The Latest in NetOps Monitoring for Cisco and Versa SD-WAN

CA’s NetOps 19.1 release simplifies Cisco Vipela and Versa SD-WAN management to help you optimize...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware: 5G a ‘Fantastic and Interesting Challenge’ for Kubernetes

“It’ll be a fascinating test. It’s something we can’t control. I certainly have...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Shakeup Hits Cloud, Networking Teams

The changes will "strongly position the company against our competitors," according to an internal...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to Get Famous in BitLife

BitLife: Life Simulator, also called BitLife for short, is digital-based, single player cartoon video game for Android / iOS released in 2018 by CandyWriter LLC. The game has become extremely popular, as people live the simulated digital life that they choose. Many players of this game want to become famous winning the “Famous Ribbon,” but becoming famous is no cake-walk, as you will have to spend years of your life working towards fame and fortune you want and feel you deserve. Still, for those brave souls with that much time on their hands, here are a few tips on how to get famous in BitLife.

How to Get Famous in BitLife in 4 Steps

Start Out Good Looking

Being good looking is extremely important in your effort to becoming famous. So, you may want to keep resetting your character until you score at 80% in the looks department. The better looking you are and become throughout your life, the easier it may be to become famous. Later, in life you can choose to have plastic surgery or other procedures in order to help you become better looking. Remember, we’re talking about a video game life simulator here, not Continue reading

Verizon Drives SDP Into Its Zero Trust Architecture

The new Zero Trust Architecture blocks connectivity to servers and applications from unknown...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

42 – LISP Network Deployment and Troubleshooting

Good day Network experts

It has been a great pleasure and an honor working with Tarique Shakil and Vinit Jain on this book below, deep-diving on this amazing LISP protocol.

I would like also to take this opportunity to thank Max Ardica, Victor Moreno and Marc Portoles Comeras for their invaluable help. I wrote the section on LISP Mobility deployment with traditional and modern data center fabrics (VXLAN EVPN based as well as ACI Multi-Pod/Multi-Site), however this could not have been done without the amazing support of these guys.

Available from Cisco Press
or from Safari book Online

LISP Network Deployment and Troubleshooting

Implement flexible, efficient LISP-based overlays for cloud, data center, and enterprise

The LISP overlay network helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility.

LISP Network Deployment and Troubleshooting is the definitive resource for all network engineers who want to understand, configure, and troubleshoot LISP on Cisco IOS-XE, IOS-XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to address key issues such Continue reading

Extreme targets data center automation with software, switches

Extreme this week took the wraps off new automation software and switches aimed at helping customers quickly turn-up and manage new data-center networking segments.Key to the network vendor’s data-center plans is an upgraded version of its Extreme Data Center Fabric, which has been available for over a year and is now upgraded to let customers deploy a fabric in minutes. Once  devices are cabled togtther and powered on,  customers run the Extreme Fabric Automation application from any Extreme SLX spine or leaf switch, which then confirms configuations, validates and tests the network to ensure it is set up and operating correctly.To read this article in full, please click here

Extreme targets data center automation with software, switches

Extreme this week took the wraps off new automation software and switches aimed at helping customers quickly turn-up and manage new data-center networking segments.Key to the network vendor’s data-center plans is an upgraded version of its Extreme Data Center Fabric, which has been available for over a year and is now upgraded to let customers deploy a fabric in minutes. Once  devices are cabled togtther and powered on,  customers run the Extreme Fabric Automation application from any Extreme SLX spine or leaf switch, which then confirms configuations, validates and tests the network to ensure it is set up and operating correctly.To read this article in full, please click here

Rachel Player Honored by Internet Security Research Group with Radiant Award

Internet security is accomplished by many unsung heroes. People who put their talent and passion into improving the Internet, making it secure and trustworthy. This is a feature of the Internet: security isn’t achieved through a central mandate but through the hard work and tenacity of individuals working across the globe.

Rachel Player, a cryptographic researcher, is one of those unsung heroes. She’s just been awarded the Radiant Award from the Internet Security Research Group, the folks behind Let’s Encrypt, for her work in post-quantum cryptography and homomorphic encryption. Homomorphic encryption allows people to do computations on encrypted data, so that information can remain private and still be worked with. This is a highly-relevant field in any area that deals with sensitive and personal data, such as medicine and finance. Player is also interested in lowering the barriers for young people – young women, especially – to work professionally on topics like cryptography.

To learn more, read the announcement by the Internet Security Research Group and Rachel Player’s blog post about her work and her interest in making the profession more accessible.

Want to know more about Let’s Encrypt? Read a comprehensive overview of the initiative – from inspiration to Continue reading

Learn how R is used in machine learning with this $29 training

Machine learning is a powerful tool for statistical analysis that allows businesses to gain valuable insights, and many companies are catching on. As such, the demand for programmers who have R environment skills is quickly growing, and with this certification course bundle, you too can learn statistical analysis with R for $29.The Complete R Programming Certification Bundle features 6 courses on how to apply the R programming language to data visualization, social media mining, and more. If you have zero R experience, the first course you should take is Statistics & Machine Learning for Regression Modeling with R. This course will introduce you to the OLS regression and how to create regression models for machine learning.To read this article in full, please click here

Introducing Flan Scan: Cloudflare’s Lightweight Network Vulnerability Scanner

Introducing Flan Scan: Cloudflare’s Lightweight Network Vulnerability Scanner
Introducing Flan Scan: Cloudflare’s Lightweight Network Vulnerability Scanner

Today, we’re excited to open source Flan Scan, Cloudflare’s in-house lightweight network vulnerability scanner. Flan Scan is a thin wrapper around Nmap that converts this popular open source tool into a vulnerability scanner with the added benefit of easy deployment.

