Daily Roundup: Cloud Titans Tank Arista’s Q4
Cloud titans tanked Arista’s Q4; US charged Huawei with theft and espionage; and Microsoft JEDI...
Cloud titans tanked Arista’s Q4; US charged Huawei with theft and espionage; and Microsoft JEDI...
Eric Chou, author of Master Python Networking Third Edition, discusses what's new in this edition of the book. Quite a lot!
The post BiB 088: Mastering Python Networking Third Edition by Eric Chou appeared first on Packet Pushers.
When talking about high-end HPC systems in the world, much of the attention often is paid to the massive supercomputers that are being developed by the likes of system makers Cray (now part of Hewlett Packard Enterprise and the main contractor on two exascale systems), Fujitsu, Atos, IBM, and others along with component makers Intel (which is a primary contractor on one exascale system), AMD, and Nvidia. …
The Softer Side Of Exascale was written by Jeffrey Burt at The Next Platform.
As the SD-WAN market explodes, some service providers are pushing SD-branch as a way to build an...
As more abstractions and automation layers creep into the network, are network engineers losing their grasp on core fundamentals? Three grumpy old network engineers ponder this question, talk about how we got here, and what can be done about it. Our guests are Chris Young and Ivan Pepelnjak.
The post Heavy Networking 502: Get Off My VLAN! Old Network Engineers On What New Engineers Should Know appeared first on Packet Pushers.
Security on your mind: The Internet Society’s Chapter in Benin recently hosted a conference focused on online security and on connectivity issues. Much of the discussion focused on instability of connections in the country, with participants concerned about degraded connections. Participants also talked about limited coverage for mobile services. On the topic of security, speakers urged Internet users to regularly change their passwords, avoid default passwords, and prevent third-party apps from connecting to the services they use.
Secure messages: The Israeli Chapter has focused on the security of messaging and social media apps recently. The Chapter recently posted a guide on how to prevent Instagram accounts from being hacked and a guide on how users can protect their privacy on the Tik Tok messaging app.
Privacy for the young ones: Meanwhile, the Chapter in Portugal, working with the Kids Safe on the Net project, has launched an initiative to improve awareness among Portuguese youth about the importance of online privacy and how they can maintain their privacy.
Good privacy: The Netherlands Chapter recently gave its support to the Good ID initiative, an approach to identity management that prioritizes data privacy and security. Good ID aims to give Internet users Continue reading
Wake up! It's HighScalability time:
Do you like this sort of Stuff? Without your support on Patreon Stuff won't happen. I also wrote Explain the Cloud Like I'm 10 for everyone needing to understand the cloud (who doesn't?). On Amazon it has 93 mostly 5 star reviews (152 on Goodreads). Please be a real cloud hero and recommend it.
Meanwhile, Arista’s Q4 revenue declined, and took a big hit from cloud and service providers...
"It's important that the numerous evaluation errors and blatant political interference that impact...
Huawei is charged with conspiring to steal intellectual property from six U.S. companies, violating...
SDxCentral Weekly Wrap for Feb. 14, 2020: GSMA cancels this year's MWC Barcelona event; Cisco CEO...
Since I’m on the road again at Networking Field Day this week, I have had some great conversations with the delegates and presenters. A few stray thoughts that may develop into full blown blog posts at some point, but I figured I could get some of them out here for some quick entertainment.
After my response to the BGP is a hot mess topic, Corey Quinn graciously invited me to discuss BGP issues on his podcast. It took us a long while to set it up, but we eventually got there… and the results were published last week. Hope you’ll enjoy our chat.
After my response to the BGP is a hot mess topic, Corey Quinn graciously invited me to discuss BGP issues on his podcast. It took us a long while to set it up, but we eventually got there… and the results were published last week. Hope you’ll enjoy our chat.
Programs, life cycles, and laws of software evolution, Lehman, Proc. IEEE, 1980
Today’s paper came highly recommended by Kevlin Henney and Nat Pryce in a Twitter thread last week, thank you both!
The footnotes show that the manuscript for this paper was submitted almost exactly 40 years ago – on the 27th February 1980. The problems it describes though (and that the community had already been wrestling with for a couple of decades) seem as fresh and relevant as ever. Is there some kind of Lindy effect for problems as there is for published works? I.e., should we expect to still be grappling with these issues for at least another 60 years? In this particular instance at least, it seems likely.
As computers play an ever larger role in society and the life of the individual, it becomes more and more critical to be able to create and maintain effective, cost-effective, and timely software. For more than two decades, however, the programming fraternity, and through them the computer-user community, has faced serious problems achieving this.
What does a programmer do? A programmer’s task, according to Lehman, is to "state an algorithm Continue reading
Consider for a moment that you have an application running on a server that needs to push some data out to multiple consumers and that every consumer needs the same copy of the data at the same time. The canonical example is live video. Live audio and stock market data are also common examples. At the re:Invent conference in 2019, AWS announced support for multicast routing in AWS Virtual Private Cloud (VPC). This blog post will provide a walkthrough of configuring and verifying multicast routing in a VPC.
No platform can be everything to everybody. And while there are plenty of organizations that operate at scale who create their own platforms, often using best of breed components, there are some that – perhaps because of the experience of constantly cobbling together systems into platforms – just do not want to do the experimenting and testing and weaving. …
The Hyperconvergence Of Virtual Machines And Containers was written by Timothy Prickett Morgan at The Next Platform.