IDG Contributor Network: Intent-Based Networking (IBN): Bridging the gap on network complexity

Networking has gone through various transformations over the last decade. In essence, the network has become complex and hard to manage using traditional mechanisms. Now there is a significant need to design and integrate devices from multiple vendors and employ new technologies, such as virtualization and cloud services.Therefore, every network is a unique snowflake. You will never come across two identical networks. The products offered by the vendors act as the building blocks for engineers to design solutions that work for them. If we all had a simple and predictable network, this would not be a problem. But there are no global references to follow and designs vary from organization to organization. These lead to network variation even while offering similar services.To read this article in full, please click here

Kentik Turns AIOps Spotlight on Network Data, Workflows

San Francisco-based startup Avi Freedman, Kentik CEO. “They may say there’s a problem over in the network, but what is it? …We’re embracing [the network], but taking a more AI approach to surfacing insights and automation approach to what you do with that.” The AI-enabled capabilities include: Network operations insight into infrastructure and traffic across cloud, data center, WAN and campus environments, including traffic growth and capacity run-out dates. Edge network utilization and costs, including predicting cost overages and alerting on traffic spikes so teams can shift traffic to avoid network congestion. Network protection by setting smart baselines and thresholds to automatically recognize traffic anomalies, more easily investigate incidents such as DDoS attacks, and automatically prevent threats from causing performance and availability issues. The majority of Kentik’s early customers are service providers. AIOps can help them understand how their customers and subscribers use their services to more quickly Continue reading

Tech Bytes: Healthcare Provider Cures Performance, Security Ills With Silver Peak SD-WAN (Sponsored)

On today's Tech Bytes podcast, sponsored by Silver Peak, we talk with a healthcare provider about how the organization uses Silver Peak's Unity Edge Connect SD-WAN to securely segment and prioritize electronic medical records traffic and enforce QoS on other essential applications.

The post Tech Bytes: Healthcare Provider Cures Performance, Security Ills With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.

Network Break 245: VMware Buys Bitfusion for GPU Virtualization; Arrcus Scores $30 Million

Take a Network Break! VMware buys Bitfusion for GPU virtualization, Arrcus takes in a $30 million Series B round to grow its network OS business, Kentik announces AIOps to provide more insight for IT operations, the SD-WAN market races toward $5 billion by 2023, and more tech news. Guests Ethan Banks and Phil Gervasi stop by for virtual muffins and commentary.

The post Network Break 245: VMware Buys Bitfusion for GPU Virtualization; Arrcus Scores $30 Million appeared first on Packet Pushers.

[Sponsored] No Tunnels – No Overlays – All The Secure Routing – 128 Technology

Tunnels and overlays are all the rage in software-defined networking but 128 Technology thinks there is a better way forward. Without tunnels or overlays, 128 can provide all the features you’ve come to expect from an SD-WAN solution and more. Listen in if you would like to hear how they can do all of this without encapsulation, offering far smaller overhead yet still keeping your data secure in transit. Once you’ve watched the overview here, you can find an even deeper dive into their technology at their website https://128technology.com or you can view the full day Networking Field Day Exclusive event recordings at http://tnc.li/128tech

Thank you to 128 Technology for sponsoring today’s episode and supporting the content we’re creating here at Network Collective.

Ritesh Mukherjee
Guest
Erik Thoen
Guest
Jordan Martin
Host

The post [Sponsored] No Tunnels – No Overlays – All The Secure Routing – 128 Technology appeared first on Network Collective.

The Week in Internet News: The Internet of Things and the Domain Name System

IoT vs. DNS: As the use of the Internet of Things grows, so do its threats on the Internet’s Domain Name System, Network World says. The Internet Corporation for Assigned Names and Numbers (ICANN) and IBM’s X-Force security researchers have both issued reports describing how the insecurity of IoT could lead to more botnets that attack the DNS.

A lot of zeros: The U.S. Federal Trade Commission announced an expected $5 billion fine against Facebook for privacy breaches, The Verge reports. Still, some critics suggested the fine was too small. Facebook’s revenue in 2018 was 11 times more than the fine, at $55.8 billion.

