Cisco Live 2019 – Social Media
As many long time attendees know, Cisco Live back used to be called Networkers. It was a conference about networking …
The post Cisco Live 2019 – Social Media appeared first on Fryguy's Blog.
As many long time attendees know, Cisco Live back used to be called Networkers. It was a conference about networking …
The post Cisco Live 2019 – Social Media appeared first on Fryguy's Blog.
According to the Centers for Disease Control and Prevention’s latest incidence data, cancer is the second leading cause of death in the United States, exceeded only by heart disease. …
Aurora Exascale AI Supercomputer To Light A Path In The Cancer Fight was written by Timothy Prickett Morgan at .
SDxCentral Weekly Wrap for April 5, 2019: The LFN testing tool validates ONAP requirements; VMware...
There are times in which setting up a complete VPN tunnel might be an overkill (or not be an option at all).
For example, assume the followings:
stunnel can be used on your Android phone. SOCKS functionality could then be directly used in your phone for apps that support it: Firefox, Telegram, etc.
To see how to install and setup stunnel on android, take a look at:
These are just couple of examples. In such cases, setting up a SOCKS proxy might just do the trick.
Another interesting aspect of SOCKS proxy, is that after the initial per each connection handshake, it doesn’t add much overhead to the underlying traffic.
Overhead might not look like a big deal at first, but it adds up. This is specially true when you have a Continue reading
T-Mobile has more than 100 people on its Cloud Foundry engineering team overseeing more than 39,000...
Dear Network experts,
It took a while to post this update on DCNM 11.1 due to other priorities, but I should admit it’s a shame due to all great features that came with DCNM 11.1. As mentioned in the previous post, DCNM 11.1 brings a lot of great improvements.
Hereafter is a summary of the top LAN fabric enhancements that comes with DCNM 11.1 for LAN Fabric.
Feel free to look at the Release-notes for an exhaustive list of New Features and Enhancements in Cisco DCNM, Release 11.1(1)
Fabric Builder, fabric devices and fabric underlay networks
Configuration Compliance display side-by-side of existing and pending configuration before deployment.
Brownfield Migration
Transition an existing VXLAN fabric management into DCN.
Interfaces
Port-channel, vPC, subinterface, and loopback interfaces can be added and eddited with an external fabric devices.
Cisco DCNM 11.1(1) specific template enhancements are made for interfaces.
Overlay Network/VRF provisioning
Networks and VRFs deployment can be deploy automatically at the Multi-site Domain level from Site to Site in one single action.
External Fabric
Switches can be added to the external fabric. Inter-Fabric Connections (IFCs) can be created Continue reading
The third Hackathon@AIS will take place in Kampala, Uganda on the 19th and 20th of June 2019. The Hackathon@AIS is an event aimed at exposing engineers from the African region to Internet Standards development and usage. This will be the third event in the series following successful events held in Nairobi (2017) and Dakar (2018), each alongside the Africa Internet Summit (AIS).
See what was covered in 2017 and 2018 Hackathons@AIS here:
2017 Hackathon@AIS
2018 Hackathon@AIS
The event is targeted at network/system engineers, software developers, and/or computer science students to introduce them to existing and evolving Internet standards development that can help further their careers.
Applications for the event will open in April 2019.
Fellowships will be awarded to strong applicants where possible.
Applications will close on 12 May 2019.
For more information please contact Kevin Chege: [email protected].
Read testimonials from the 2018 Hackathon@AIS fellows.
The post Save the Date: Hackathon@AIS appeared first on Internet Society.
The Australian company claims to be the first SD-WAN provider in the country, first launching...
Wake up! It's HighScalability time:
SHUTDOWN ABORT the last Oracle database running Amazon Fulfillment! pic.twitter.com/DorqTua2Lt
— John Darrow (@jdarrow) March 29, 2019
How unhappy do you have to be as a customer to take so much joy in end-of-lifing a product?
Do you like this sort of Stuff? I'd greatly appreciate your support on Patreon. I wrote Explain the Cloud Like I'm 10 for people who need to understand the cloud. And who doesn't these days? On Amazon it has 44 mostly 5 star reviews (100 on Goodreads). They'll learn a lot and love you for the hookup.
Qualcomm loses CFO to Intel; another senior exec leaves Ericsson; and an Oracle Cloud exec joins...
