Bulking Up The File System for A World Of Clouds And Edges

The challenge of managing data is growing faster than the data itself is piling up, and that is bad except for the companies that can create new tools to manage it, either to use internally as the hyperscalers do or to sell to those who cannot fund such development and count on vendors to do it.

Bulking Up The File System for A World Of Clouds And Edges was written by Jeffrey Burt at The Next Platform.

IPv6 Buzz 046: Managing Networks With IPv6 And NAT64

In this week's IPv6 Buzz episode, we talk to Cody Christman about managing networks with IPv6 using the critical transition/translation technology NAT64. We cover why overlapping IPv4 addresses are a big driver for using NAT64, the technical debt of IPv4 NAT, how IPv6 re-simplifies networking, and more.

The post IPv6 Buzz 046: Managing Networks With IPv6 And NAT64 appeared first on Packet Pushers.

Docker Desktop for Windows Home is here!

Last year we announced that Docker had released a preview of Docker Desktop with WSL 2 integration. We are now pleased to announce that we have completed the work to enable experimental support for Windows Home WSL 2 integration. This means that Windows Insider users on 19040 or higher can now install and use Docker Desktop!

Feedback on this first version of Docker Desktop for Windows Home is welcomed! To get started, you will need to be on Windows Insider Preview build 19040 or higher and install the Docker Desktop Edge 2.2.2.0.

What’s in Docker Desktop for Windows Home?

Docker Desktop for WSL 2 Windows Home is a full version of Docker Desktop for Linux container development. It comes with the same feature set as our existing Docker Desktop WSL 2 backend. This gives you: 

  • Latest version of Docker on your Windows machine 
  • Install Kubernetes in one click on Windows Home 
  • Integrated UI to view/manage your running containers 
  • Start Docker Desktop in <5 seconds
  • Use Linux Workspaces
  • Dynamic resource/memory allocation 
  • Networking stack, support for http proxy settings, and trusted CA synchronization 

How do I get started developing with Docker Desktop? 

For the best experience of developing Continue reading

Headcount: Firings, Hirings, and Retirings — February 2020

SAP revamped org structure, exited 2 board members; Intel slashed jobs despite record quarter; plus...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The History of the URL

The History of the URL

On the 11th of January 1982 twenty-two computer scientists met to discuss an issue with ‘computer mail’ (now known as email). Attendees included the guy who would create Sun Microsystems, the guy who made Zork, the NTP guy, and the guy who convinced the government to pay for Unix. The problem was simple: there were 455 hosts on the ARPANET and the situation was getting out of control.

The History of the URL

This issue was occuring now because the ARPANET was on the verge of switching from its original NCP protocol, to the TCP/IP protocol which powers what we now call the Internet. With that switch suddenly there would be a multitude of interconnected networks (an ‘Inter... net’) requiring a more ‘hierarchical’ domain system where ARPANET could resolve its own domains while the other networks resolved theirs.

Other networks at the time had great names like “COMSAT”, “CHAOSNET”, “UCLNET” and “INTELPOSTNET” and were maintained by groups of universities and companies all around the US who wanted to be able to communicate, and could afford to lease 56k lines from the phone company and buy the requisite PDP-11s to handle routing.

The History of the URL

In the original ARPANET design, a central Network Information Center Continue reading

Best Computer for Engineering Students

Engineering students need a computer that is portable, has good CPU speed, lots of memory, great graphics, and is affordable, which means that the laptops useful for most students simply won’t be the best computer for engineering students. Ironically, the laptops that make the best computers for students in engineering are gaming computers.

Why Gaming Computers are the Best Computers for Engineering Students

The reason why gaming laptops tend to be the best computers for engineering students is because the features that make these laptops good for gaming are also the same features that engineering students need, including:

  • A fast CPU speed
  • Plenty of hard drive memory
  • At least 8GB of RAM
  • Wi-Fi and Bluetooth connectivity
  • Excellent graphics
  • Reasonable cost

While good gaming computers aren’t cheap, unless someone is a real hardcore gamer, gaming computers can be acquired for between $1,000 and $2,000, which is cheaper and much more portable than a workstation for engineering students. In addition, while great for completing engineering tasks, gaming computers will also allow engineering students to play games, as well as do all the things that regular laptops do.

