Containous Maesh Barges Into the Service Mesh Morass
The company claims that simplicity and familiarity are what make Maesh different from other service...
The company claims that simplicity and familiarity are what make Maesh different from other service...
The widening performance disparity between compute and I/O is not likely to get any better in the fast-approaching exascale era. …
Will HPC Centers Say ADIOS To POSIX I/O? was written by Michael Feldman at The Next Platform.
Is Protocol Independent Multicast (PIM) really Protocol Independent? What is that dependency? Does PIM require an IP or can it work with non-IP? If you don’t know about PIM, please have a look at here and here. One of my students asked, is PIM require an IP (Internet Protocol), which triggered me to share the …
Continue reading "Is Protocol Independent Multicast (PIM) really Protocol Independent?"
The post Is Protocol Independent Multicast (PIM) really Protocol Independent? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Splunk today said it acquired Omnition, a startup developing a observability platform for...
Set phasers to automate! The Datanauts delve into Cisco's Network Services Orchestrator (NSO) on today's sponsored episode. We explore how NSO works, examine its architecture and configuration workflows, discuss use cases and more with guest Carl Moberg.
The post Datanauts 172: Getting Automation In Tune With Cisco Network Services Orchestrator (NSO) – Sponsored appeared first on Packet Pushers.
"This acquisition demonstrates how Commvault is leading the way towards the intersection of storage...
The company claims the platform alleviates performance monitoring challenges associated with...
The vendor claims it competes against companies like Amazon, Cisco, and Oracle. It also directly...
We’ve got our eyes on you: Ring, the Amazon-owned, IoT-powered video doorbell and security system vendor, has partnered with 400 police departments across the U.S. and is providing them with video footage, the Washington Post reports. Privacy advocates have raised concerns, saying the partnerships could subject innocent people, including those who Ring users have flagged as “suspicious,” to greater surveillance.
We’re listening, too: Meanwhile, Apple has apologized for some of its contractors listening in to recordings of customer’s interactions with the Siri digital assistant, Fox Business News says. Apple had been using the recordings for quality control, but the practice was not in line with Apple’s “high ideals,” the company said.
Also, the apps: Google has pulled a popular file-scanning app, CamSpanner, from the Google Play store, after reports that it contains malware, CNN reports. Researchers Kaspersky had found several negative reviews on the app’s profile that complained the app had the “presence of unwanted features.” The malware could show “intrusive advertising” to users.
Internet spycraft: China and other nations are using popular networking site LinkedIn to recruit spies in Western nations, the New York Times reports. One former foreign policy official in U.S. President Barack Obama’s Continue reading
More and more organizations are adopting “multi-cloud" strategies. Some do it as a hedge against cloud system failures, others as a competitive cudgel. Day Two Cloud looks at the business, technical, and process implications with guest Alex Neihaus, a cloud infrastructure architect.
The post Day Two Cloud 017: Grappling With Multi-Cloud’s Operational Implications appeared first on Packet Pushers.
What is Optimal Routing and Suboptimal Routing in Networking? This may be seen very easy for some of you but let’s make a philosophy a little bit, means let’s design around optimal routing. Network engineers know that one of the tradeoff in network design is Optimal Routing. We want our application traffic to follow Optimal …
Continue reading "What is Optimal Routing and Suboptimal Routing in Networking"
The post What is Optimal Routing and Suboptimal Routing in Networking appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
I would like to share with you every week some networking resources , can be video , article , book , diagram , another website etc. Whatever I believe can be useful for the computer network engineers, mobile network providers, satellite engineers ,transmission experts, datacenter engineers, basically whatever I am interested in and I like, …
Continue reading "Recommended Resources for September 2019 First Week"
The post Recommended Resources for September 2019 First Week appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
BGP Optimal Route Reflection provides Optimal Routing for the Route Reflector Clients without sending all available paths. I recommend you to read this post if you don’t know about BGP Route Reflector. If you are looking to learn BGP starting from Zero to Hero, Click Here. Service Providers mostly prefers Hot Potato Routing in their …
Continue reading "BGP Optimal Route Reflection – BGP ORR"
The post BGP Optimal Route Reflection – BGP ORR appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
After describing MTU basics and drawbacks of IP fragmentation, it’s time for more details: Path MTU Discovery (PMTUD) and network implications of using ICMP for PMTUD.
Interested in similar topics? Check out How Networks Really Work webinar.
SLOG: serializable, low-latency, geo-replicated transactions Ren et al., VLDB’19
SLOG is another research system motivated by the needs of the application developer (aka, user!). Building correct applications is much easier when the system provides strict serializability guarantees.
Strict serializability reduces application code complexity and bugs, since it behaves like a system that is running on a single machine processing transactions sequentially.
The challenge with strict serializability (or even just serializability on a regular DBMS) is that it requires coordination, and as we know, coordination kills performance. Weaker consistency models can give better performance yet “expose applications to potential race condition bugs, and typically require skilled application programmers.” But developers are the kingmakers (I think it’s been enough time now that we can drop the ‘new’ in that phrase?? ;) ), and thus:
… the demand for systems that support strict serializability has only increased.
So starting with strict serializability as a given, how do we claw back some of that performance? That’s where SLOG (Serializable LOw-latency, Geo-replicated transactions) comes in.
SLOG achieves high throughput, strictly serializable ACID transactions at geo-replicated scale for all transactions submitted across the world, all the while achieving low latency for transactions Continue reading
It would be convenient for everyone – chip makers and those who are running machine learning workloads – if training and inference could be done on the same device. …
Nvidia Shows Off Tech Chops With RC18 Inference Chip was written by Timothy Prickett Morgan at The Next Platform.