SLOG: serializable, low-latency, geo-replicated transactions

SLOG: serializable, low-latency, geo-replicated transactions Ren et al., VLDB’19

SLOG is another research system motivated by the needs of the application developer (aka, user!). Building correct applications is much easier when the system provides strict serializability guarantees.

Strict serializability reduces application code complexity and bugs, since it behaves like a system that is running on a single machine processing transactions sequentially.

The challenge with strict serializability (or even just serializability on a regular DBMS) is that it requires coordination, and as we know, coordination kills performance. Weaker consistency models can give better performance yet “expose applications to potential race condition bugs, and typically require skilled application programmers.” But developers are the kingmakers (I think it’s been enough time now that we can drop the ‘new’ in that phrase?? ;) ), and thus:

… the demand for systems that support strict serializability has only increased.

So starting with strict serializability as a given, how do we claw back some of that performance? That’s where SLOG (Serializable LOw-latency, Geo-replicated transactions) comes in.

SLOG achieves high throughput, strictly serializable ACID transactions at geo-replicated scale for all transactions submitted across the world, all the while achieving low latency for transactions Continue reading

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

IoT security essentials: Physical, network, software

Even in the planning stages of a deployment, IoT security is one of the chief stumbling blocks to successful adoption of the technology.And while the problem is vastly complicated, there are three key angles to think about when laying out how IoT sensors will be deployed in any given setup: How secure are the device themselves, how many are there and can they receive security patches.Physical access Physical access is an important but, generally, straightforward consideration for traditional IT security. Data centers can be carefully secured, and routers and switches are often located in places where they’re either difficult to fiddle with discreetly or difficult to access in the first place.To read this article in full, please click here

Operators Dish on 5G Strategies for Enterprise

5G heralds a new framework for mobile connectivity and has enterprises poised to gain entirely new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Will CCDE Practical Exam (Lab) Change in 2020?

Will CCDE Exam (Lab) change in 2020. I have been receiving this question again and again after Cisco’s announcement on Cisco certification exam changes.  Short answer is NO. Little bit long answer is, it will not change in February 2020 and in fact it has been the only design certification since many years. (Cisco I …

The post Will CCDE Practical Exam (Lab) Change in 2020? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Technologies and the protocols may not be used for what they were intended

I was reading a book today , called Deploying QoS for Cisco IP and NGN networks, which I can recommend you for history and future for QoS in networking industry, there was couple paragraph in the book, which lead me to share my thoughts about the protocols/technologies and their usage.   In the book, as …

The post Technologies and the protocols may not be used for what they were intended appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

AnsibleFest Atlanta – Infrastructure Automation

Blog_AnsibleFest2019-Infrastructure-Automation-Track

 

AnsibleFest is only a few short weeks away and we are excited to share with you all the great content and sessions we have lined up! On the Ansible blog, we have been taking a closer look at each of the breakout session tracks so that attendees can better personalize their AnsibleFest experience. We sat down with Track Lead Dylan Silva to find out more about the Infrastructure Automation Track and sessions within the track.  

 

Who is this track best for? 

This track is best for sysadmins that are looking for information related to general infrastructure automation with Ansible.

 

What topics will this track cover? 

Sessions in this track will cover bare-metal, server administration, and inventory management, among other related topics. There will be a session covering the automation of VMware infrastructure using REST APIs, how to use Ansible against your vSphere environment, how to use Ansible to pull approved firewall change requests from our change management system, and much more. 

 

What should attendees expect to learn from this track? 

Attendees should expect to learn best practices related to infrastructure management. This includes scaling Ansible for loT deployments, taking a closer Continue reading

SDxCentral’s Top 10 Articles — August 2019

HCX, VMware’s Top-Secret Sauce, Comes Out; VMware Buys Veriflow for Network Monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Lanner Joins Forces With Hot OCP Ecosystem

Networking manufacture Lanner, well known for its uCPE and white box appliances, is the latest...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Huawei Accuses US of Cyberattacks, ‘Menacing’ Its Employees

Huawei accused the U.S. government of using cyberattacks and “every tool at its disposal” to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Asks to Play With Its mmWave 5G Spectrum

The carrier has asked the FCC for early access to the 24 GHz spectrum it won during a recent...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Top Redis Use Cases by Core Data Structure Types