As you’ve probably noticed over the years, we’re always evolving and improving the look and feel of different aspects of the Cloudflare experience. Sometimes it’s more about function, other times it’s more about form, and most of the time it’s a combination of both. But there’s one area of the site that many users visit even more frequently than they visit the homepage or their dashboard, and strangely enough it hasn’t really seen any major updates in years. And if you’re reading this, that means you're looking at it.
With more than 150 current contributors, and more than 1,000 posts, we have a lot of people dedicating a lot of their time to writing blog posts. And based on the responses I see in the comments, and on Twitter, there are a lot of people who really like to read what these authors have to say (whether it has much to do with Cloudflare or not).
Well, we’d like to finally give some love to the blog. And we really want to know what you, our loyal (or even occasional) readers, think. There are two options to choose from. Continue reading
Ahh, the time is almost upon us for CLUS and I know I have been a been quiet lately, more …
The post Cisco Live 2019 – Big Ideas appeared first on Fryguy's Blog.
Wireless isn’t easy by any stretch of the imagination. Most people fixate on the spectrum analysis part of the equation when they think about how hard wireless is. But there are many other moving parts in the whole architecture that make it difficult to manage and maintain. Not the least of which is how the devices talk to each other.
This week at Aruba Atmosphere 2019, I had the opportunity to moderate a panel of wireless and security experts for Mobility Field Day Exclusive. It was a fun discussion, as you can see from the above video. As the moderator, I didn’t really get a change to explain my thoughts on OpenConfig, but I figured now would be a great time to jump in with some color on my side of the conversation.
One of the most exciting ideas behind OpenConfig for wireless people should be the common YANG data models. This means that you can use NETCONF to have a common programming language against specific YANG models. That means no more fumbling around to remember esoteric commands. You just tell the system what you want it to do and the rest is easy.
As outlined Continue reading
The operator contributed the initial seed code for the 5G RAN Intelligent Controller, which was...
A while ago I made a statement along the lines of “MPLS segment routing is the best thing that happened to MPLS control plane in a decade”. Obviously some MPLS-focused engineers disagree with that and a few years ago I decided to write a lengthy blog post explaining the differences between using MPLS SR with IGP (or BGP) versus more traditional IGP+LDP approach.
Obviously, I wasn’t making any progress on that front, so the only way forward was to record a short video on the topic which didn’t work well either because the end-result was a set of three videos (available with free or paid ipSpace.net subscription).
Ginseng: keeping secrets in registers when you distrust the operating system Yun & Zhong et al., NDSS’19
Suppose you did go to the extreme length of establishing an unconditional root of trust for your system, even then, unless every subsequent piece of code you load is also fully trusted (e.g., formally verified) then you’re open to post-boot attacks. This is especially true in a context where lots of third-party application code (e.g. apps on a mobile phone) gets loaded.
Many mobile and IoT apps nowadays contain sensitive data, or secrets, such as passwords, learned models, and health information. Such secrets are often protected by encryption in the storage. However, to use a secret, an app must decrypt it and usually store it as cleartext in memory. In doing so, the app assumes that the operating system (OS) is trustworthy. OSes are complex software and have a large attack surface… Increasingly abundant evidence suggests that prudent apps should not trust the OS with their secrets.
Instead of trying to protect absolutely everything, Ginseng assumes that some data matters more than others. It arranges things such that this sensitive data is only ever in the clear in registers Continue reading
Lenovo has partnered with Excelero, an up-and-coming NVM-Express solution provider that sells a scale-out software-defined storage platform. …
Lenovo Meshes with Software Defined Storage Specialist was written by Nicole Hemsoth at .
Kubernetes has seen a rapid rise over the last few years and is becoming one of the most sought after skills. DockerCon is a great opportunity to get hands-on training from industry experts and hear from real customers who have deployed Kubernetes in production.
You’ll also have a chance to learn how Docker is the easiest way to get started with Kubernetes and attend sessions that describe how the Docker platform manages and secures applications on Kubernetes in multi-Linux, multi-OS and multi-cloud customer environments.
.
Download your Kubernetes agenda and register now for DockerCon!
Register soon as space is running out in these hands-on workshops!
Hear from Docker customers who are running Kubernetes in production.
Learn about the inner workings of Kubernetes and the Continue reading