This allows engineering students to save and share their work, as well as use the Continue reading

Cloud Networking Transformation Ahead

Networking is undergoing a metamorphosis. Today’s operations are challenged to cope with the DevOps, NetOps, SecOps and CloudOps models that need consistent operations control. Why should enterprises care? How do you cope with decades of legacy and is change possible? Arista believes that the networking world is at the cusp of a transformation, significantly facilitated by the agile, dynamic and economic network models of the public cloud providers. They have proven the elegance of simple yet scalable designs that transform siloed networks for the data center, core, campus or branch PINs (Places in the Network) into east west PICs(Places in the Cloud). This new paradigm is a far cry from the traditional siloed network architectures that required applications to be assigned to specific servers or storage, causing fixed-function rigidity. Agility and high availability are pivotal foundations to building the new PICs.

Should I Go with VXLAN or MLAG with STP?

TL&DR: It’s 2020, and VXLAN with EVPN is all the rage. Thank you, you can stop reading.

On a more serious note, I got this questions from an Johannes Spanier after he read my do we need complex data center switches for NSX underlay blog post:

Would you agree that for smaller NSX designs (~100 hypervisors) a much simpler Layer2 based access-distribution design with MLAGs is feasible? One would have two distribution switches and redundant access switches MLAGed together.

I would still prefer VXLAN for a number of reasons:

Should I Go with VXLAN or MLAG with STP?

TL&DR: It’s 2020, and VXLAN with EVPN is all the rage. Thank you, you can stop reading.

On a more serious note, I got this questions from an Johannes Spanier after he read my do we need complex data center switches for NSX underlay blog post:

Would you agree that for smaller NSX designs (~100 hypervisors) a much simpler Layer2 based access-distribution design with MLAGs is feasible? One would have two distribution switches and redundant access switches MLAGed together.

I would still prefer VXLAN for a number of reasons:

Read more ...

Rust: Constants, Variables, and Mutability – Oh My!

In the last post I wrote about my journey from Python to Go as my primary language, and how I am now exploring Rust. This will be the first in a series of posts on Rust, mostly written from this perspective. I realize not everyone is going to Rust from Go, but that’s my perspective, and it will be impossible to keep this perspective from showing through and making comparisons between Rust and Go or Python.

AT&T Puts More Jobs on the Chopping Block

Continued job losses at one of the world’s largest network operators underlines the impact...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

COVID-19 affects IT pros at work

The COVID-19 virus has already forced cancellation of major technology conferences, Mobile World Congress being the first and most notable, and others could follow, but there are more immediate effects on IT professionals.The availability of servers is projected to be reduced due to scaled back or halted production in China, where efforts to contain the coronavirus include closing factories. The center of the outbreak, Wuhan, is also the center of display production.10 of the world's fastest supercomputers Processor manufacturer Nvidia acknowledges the effects of the virus on its production and predicts a $100 million revenue hit next quarter because of it.To read this article in full, please click here

Covid-19 affects IT pros at work

The Covid-19 virus has already forced cancellation of major technology conferences, Mobile World Congress being the first and most notable, and others could follow, but there are more immediate effects on IT professionals.The availability of servers is projected to be reduced due to scaled back or halted production in China, where efforts to contain the coronavirus include closing factories. The center of the outbreak, Wuhan, is also the center of display production.10 of the world's fastest supercomputers Processor manufacturer Nvidia acknowledges the effects of the virus on its production and predicts a $100 million revenue hit next quarter because of it.To read this article in full, please click here

Daily Roundup: Cumulus Touts Open Source Network Automation

Cumulus added open source network automation; Telefónica to lead yet another edge alliance; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

4 Ways SD-Branch Is Transforming Retail Networks

Retail SD-branch can help a business retain customers, offer them better service, and increase...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

CNCF Survey Underscores Cloud Native Popularity

Results from CNCF's annual survey indicate growing ubiquity of the use of cloud native technologies...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

A requirements spec for voting

In software development, we start with a "requirements specification" defining what the software is supposed to do. Voting machine security is often in the news, with suspicion the Russians are trying to subvert our elections. Would blockchain or mobile phone voting work? I don't know. These things have tradeoffs that may or may not work, depending upon what the requirements are. I haven't seen the requirements written down anywhere. So I thought I'd write some.


One requirement is that the results of an election must seem legitimate. That's why responsible candidates have a "concession speech" when they lose. When John McCain lost the election to Barack Obama, he started his speech with:
"My friends, we have come to the end of a long journey. The American people have spoken, and they have spoken clearly. A little while ago, I had the honor of calling Sen. Barack Obama — to congratulate him on being elected the next president of the country that we both love."
This was important. Many of his supporters were pointing out irregularities in various states, wanting to continue the fight. But there are always irregularities, or things that look like irregularities. In every election, if a Continue reading