 30% of organizations are running containerized applications today, and they expect that number to grow to 75% by 2022. That’s tremendous growth considering the size and complexity of enterprise IT organizations. It’s difficult to put exact metrics on the growth in Kubernetes adoption; however, KubeCon North America attendance is a good proxy. KubeCon NA registrations grew from 1,139 in 2016 to over 8,000 in 2018 and are expected to surpass 12,000 this December, and the distribution of Corporate Registrations has increased dramatically.

KubeCon Registrations

Despite this growth, Kubernetes is a tiny percentage of the overall estate the security team needs to manage; sometimes less than 1% of total workloads. Security teams are stretched thin and understaffed, so it’s no surprise that they don’t have time to learn the nuances of Kubernetes and rethink their security architecture, workflow, and tools for just a handful of applications. That leads to stalled deployments and considerable friction between the application, infrastructure, Continue reading

IPv6 SLAAC Host OS Address Allocation

IPv6 SLAAC Host OS Address Allocation

While rebuilding my v6 lab with a variety different host OS, I found that there is no single approach to address generation in IPv6 SLAAC networks.

I've recorded my findings below for future reference, but also as a good way to delve deeper into the murky world of IPv6 address generation and shine a light on just what is all this stuff in our 'ifconfig/ip add' commands.

TL;DR

The table below summarizes my observations

| OS | Address Generation | Temporary Address |
|--------|---|---|---|---|
| macOS 10.14.6 | Stable-privacy | Yes |
| Ubuntu 18.04 | Stable-privacy | Yes |
| Debian 10 | EUI-64👈👀 | Yes |
| Fedora 30 | Stable-privacy | No 👈👀|
| Windows 10 1903 | Randomized IID | Yes |

Lab Setup

I'm running a basic LAN topology with a combination of hardware (Windows 10 and macOS), plus virtual machines for the Linux OS.

  • Virtualization platform: Hyper-V on Windows 2019 Server
  • Host OS:
    • Windows 10 running on an HP Z book.
    • macOS version 10.14.6 running on a MBP 2017
    • Ubuntu 18.04.3
    • Fedora 30
    • Debian 10 Stable
  • Gateway: ArubaOS-Switch 2930F-8G-PoE+-2SFP+ running WC.16.07.0002

Gateway configuration:

ipv6  Continue reading