Not too big to investigate: Meanwhile, the U.S. Department of Justice has launched an antitrust investigation into Google, Amazon, and Facebook, Vox.com reports. The DOJ’s Antitrust Division is reviewing “whether and how market-leading online platforms have achieved market power and are engaging in practices that have reduced competition, stifled innovation, or otherwise harmed consumers.” 

Not just the DOJ: And the Federal Trade Commission is also getting into the antitrust investigations act. Facebook has announced that its friends at the FTC, fresh off their $5 billion fine of the social media Continue reading

Why we fight for crypto

This last week, the Attorney General William Barr called for crypto backdoors. His speech is a fair summary of law-enforcement's side of the argument. In this post, I'm going to address many of his arguments.

The tl;dr version of this blog post is this:

  • Their claims of mounting crime are unsubstantiated, based on emotional anecdotes rather than statistics. We live in a Golden Age of Surveillance where, if any balancing is to be done in the privacy vs. security tradeoff, it should be in favor of more privacy.
  • But we aren't talking about tradeoff with privacy, but other rights. In particular, it's every much as important to protect the rights of political dissidents to keep some communications private (encryption) as it is to allow them to make other communications public (free speech). In addition, there is no solution to their "going dark" problem that doesn't restrict the freedom to run arbitrary software of the user's choice on their computers/phones.
  • Thirdly, there is the problem of technical feasibility. We don't know how to make backdoors available for law enforcement access that doesn't enormously reduce security for users.


Balance

The crux of his argument is balancing civil rights vs. safety, also described Continue reading

5 reasons to use Kubernetes

Kubernetes is the de facto open source container orchestration tool for enterprises. It provides application deployment, scaling, container management, and other capabilities, and it enables enterprises to optimize hardware resource utilization and increase production uptime through fault-tolerant functionality at speed. The project was initially developed by Google, which donated the project to the Cloud-Native Computing Foundation. In 2018, it became the first CNCF project to graduate.

This is all well and good, but it doesn’t explain why development and operations should invest their valuable time and effort in Kubernetes. The reason Kubernetes is so useful is that it helps dev and ops quickly solve the problems they struggle with every day.

Following are five ways Kubernetes’ capabilities help dev and ops professionals address their most common problems.

1. Vendor-agnostic

Many public cloud providers not only serve managed Kubernetes services but also lots of cloud products built on top of those services for on-premises application container orchestration. Being vendor-agnostic enables operators to design, build, and manage multi-cloud and hybrid cloud platforms easily and safely without risk of vendor lock-in. Kubernetes also eliminates the ops team’s worries about a complex multi/hybrid cloud strategy.

2. Service discovery

To develop microservices applications, Java developers must Continue reading

NVMe over Fabrics enterprise storage spec enters final review process

NVM Express Inc., the developer of the NVMe spec for enterprise SSDs, announced that its NVMe-oF architecture has entered a final 45-day review, an important step toward release of a formal specification for enterprise SSD makers.NVMe-oF stands for NVMe over Fabrics, a mechanism to transfer data between a host computer and a target SSD or system over a network, such as Ethernet, Fibre Channel (FC), or InfiniBand. NVM Express first released the 1.0 spec of NVMe-oF in 2016, so this is long overdue.To read this article in full, please click here

IT Burnout – The Task List

Sadly, this picture above is me. I used to think I had one of the best memories in the world. It turns out my memory is well-suited for bar trivia and routing protocol esoterics. My memory doesn’t appear so adept at remembering other little things that are of more important, such as remembering to buy a gift for a birthday or following up on an email that I sent last week.

Human brains are great at processing information. But some of the ones that are best at processing it are horrible at recalling it. I think of it not unlike a three-tiered storage array. The fast access tasks are in the fastest storage tier where they are needed. The longer term but less important info goes into the near-line tier where it can be recalled when needed. And in my case, the bandwidth to that tier is slow and unreliable.

