Nines are not enough: meaningful metrics for clouds

Nines are not enough: meaningful metrics for clouds Mogul & Wilkes, HotOS’19

It’s hard to define good SLOs, especially when outcomes aren’t fully under the control of any single party. The authors of today’s paper should know a thing or two about that: Jeffrey Mogul and John Wilkes at Google1! John Wilkes was also one of the co-authors of chapter 4 “Service Level Objectives” in the SRE book, which is good background reading for the discussion in this paper.

The opening paragraph of the abstract does a great job of framing the problem:

Cloud customers want strong, understandable promises (Service Level Objectives, or SLOs) that their applications will run reliably and with adequate performance, but cloud providers don’t want to offer them, because they are technically hard to meet in the face of arbitrary customer behavior and the hidden interactions brought about by statistical multiplexing of shared resources.

When it comes to SLOs, the interests of the customer and the cloud provider are at odds, and so we end up with SLAs (Service Level Agreements) that tie SLOs to contractual agreements.

What are we talking about

Let’s start out by getting some terms straight: SLIs, SLOs, SLAs, and Continue reading

vlog. Episode 3. Discussion about technical roles in vendors

Hello my friend,

Many times when I visited various conferences or had meetings with vendors, I was confused by the naming conventions of the roles they have. System engineer, pre-sales, account manager, etc… If you feel the same, watch this video!

CY2019 Episode 3 // The enginnering jobs in the vendors with Ahmed Elbornou

In this episode, together with Ahmed Elbornou from Juniper we discuss the typicall journey of the product within the company (like router, or SW product) and how various technical roles contribute to its creation

Don’t forget to subscribe for the channel, put likes and repost the video if you like that! ?

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,
Anton Karneliuk

Major Updates to Cisco Certifications Part II (CCNA)

Let’s go more into depth what the new updates really mean. We will start by analyzing the CCNA. As I described in the previous post, gone are the days of having 11 different tracks, instead there is 1 exam. Why?

Take a second to think about what you expect from a Junior Network Engineer, that is after all what a CCNA is expected to be. I, probably Russ White, and many other with me, would argue that what is important at any level, but certainly as a junior, is to understand the fundamentals well. That is to know binary, subnetting, supernetting, basic TCP/IP, basic routing and switching, a little about wireless, a little about security. You don’t need to specialize at a junior level. Many athletes do several sports until they have to pick one and studies have shown that this is often has a positive effect compared to focusing on a single one too soon.

The change in the CCNA is therefore to better align with the expected job role of a CCNA. What domains are being tested? The domains being tested are:

  • Network Fundamentals
  • Network Access
  • IP Connectivity
  • IP Services
  • Security Fundamentals
  • Automation and Programmability

The blueprint can Continue reading

Build, Share and Run Multi-Service Applications with Docker Enterprise 3.0

Modern applications can come in many flavors, consisting of different technology stacks and architectures, from n-tier to microservices and everything in between. Regardless of the application architecture, the focus is shifting from individual containers to a new unit of measurement which defines a set of containers working together – the Docker Application. We first introduced Docker Application packages a few months ago. In this blog post, we look at what’s driving the need for these higher-level objects and how Docker Enterprise 3.0 begins to shift the focus to applications.

Scaling for Multiple Services and Microservices

Since our founding in 2013, Docker – and the ecosystem that has thrived around it – has been built around the core workflow of a Dockerfile that creates a container image that in turn becomes a running container. Docker containers, in turn, helped to drive the growth and popularity of microservices architectures by allowing independent parts of an application to be turned on and off rapidly and scaled independently and efficiently. The challenge is that as microservices adoption grows, a single application is no longer based on a handful of machines but dozens of containers that can be divided amongst different development teams. Continue reading

Full Stack Journey 032: Lyra Vs. Terraform – Meet The New Kid In Cloud Native Infrastructure Provisioning

Lyra is the latest infrastructure-as-code project to tackle the provisioning of cloud resources. On today's Full Stack Journey, guest and Lyra contributor Eric Sorenson explains how Lyra works, how it competes with and complements Terraform, and what it does differently from other open-source options.

The post Full Stack Journey 032: Lyra Vs. Terraform – Meet The New Kid In Cloud Native Infrastructure Provisioning appeared first on Packet Pushers.

