Nutanix and HPE Deliver Integrated Hyperconverged Infrastructure Appliance

In April 2019, Nutanix and HPE announced a new global partnership to bring to market an...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Eclipse Foundation Warns Operators: Don’t Be a ‘Dumb Pipe’ for AWS

"This is the opportunity for the carriers to step away from just being data pipes and actually...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft, NTT Tap Azure, AI to Target Enterprises

The alliance also makes Microsoft’s Azure NTT’s preferred cloud platform for modernizing its...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

IBM Security Gives Cloud Identity an AI Boost

IBM Cloud Identity now uses adaptive access capabilities to continually assess employee or consumer...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Heavy Networking 493: Taming Service Provider Complexity In 5G Networks (Sponsored)

5G presents a new set of challenges for service provider networks. As networks become increasingly dynamic and distributed to deliver an ever-evolving set of services, providers have to contend with increased complexity. Juniper Networks joins the Packet Pushers to discuss how its automation capabilities and tools can help tame the complexity beast. Our guest is Amit Bhardwaj, Director of Product Management at Juniper Networks.

The post Heavy Networking 493: Taming Service Provider Complexity In 5G Networks (Sponsored) appeared first on Packet Pushers.

The Two-Year Anniversary of The Athenian Project: Preparing for the 2020 Elections.

The Two-Year Anniversary of The Athenian Project: Preparing for the 2020 Elections.
The Two-Year Anniversary of The Athenian Project: Preparing for the 2020 Elections.

Two years ago, Cloudflare launched its Athenian Project, an effort to protect state and local government election websites from cyber attacks. With the two-year anniversary and many 2020 elections approaching, we are renewing our commitment to provide Cloudflare’s highest level of services for free to protect election websites and ensure the preservation of these critical infrastructure sites. We started the project at Cloudflare as it directly aligns with our mission: to help build a better Internet. We believe the Internet plays a helpful role in democracy and ensuring constituents’ right to information. By helping state and local government election websites, we ensure the protection of voters’ voices, preserve citizens’ confidence in the democratic process, and enhance voter participation.

We are currently helping 156 local or state websites in 26 states to combat DDoS attacks, SQL injections, and many other hostile attempts to threaten their operations. This is an additional 34 domains in states like Ohio, Florida, Kansas, South Carolina and Wisconsin since we reported statistics after last year’s election.

The need for security protection of critical election infrastructure is not new, but it is in the spotlight again as the 2020 U.S. elections approach, with the President, 435 seats Continue reading

Sizing the Buffer

The topic of buffer sizing was the subject of a workshop at Stanford University in early December 2019. The workshop drew together academics, researchers, vendors and operators to look at this topic from their perspectives. The following are my notes from this workshop.

Introducing Load Balancing Analytics

Introducing Load Balancing Analytics
Introducing Load Balancing Analytics

Cloudflare aspires to make Internet properties everywhere faster, more secure, and more reliable. Load Balancing helps with speed and reliability and has been evolving over the past three years.

Let’s go through a scenario that highlights a bit more of what a Load Balancer is and the value it can provide.  A standard load balancer comprises a set of pools, each of which have origin servers that are hostnames and/or IP addresses. A routing policy is assigned to each load balancer, which determines the origin pool selection process.

Let’s say you build an API that is using cloud provider ACME Web Services. Unfortunately, ACME had a rough week, and their service had a regional outage in their Eastern US region. Consequently, your website was unable to serve traffic during this period, which resulted in reduced brand trust from users and missed revenue. To prevent this from happening again, you decide to take two steps: use a secondary cloud provider (in order to avoid having ACME as a single point of failure) and use Cloudflare’s Load Balancing to take advantage of the multi-cloud architecture. Cloudflare’s Load Balancing can help you maximize your API’s availability for your new architecture. For example, you Continue reading

EVPN Route Targets, Route Distinguishers, and VXLAN Network IDs

Got this interesting question from one of my readers:

BGP EVPN message carries both VNI and RT. In importing the route, is it enough either to have VNI ID or RT to import to the respective VRF?. When importing routes in a VRF, which is considered first, RT or the VNI ID?