Exciting Things!

One of my solutions to this problem is getting better with task management. As bad as my memory is, it’s also not well suited to writing things down to remember them. The irony is almost too delicious to ignore. I need to write things down so I don’t Continue reading

Not So Private Thoughts at IETF 105

At IETF 105, held in Montreal at the end of July, the Technical Plenary part of the meeting had two speakers on the topic of privacy in today's Internet, Associate Professor Arvind Narayanan of Princeton University and Professor Stephen Bellovin of Colombia University. They were both quite disturbing talks in their distinct ways, and I'd like to share my impressions of these two presentations and then consider what privacy means for me in today's Internet.

Stuff The Internet Says On Scalability For July 26th, 2019

Wake up! It's HighScalability time—once again:

 

 The Apollo 11 guidance computer repeatedly crashed on descent. On earth computer scientists had just 13 hours to debug the problem. They did. It was CPU overload because of a wrong setting. Some things never change! 

 

Do you like this sort of Stuff? I'd greatly appreciate your support on Patreon. I wrote Explain the Cloud Like I'm 10 for people who need to understand the cloud. And who doesn't these days? On Amazon it has 52 mostly 5 star reviews (120 on Goodreads). They'll learn a lot and hold you in even greater awe.

 

Number Stuff:

Don't miss all that the Internet has to say on Scalability, click below and become eventually consistent with all scalability knowledge (which means this post has many more items to read so please keep on reading)...

Verizon launches interconnect service through Equinix

Just days after AT&T hooked up with IBM and Microsoft for cloud service connectivity, Verizon announced a software-defined interconnect (SDI) service to help the carrier's customers connect Equinix colocation data centers.These two companies have a history. In 2017, Equinix acquired 29 Verizon data centers in the U.S and Latin America for $3.6 billion. So like AT&T, Verizon left data centers to the experts and focused on building connections to them. [ Read also: How to plan a software-defined data center network ] As more enterprises move workloads into colocation facilities run by providers like Equinix, fast, secure connections between the enterprise and the colocation become a must. Verizon's SDI service is designed to provide fast, reliable connectivity between customer and the colocation data center.To read this article in full, please click here

Verizon launches interconnect service through Equinix

Just days after AT&T hooked up with IBM and Microsoft for cloud service connectivity, Verizon announced a software-defined interconnect (SDI) service to help the carrier's customers connect Equinix colocation data centers.These two companies have a history. In 2017, Equinix acquired 29 Verizon data centers in the U.S and Latin America for $3.6 billion. So like AT&T, Verizon left data centers to the experts and focused on building connections to them. [ Read also: How to plan a software-defined data center network ] As more enterprises move workloads into colocation facilities run by providers like Equinix, fast, secure connections between the enterprise and the colocation become a must. Verizon's SDI service is designed to provide fast, reliable connectivity between customer and the colocation data center.To read this article in full, please click here

Accelerate Application Delivery with Application Templates in Docker Desktop Enterprise


The Application Templates interface.
Docker Enterprise 3.0, now generally available, includes several new features that make it simpler and faster for developers to build and deliver modern applications in the world of Docker containers and Kubernetes. One such feature is the new Application Templates interface that is included with Docker Desktop Enterprise.
Application Templates enable developers to build modern applications using a library of predefined and organization-approved application and service templates, without requiring prior knowledge of Docker commands. By providing re-usable “scaffolding” for developing modern container-based applications, Application Templates accelerate developer onboarding and improve productivity.
The Application Templates themselves include many of the discrete components required for developing a new application, including the Dockerfile, custom base images, common compose service YAML, and application parameters (external ports and upstream image versions). They can even include boilerplate code and code editor configs.
With Application Templates, development leads, application architects, and security and operations teams can customize and share application and service templates that align to corporate standards. As a developer, you know you’re starting from pre-approved templates that  eliminate time-consuming configuration steps and error-prone manual setup. Instead, you have the freedom to customize and experiment so you can focus on Continue reading