Financial Services Company Becomes More Secure and Agile

Flexible IT Infrastructure Required for Operation

Being #1 has its own kind of pressure. When you’re #2 in the market you have a clear goal: topple the #1. What’s the mindset of a market leader? Watch your back? Protect what you have? Ignore everything?

Harel lnsurance lnvestments & Financial Services is the leader of Israel’s insurance market. It has four big rivals competing for its business and must be conscious of outside disruptors turning the market on its head. An understandable strategy might be for Harel to sit tight and protect what it has.

Instead, Harel wants to transform its entire approach. It doesn’t just want to be big, it wants to be fast. It wants to succeed by being the first to launch new services, by exploring new forms of customer engagement, by being innovative.

Harel, formed through a series of mergers and acquisitions, wants to:

  • Create an efficient, flexible IT infrastructure to support its entire operation
  • Automate human process, shifting IT’s focus from maintenance to new service development
  • Remove barriers to storage, performance and network, allowing developers to be faster to market with new services

IT will become the ‘silent leader’ of change throughout the business, proactively steering Continue reading

How Regulation Could Break the Internet: In Conversation with Andrew Sullivan

A full day before Internet Society’s President and CEO Andrew Sullivan takes the stage at the world-renowned policy institute Chatham House at Cyber 2019, you’ll have a chance to have an in person discussion with him about the changes regulation may be bringing to our online world.

From the way we connect, share, learn, and work, the Internet has changed the world.

It has also brought challenges – and increasingly, governments have addressed these challenges with regulation.

But could this create unintended consequences? Is it possible to regulate the Internet while protecting its openness, interoperability, and global reach? The Internet Society in collaboration with Chatham House will explore these questions tomorrow at How Regulation Could Break the Internet: In Conversation with Andrew Sullivan.

Here’s how you can join:

The post How Regulation Could Break the Internet: In Conversation with Andrew Sullivan appeared first on Internet Society.

17 predictions about 5G networks and devices

“As market after market switches on 5G, we are at a truly momentous point in time. No previous generation of mobile technology has had the potential to drive economic growth to the extent that 5G promises. It goes beyond connecting people to fully realizing the Internet of Things (IoT) and the Fourth Industrial Revolution.”—The opening paragraph of the June 2019 Ericsson Mobility ReportAlmost every significant technology advancement now goes through what Gartner calls the “hype cycle.” These days, Everyone expects new technologies to be met with gushing optimism and dreamy visions of how it’s going to change the world in the blink of an eye. After a while, we all come to expect the vendors and the press to go overboard with excitement, at least until reality and disappointment set in when things don’t pan out exactly as expected.To read this article in full, please click here

Online Trust Audit Updates & Translations Now Available

A slightly updated version of the Online Trust Audit & Honor Roll is now available in English, French, and Spanish.

Changes include:

  • Accidentally marked Google Play as top scorer in Appendix C (instead of Google News)
  • Missing bar in graph on page 5
  • Several minor spacing, grammar, and miscellaneous edits

The Online Trust Audit & Honor Roll assesses nearly 1,200 organizations, recognizing excellence in online consumer protection, data security, and responsible privacy practices. This Audit of more than 1,200 predominantly consumer-facing websites is the largest undertaken by OTA, and was expanded this year to include payment services, video streaming, sports sites, and healthcare.

This is the first time in the Audit’s 10-year history that we’ve translated it, and we’re proud to bring it to a wider audience. Going forward, we will work toward adding more global sectors and regions into the report findings.

The Trust Audit Planning Committee, open to Internet Society organization members, has already had its first meeting to discuss the methodology for next year’s Audit. A public call for comment on the draft methodology will come later this year, so watch this blog or follow us on Twitter or Facebook to keep up with our Continue reading

How the Huawei ban could become a security threat | TECH(feed)

We’ve already talked about how the Huawei ban may affect business, but how will it affect security? Google has already warned of security threats should the company be unable to send updates to Huawei’s Android-powered devices. And even if Huawei responds with its own OS, will people trust it? In this episode of TECH(feed), Juliet discusses those security implications and what some people think the U.S. should do instead.