A bit of terminology first (which you’d be very familiar with if you ever had to study how MPLS/VPN works):

Read more ...

Breaking Linux files into pieces with the split command

Linux systems provide a very easy-to-use command for breaking files into pieces. This is something that you might need to do prior to uploading your files to some storage site that limits file sizes or emailing them as attachments. To split a file into pieces, you simply use the split command.$ split bigfile By default, the split command uses a very simple naming scheme. The file chunks will be named xaa, xab, xac, etc., and, presumably, if you break up a file that is sufficiently large, you might even get chunks named xza and xzz.[Get regularly scheduled insights by signing up for Network World newsletters.] Unless you ask, the command runs without giving you any feedback. You can, however, use the --verbose option if you would like to see the file chunks as they are being created.To read this article in full, please click here

Broadcom Boasts ‘World’s First’ 25.6 Tb/s Switch Silicon

“Keeping with the Broadcom cadence, approximately every two years we’ve been doubling the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

10 hot quantum-computing startups to watch

Quantum computing is still in its infancy, but you wouldn’t know it judging from the investments pouring into the space.Startup Rigetti has raised nearly $120 million in VC funding; the U.S. Department of Energy has committed $218 million to advance quantum information sciences; and incumbents such as Microsoft and IBM have launched accelerator programs for quantum startups.To read this article in full, please click here

The Week in Internet News: Australian Lawmakers Push for ‘Fix’ to Encryption Law

An encryption fix: The Australian Labor Party says it will push for changes to an encryption law, passed in late 2018, that requires tech comp anies to give law enforcement agencies access to encrypted communications, ZDNet reports. Labor Party lawmakers have raised concerns about the law’s effect on the country’s tech industry, but it appears they don’t have the votes to make changes.

Telemedicine needs access: The use of telemedicine is growing, but low speeds in rural Internet are delaying its benefits to parts of Indiana, according to a story from the Kokomo Tribune, posted at Govtech.com. Some Internet-based diagnosis services need interactive videoconferencing technology with fast broadband speeds that aren’t available in parts of the state.

The future of IoT security: IoT World Today has six predictions for Internet of Things security in 2020. Among them: Facilities managers will become more concerned about smart building security, with buildings becoming a new avenue of attack. The security of 5G networks will also become an issue with new attacks on the way.

Goodbye WhatsApp: WhatsApp has begun automatically removing Kashmiri residents from WhatsApp, due to a long-running Internet shutdown in the region controlled by India, The Verge reports. WhatsApp’s Continue reading

Ericsson Corruption Probe Takes $1B Bite

“Through slush funds, bribes, gifts, and graft, Ericsson conducted telecom business with the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Adlink Tackles Industrial IoT as Latest 5G-Drive Member

The 5G-Drive consortium has its sights set on the development of 5G autonomous drone scouts and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Network Break 264: Broadcom’s New Tomahawk 4 Hits 25.6Tbps; Juniper Announces SD-LAN For EX Switches

Take a Network Break! Broadcom ships its fastest ASIC yet, the 15.6Tbps Tomahawk 4; Juniper Networks gets a new CTO, enables cloud control of its EX switches; and rolls out new CPE; Palo Alto Networks reports its latest quarterly financials, and we cover lots of listener follow-up.

The post Network Break 264: Broadcom’s New Tomahawk 4 Hits 25.6Tbps; Juniper Announces SD-LAN For EX Switches appeared first on Packet Pushers.

Tech Bytes: Vitec Group Transforms Its WAN With Silver Peak’s SD-WAN (Sponsored)

Vitec Group has transformed its global WAN with an SD-WAN rollout from Silver Peak. The company has boosted the performance of critical business applications, reduced backup latency by 70%, and decommissioned expensive MPLS circuits in favor of DIA. Find out how in this sponsored Tech Bytes podcast. Our guest is Ben Skinner, head of corporate networks and infrastructure at Vitec Group.