A little while ago I explained why you can’t use more than 4K VXLAN segments on a ToR switch (at least with most ASICs out there). Does that mean that you’re limited to a total of 4K virtual ethernet segments?
Of course not.
You could implement overlay virtual networks in software (on hypervisors or container hosts), although even there the enterprise products rarely give you more than a few thousand logical switches (to use NSX terminology)… but that’s a product, not technology limitation. Large public cloud providers use the same (or similar) technology to run gazillions of tenant segments.
Read more ...Trade-offs under pressure: heuristics and observations of teams resolving internet service outages, Allspaw, Masters thesis, Lund University, 2015
Following on from the STELLA report, today we’re going back to the first major work to study the human and organisational side of incident management in business-critical Internet services: John Allspaw’s 2015 Masters thesis. The document runs to 87 pages, so I’m going to cover the material across two posts. Today we’ll be looking at the background and literature review sections, which place the activity in a rich context and provide many jumping off points for going deeper in areas of interest to you. In the next post we’ll look at the detailed analysis of how a team at Etsy handled a particular incident on December 4th 2014, to see what we can learn from it.
Perhaps it seems obvious that incident management is hard. But it’s worth recaping some of the reasons why this is the case, and what makes it an area worthy of study.
The operating environment of Internet services contains many of the ingredients necessary for ambiguity and high consequences for mistakes in the diagnosis and response of an adverse Continue reading
A decade or so before the GPU started storming the datacenter thanks to Nvidia’s Tesla GPU accelerators and their CUDA parallel programming environment and CPU offload model, FPGAs were starting to gain traction as accelerators in their own right. …
The GPU Is The Worst – And Best – Thing To Happen To The FPGA was written by Timothy Prickett Morgan at The Next Platform.
The University of Michigan is one of the top academic centers in the United States with over $1.5 …
The University of Michigan Gets Serious About Supercomputing ROI was written by Timothy Prickett Morgan at The Next Platform.
The software giant says Nyansa's technology will enable improved network visibility, monitoring,...
Cisco advanced intent-based networking; SK boasted standalone 5G first; and Citrix swatted ADC,...
Antoine Sirois of Kontron sat down to share his thoughts on mobile edge, CDN, and the future of...
Today's Full Stack Journey episode explores Contour, an an Envoy-based Kubernetes Ingress controller. My guest is Steve Sloka. In addition to Contour, we also talk about Steve's journey into Docker, containers, and Kubernetes as a developer, and their impact on his career.
The post Full Stack Journey 038: Exploring Kubernetes And The Contour Project With Steve Sloka appeared first on Packet Pushers.
The open source security startup reported over 400% revenue growth in 2019 and says its customers...
The five-year contract will span more than 20 production sites in 11 countries across four...
In April 2019 the Internet Society’s Online Trust Alliance (OTA) released its 10th Annual Online Trust Audit & Honor Roll. The Audit looks at the security and privacy practices of over 1,000 of the top sites on the Internet from retailers to governments. In this post we will take a deeper dive into the ISP/Hosts sector of the Audit. This sector is comprised of the top ISPs and other hosting organizations in the U.S. It includes everything from organizations that provide network access to organizations that host email services.
In the Audit, privacy statements are scored across 30 variables. ISP/Hosts were a decidedly mixed bag compared to other sectors, which tended to do either relatively well or poorly across the board in their statements. (Though to clear, the vast majority of organizations in the Audit had poor privacy statements, it was the most common reason for failure across privacy and security scoring.)
ISP/Hosts fell somewhat short in the presentation of their statements. OTA advocates several best practices that deal with how the privacy statement is displayed to make it as easy as possible for users to understand.
The simplest practice OTA advocates is a link to the privacy Continue reading
The carrier added New Radio software to its existing non-standalone 5G base stations and achieved...
“We urge customers to immediately install these fixes,” noted Citrix Chief Information Security...