We created Flan Scan after two unsuccessful attempts at using “industry standard” scanners for our compliance scans. A little over a year ago, we were paying a big vendor for their scanner until we realized it was one of our highest security costs and many of its features were not relevant to our setup. It became clear we were not getting our money’s worth. Soon after, we switched to an open source scanner and took on the task of managing its complicated setup. That made it difficult to deploy to our entire fleet of more than 190 data centers.

We had a deadline at the end of Q3 to complete an internal scan for our compliance requirements but no tool that met our needs. Given our history with existing scanners, we decided to set off on our own and build a scanner that worked for our setup. To design Flan Scan, we worked closely with our auditors to understand Continue reading

Guest Speakers in the Networking in Public Cloud Deployments Online Course

We are proud to announce a great lineup of guest speakers for the first Networking in Public Cloud Deployments course that will run in Spring 2020:

  • Joep Piscaer will dive into what changes public clouds bring and what these changes mean for you, as well as what developers and other consumers of cloud resources expect from you in the new public cloud, DevOps and Infrastructure-as-Code world.
  • Ned Bellavance will review the principles of Infrastructure as Code (IaC) and how they apply to public cloud solutions. Then he will take a look at the landscape of IaC tools that exist and examine their pros and cons.
  • Howard Marks will review the types of storage available across public clouds, how they differ between cloud providers and the applications and pitfalls associated with each of them.
  • Connecting on-premises data centers or office locations to a public cloud has some unique challenges. Ed Horley will help you create a framework and a checklist to make sure you have the required redundancy, throughput, routing, and security all baked in from day one.
  • Matthias Luft will cover the aspects of securing your public cloud deployments.
  • Justin Warren will explain how to make good tradeoffs between Continue reading

Network Neighborhood 04: We The Sales Engineers With Ramzi Marjaba

In this episode of Network Neighborhood, we welcome Ramzi Marjaba, Hybrid Senior Sales Engineer at Ixia Solutions Group at Keysight Technologies. Ramzi is also the creative power behind WeTheSalesEngineers.com, a career-oriented resource site for sales engineers featuring a blog, a podcast, and more.

The post Network Neighborhood 04: We The Sales Engineers With Ramzi Marjaba appeared first on Packet Pushers.

Cumulus Networks updates its network-centric Linux distribution

The Linux distribution ecosystem is pretty set, with Red Hat and Canonical in the leadership positions, followed closely by SuSe and home brews from the likes of IBM and other major vendors. Even Microsoft has its own distro for Azure users.And then there is Cumulus Networks, which specializes in networking software. It just released Cumulus Linux 4.0 and NetQ 2.4, its cloud network deployment and management console. With this release, Cumulus is claiming its Linux is its most stable and reliable software stack yet and NetQ is the most comprehensive end-to-end network automation product.To read this article in full, please click here

IoT sensors must have two radios for efficiency

For the Internet of Things to become ubiquitous, many believe that inefficiencies in the powering of sensors and radios has got to be eliminated. Battery chemistry just isn’t good enough, and it’s simply too expensive to continually perform truck-rolls, for example, whenever batteries need changing out. In many cases, solar battery-top-ups aren’t the solution because that, usually-fixed, technology isn’t particularly suited to mobile, or impromptu, ad hoc networks.Consequently, there’s a dash going on to try to find either better chemistries that allow longer battery life or more efficient chips and electronics that just sip electricity. An angle of thought being followed is to wake-up network radios only when they need to transmit a burst of data. Universities say they are making significant progress in this area.To read this article in full, please click here

KubeCon 2019 Day 2 Summary

Keynotes

This morning’s keynotes were, in my opinion, better than yesterday’s morning keynotes. (I missed the closing keynotes yesterday due to customer meetings and calls.) Only a couple of keynotes really stuck out. Vicki Cheung provided some useful suggestions for tools that are helping to “close the gap” on user experience, and there was an interesting (but a bit overly long) session with a live demo on running a 5G mobile core on Kubernetes.

Running Large-Scale Stateful Workloads

Due to some power outages at the conference venue resulting from rain in San Diego, the Prometheus session I had planned to attend got moved to a different time. As a result, I sat in this session by Lyft instead. The topic was about running large-scale stateful workloads, but the content was really about a custom solution Lyft built (called Flyte) that leveraged CRDs and custom controllers to help manage stateful workloads. While it’s awesome that companies like Lyft can extend Kubernetes to address their specific needs, this session isn’t helpful to more “ordinary” companies that are trying to figure out how to run their stateful workloads on Kubernetes. I’d really like the CNCF and the conference committee to try Continue reading

Rancher Labs K3s Rides Kubernetes to the Edge

K3s is basically a slimmer version of Kubernetes that is targeted at resource-constrained edge...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Go Notes: Functions

Functions group operations into a unit of code. A function is defined with the func keyword A function name, its parameters and return types make up a functions signature go // Basic function that accepts no arguments and returns nothing func stuff() // Function that accepts an...