On today's sponsored Tech Bytes episode we talk with MidSouth Bank CIO Daniel Hereford about how he's using SD-WAN from Silver Peak to support the bank's transformation to a hybrid cloud model, while also improving network visibility and performance for mission-critical applications.
The post Tech Bytes: MidSouth Bank Invests In Network Performance, Visibility With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.
Vodafone, an early proponent of the Telecom Infra Project’s OpenRAN initiative, says it started...
Register now for Attend Open Source Summit + Embedded Linux Conference Europe held October 28 - 30,...
The technology cocktail can support smart city initiatives without having to rip up streets to...
Today's Network Break analyzes Adtran's entry into the SD-WAN market, a new IBN product from Lumina Networks, the latest software upgrade from NTOP, Google's timeline for blocking HTTP elements in HTTPS sessions in Chrome, plus a couple of detailed follow-ups, and a Tech Bytes show.
The post Network Break 255: Adtran Gets Into SD-WAN; Google Preps Chrome To Block HTTP Mixed With HTTPS appeared first on Packet Pushers.
Don't underestimate engineers. They are smarter than people comprehend.
The post Kill the restructure | The IT Skeptic appeared first on EtherealMind.
Have you ever seen an Ansible playbook where 90% of the code prepares the environment, and then all the work is done in a few template and assemble modules? Here’s an alternative way of getting that done. Is it better? You tell me ;)
150 successful machine learning models: 6 lessons learned at Booking.com Bernadi et al., KDD’19
Here’s a paper that will reward careful study for many organisations. We’ve previously looked at the deep penetration of machine learning models in the product stacks of leading companies, and also some of the pre-requisites for being successful with it. Today’s paper choice is a wonderful summary of lessons learned integrating around 150 successful customer facing applications of machine learning at Booking.com. Oddly enough given the paper title, the six lessons are never explicitly listed or enumerated in the body of the paper, but they can be inferred from the division into sections. My interpretation of them is as follows:
There are way more than 6 good pieces of advice contained within the paper though!
We found that driving true business impact is amazingly hard, plus it is difficult to isolate Continue reading
One of the temptations of IT companies that skate on the cutting edge is that they get enamored with their own inventions, forgetting that customers are a lot more interested in practical solutions than whiz-bang technology. …
Building A File System That’s Primed for the Times was written by Michael Feldman at The Next Platform.
Storage hierarchies just aren’t what they used to be.
In the good old days, you stored files on hard disk or magnetic tape. …
Deepening Storage Hierarchies Spark New Set of Challenges was written by Michael Feldman at The Next Platform.
The storage landscape is being transformed thanks to the introduction of technologies like NVM-Express, and newer types of non-volatile memory (NVM). …
Get Used to the Ever-Expanding Storage Hierarchy was written by Michael Feldman at The Next Platform.
Convincing research that wireless chargers aren't good (yet)
The post How you charge your mobile phone could compromise its battery lifespan appeared first on EtherealMind.
The tutorial discusses configuration of site-to-site VPN on VyOS using preshared-key. Static key configuration offers the simplest setup, and is ideal for point-to-point VPNs or proof-of-concept testing. The advantages of using static key are simple setup and no X509 PKI (Public Key Infrastructure) to maintain. The disadvantages are limited scalability - one client, one server setup and the lack of perfect forward secrecy - key compromise results in a total disclosure of previous sessions. Also, a secret key must exist in plain-text form on each VPN peer and it must be exchanged using a pre-existing secure channel.
Our lab consists of two remote sites (Picture 1). The router running network OS - VyOS is presented on each side, connecting computers PC and PC2 to to a particular LAN network. The both VyOS routers are configured forOpenVPN site-to-site mode and the routers also perform NAT (PAT) and firewall services.
Picture 1 - Network Topology
1. VyOS Site1 Configuration
1.1 Hostname, IP addresses, SSH
vyos@vyos:~$ configure
vyos@vyos# set system host-name Site1
yos@vyos# commit
vyos@vyos# save
vyos@Site1# set interfaces ethernet eth1 address 10.0.0.254/24
vyos@Site1# set interfaces ethernet eth0 address 11.0.2.1/24
vyos@Site1# set service ssh
vyos@Site1# commit
Continue reading
Primera storage will help the financial firm to reduce its data center footprint and improve its...
Anycast (advertising the same IP address from multiple servers/locations) has long been used to implement scale-out public DNS services (the whole root DNS system runs on massive anycast), but it’s not as common in enterprise networks.
The blog posts written by Tom Bowles should get you there. He started with the idea and described his implementation using Infoblox DNS.
Want to know even more? I covered numerous load balancing mechanisms including anycast in Data Centers Infrastructure for Networking Engineers webinar.