Top Redis Use Cases by Core Data Structure Types - ScaleGrid Blog

Redis, short for Remote Dictionary Server, is a BSD-licensed, open-source in-memory key-value data structure store written in C language by Salvatore Sanfillipo and was first released on May 10, 2009. Depending on how it is configured, Redis can act like a database, a cache or a message broker. It’s important to note that Redis is a NoSQL database system. This implies that unlike SQL (Structured Query Language) driven database systems like MySQL, PostgreSQL, and Oracle, Redis does not store data in well-defined database schemas which constitute tables, rows, and columns. Instead, Redis stores data in data structures which makes it very flexible to use. In this blog, we outline the top Redis use cases by the different core data structure types.

Data Structures in Redis

Sponsored Post: Educative, PA File Sight, Etleap, PerfOps, InMemory.Net, Triplebyte, Stream, Scalyr

Who's Hiring? 

  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Cool Products and Services

  • Grokking the System Design Interview is a popular course on Educative.io (taken by 20,000+ people) that's widely considered the best System Design interview resource on the Internet. It goes deep into real-world examples, offering detailed explanations and useful pointers on how to improve your approach. There's also a no questions asked 30-day return policy. Try a free preview today.

  • PA File Sight - Actively protect servers from ransomware, audit file access to see who is deleting files, reading files or moving files, and detect file copy activity from the server. Historical audit reports and real-time alerts are built-in. Try the 30-day free trial!

  • For heads of IT/Engineering responsible for building an analytics infrastructure, Etleap is an ETL solution for creating perfect data pipelines from day one. Unlike older enterprise solutions, Etleap doesn’t require extensive engineering work to set up, maintain, and scale. It automates most ETL setup and Continue reading

2019 Chapterthon – Our Chapters, Connecting the World One Community at a Time

Each year, the Chapterthon project competition brings enthusiasm and excitement among our global community. We look forward to this time of year, when our communities mobilize and work alongside each other to achieve a common goal for the development of the Internet.

For the 2019 Chapterthon, we are delighted to announce that 34 Chapters and Special Interest Groups (SIGs) from across the globe have started implementing their work on local solutions that will bring some of the hardest-to-reach places and community segments online—connecting the unconnected.

Over the next two months, these 34 projects will:

  • connect underprivileged and rural areas in Armenia, Bangladesh, Benin, Mali, and South Africa;
  • build a community network in Kenya;
  • establish online databases for rural farmers in Burkina Faso and Saint Vincent and the Grenadines;
  • create an online audio library for people living with disabilities in northern rural Argentina;
  • revolutionize a mobile network unit in Madagascar for use in the event of a natural disaster;
  • educate and empower over fifty rural women on how to use the Internet during a friendly game of “Tag”;
  • build an FM broadcast system in rural Ghana; preserve Indigenous culture in rural Brazil;
  • sweat it out at a bootcamp in Continue reading

Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored)

Today's sponsored Tech Bytes explores how Big Switch Networks applies cloud design principles to data center and cloud networks. Network engineers can provide a developer-friendly environment while still enforcing policy, enabling security controls, and getting visibility into the network. Our guest is Big Switch CTO Paul Unbehagen.

The post Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored) appeared first on Packet Pushers.

Forwarding using sFlow-RT

The diagrams show different two different configurations for sFlow monitoring:
  1. Without Forwarding Each sFlow agent is configured to stream sFlow telemetry to each of the analysis applications. This configuration is appropriate when a small number of applications is being used to continuously monitor performance. However, the overhead on the network and agents increases as additional analyzers are added. Often it is not possible to increase the number of analyzers since many embedded sFlow agents have limited resources and only support a small number of sFlow streams. In addition, the complexity of configuring each agent to add or remove an analysis application can be significant since agents may reside in Ethernet switches, routers, servers, hypervisors and applications on many different platforms from a variety of vendors.
  2. With Forwarding In this case all the agents are configured to send sFlow to a forwarding module which resends the data to the analysis applications. In this case analyzers can be added and removed simply by reconfiguring the forwarder without any changes required to the agent configurations.
There are many variations between these two extremes. Typically there will be one or two analyzers used for continuous monitoring and additional tools, like Wireshark, might be deployed Continue reading