Pure Storage capped off the year with an update to its flagship FlashArray line hours head of...
The company began to lose momentum coming out of its latest fiscal year in which it made 10...
Huawei CSO mocked US security policy; Palo Alto Networks added X factor to $560M Demisto buy; and...
Perimeter-based security is no longer sufficient, security surfaces and compute demands are...
The best technology companies have always taken something that was complex and done a whole lot of engineering or in many cases re-engineering of it to make it usable and consumable – with the right pricing – so it can go mainstream. …
Sticking With Both The Pure And The Storage Strategy was written by Timothy Prickett Morgan at The Next Platform.
It’s being called the world’s biggest work-from-home experiment. With concerns growing over the spread of the Coronavirus, schools and businesses around the world are implementing contingency plans that encourage distance learning and work from home. Usage of e-learning, messaging, and videoconferencing tools is also growing rapidly, placing additional load on these Internet-based applications and platforms and generating additional traffic. And with more people staying at home, online media consumption is poised to increase as well.
Many are wondering if the Internet can handle the strain of rapid traffic growth and increased latency. Will it cause a catastrophic failure of the Internet? The answer: not likely.
Core Internet infrastructure providers should be able to easily absorb the increase in traffic and demand, especially if the growth is gradual over a period of days, weeks, or months. Cloud infrastructure providers should also have sufficient additional compute, storage, and bandwidth capacity to enable their customers, including the e-learning, messaging, and videoconferencing tool providers, to scale their systems as necessary. In order to keep traffic local, content delivery infrastructure from companies including Akamai, Cloudflare, Google, Netflix, and Apple is deployed in many last-mile networks. Internet Exchange Points (IXPs) can also help keep traffic local, Continue reading
Palo Alto Network’s product announcement coincided with its quarterly earnings report, which fell...
Wake up! It's HighScalability time:
The Smithsonian has million of pieces of delicious open access content. I ate up this 3D representation of the 1903 Wright Flyer.
Do you like this sort of Stuff? Without your support on Patreon this kind of Stuff won't happen. That's how important you are to the fate of the world.
Need to understand the cloud? Know someone who does? I wrote Explain the Cloud Like I'm 10 just for you...and them. On Amazon it has 98 mostly 5 star reviews. Here's a recent authentic unfaked review:


Hacking isn’t new. If you follow the 2600 Magazine culture of know the name Mitnick or Draper you know that hacking has been a part of systems as long as their have been systems. What has changed in recent years is the malicious aspect of what’s going on in the acts themselves. The pioneers of hacking culture were focused on short term gains or personal exploitation. It was more about proving you could break into a system and getting the side benefit of free phone calls or an untraceable mobile device. Today’s hacking cultures are driven by massive amounts of theft and exploitation of resources to a degree that would make any traditional hacker blush.
It’s much like the difference between petty street crime and “organized” crime. With a patron and a purpose, the organizers of the individual members can coordinate to accomplish a bigger goal than was ever thought possible by the person on the street. Just like a wolf pack or jackals, you can take down a much bigger target with come coordination. I talked a little bit about how the targets were going to start changing almost seven years ago and how we needed to start figuring Continue reading
XML – Extensible Markup Langauage
Its more suitable as data representation choice when software element need to communicate with each other.
Let review the XML basics with an example
anurudh@anurudh:~/newfolder$ cat ex1_xm.xml
<device>
<vendor>Cisco</vendor>
<model>7600</model>
<version>IOS 15.6</version>
</device>
Here <device> is root , which is present in outermost XML tag of document , also referred as parent of the element <vendor>,<mode> and <version> , whereas <vendor>,<mode> and <version> is known as children of the parent element <device>.
Namespace : Its part of XML Specification to differentiate between different XML blocks having same names
let’s take an example , if I have one more xml document as below
<device>
<vendor>Cisco</vendor>
<model>9600</model>
<version>IOS 15.6</version>
</device>
Here , the only difference between earlier XML doc and this one is one element i.e model number changed from 7600 to 9600 ,but parent element is same in both XML doc i.e <device> So there should be method to avoid conflict , there comes NAMESPACE which prevent element naming conflict
The namespace can be defined by an xmlns attribute in the start tag of an element.
The namespace declaration has the following syntax. xmlns:prefix=”URI”.
<root>
<a:device xmlns:c="http://example.org/7600devices">
<a:vendor>Cisco</a:vendor>
<a:model>7600</a:model>
<a:version>IOS 15. Continue reading


Security is a serious business, one that we do not take lightly at Cloudflare. We have invested a lot of effort into ensuring that our services, both external and internal, are protected by meeting or exceeding industry best practices. Encryption is a huge part of our strategy as it is embedded in nearly every process we have. At Cloudflare, we encrypt data both in transit (on the network) and at rest (on the disk). Both practices address some of the most common vectors used to exfiltrate information and these measures serve to protect sensitive data from attackers but, what about data currently in use?
Can encryption or any technology eliminate all threats? No, but as Infrastructure Security, it’s our job to consider worst-case scenarios. For example, what if someone were to steal a server from one of our data centers? How can we leverage the most reliable, cutting edge, innovative technology to secure all data on that host if it were in the wrong hands? Would it be protected? And, in particular, what about the server’s RAM?

Data in random access memory (RAM) is usually stored in the clear. This can leave data vulnerable to software or hardware probing by Continue reading
CCIE Enterprise Infrastructure Training by Orhan Ergun. As Orhan Ergun, I always aim to provide best training in the world. I started recently CCIE Enterprise Infrastructure v1. 0 training. In this post you will see why you should get this training, why you should get it from Orhan Ergun, what are the requirement to attend , what are the unique benefits, training outline and many other details.
Yes, this has already happened to many networks across the globe. And for sure will happen again. Maybe to your network?

TL;DR:
The network will go down. OSPF sessions will start flapping, some routers might run out of memory and …
After the “shocking” revelation that a network can never be totally reliable, I addressed another widespread lack of common sense: due to laws of physics, the client-server latency is never zero (and never even close to what a developer gets from the laptop’s loopback interface).
After the “shocking” revelation that a network can never be totally reliable, I addressed another widespread lack of common sense: due to laws of physics, the client-server latency is never zero (and never even close to what a developer gets from the laptop’s loopback interface).
Gandalf: an intelligent, end-to-end analytics service for safe deployment in cloud-scale infrastructure, Li et al., NSDI’20
Modern software systems at scale are incredibly complex ever changing environments. Despite all the pre-deployment testing you might employ, this makes it really tough to change them with confidence. Thus it’s common to use some form of phased rollout, monitoring progress as you go, with the idea of rolling back a change if it looks like it’s causing problems. So far so good, but observing a problem and then connecting it back to a given deployment can be far from straightforward. This paper describes Gandalf, the software deployment monitor in production at Microsoft Azure for the past eighteen months plus. Gandalf analyses more than 20TB of data per day : 270K platform events on average (770K peak), 600 million API calls, with data on over 2,000 different fault types. If Gandalf doesn’t like what that data is telling it, it will pause a rollout and send an alert to the development team.
Since its introduction, Gandalf has significantly improved deployment times, cutting them in half across the entire production fleet. As teams gained more experience with Gandalf, and saw how it was Continue reading
Technology is here to stay, and it is only natural that technology has started to play a role in networking. Social media, cell phones, texting, and even sites such as YouTube all can help you use technology in networking with a purpose.
Here are some ways you can engage in networking with a purpose using technology.
One of the most difficult things to do is to try and maintain the relationships with the contacts you have made through networking efforts. Texting and social media make it easier to maintain those relationships and to check in with those in your network semi-regularly. Even if the contact is just a brief message asking about their family or about their interests, your contacts will notice your sincere interest in them.
When networking with a purpose, the first thing you should do is to find out what your contact needs and try and fill that need without asking anything in return. It doesn’t have to be all about business, you might be able to recommend a dentist to a client Continue reading
Huawei security concerns ignited RSA panel discussion; Airline exec dished advice to security...