Short Take – NTP Best Practices
In this Network Collective Short Take, Russ shares some best practice around NTP.
The post Short Take – NTP Best Practices appeared first on Network Collective.
In this Network Collective Short Take, Russ shares some best practice around NTP.
The post Short Take – NTP Best Practices appeared first on Network Collective.
While chipset and display sales plunged during the first quarter of 2019, Samsung said its...
We are thrilled to honor six of our enterprise customers with the 2019 Docker Customer Innovation Award today at DockerCon. We launched the awards last year to recognize customers who stand out for how they are using Docker Enterprise to drive transformation within IT and their business.
These are companies ranging from cruise lines to established “brick and mortar” enterprises, some of whom have been in business for well over 100 years. These are their stories.
Carnival’s first commitment is to creating fun, memorable and safe experiences for its guests. As the largest cruise line in the world, Carnival hosts over 12 million customers annually on 110 ships and at 15 resorts. Technology plays a key role in providing a world-class consistent customer experience.
Carnival leverages Docker Enterprise to build, run and update over 300 services on its new Medallion System, a necklace or wrist band IoT token unique to each passenger used to pay for drinks or as a key to your room. Adding or changes services, or testing new ones, is easy with the Docker Enterprise platform. The system is running on two ships today, with plans to expand Continue reading
The Swedish vendor signed 5G MoUs with MOTIV of Russia and China Telecom.
Open Systems integrates security and SD-WAN as a service, including next-gen firewalls and Web gateways. They're the sponsor for today's Heavy Networking podcast. We discuss Open Systems' architecture, how it applies SD-WAN and security policies to traffic, and how Open Systems differentiates itself in this crowded market.
The post Heavy Networking 446: How Open Systems Integrates Security And SD-WAN As A Service appeared first on Packet Pushers.
Quick review of Cumulus NETQ, an SDN tool for analytics and operation of your network.
The post BiB 075 : Looking at Cumulus NetQ 2 Announcements appeared first on Packet Pushers.
One of my readers sent me this email after reading my Loop Avoidance in VXLAN Networks blog post:
Not much has changed really! It’s still a flood/learn bridged network, at least in parts. We count 2019 and talk a lot about “fabrics” but have 1980’s networks still.
The networking fundamentals haven’t changed in the last 40 years. We still use IP (sometimes with larger addresses and augmentations that make it harder to use and more vulnerable), stream-based transport protocol on top of that, leak addresses up and down the protocol stack, and rely on technology that was designed to run on 500 meters of thick yellow cable.
Read more ...
As the foundation broadens its base it is focusing on collaboration without boundaries as a way to...
The edge has caught the imagination of IT vendors, who envision a place well outside of the confines of the central datacenter but not quite in the cloud where the vast amounts of data that are being generated by billions of devices, systems and sensors can be quickly captured, stored, processed and analyzed in as close to real time as possible. …
Common Componentry Is The Key to Edge Architectures was written by Timothy Prickett Morgan at .
The deal will allow customers to run VMware’s software stack in Microsoft’s Azure public cloud....
The market for servers used to be a lot more predictable in the past, with a portion of the tens millions of companies worldwide buying machinery in their own cycles that more or less coincided with the global gross domestic product. …
Is That Canary In The Datacenter Feeling Dizzy? was written by Timothy Prickett Morgan at .
Cisco is optimistic about the opportunities for Wi-Fi 6 in the near term and expects massive...
The operator upgraded its nationwide network of 4G LTE cell sites for NB-IoT and says it plans to...
We love layers and abstraction. After all, building in layers and it’s corollary, abstraction, are the foundation of large-scale system design. The only way to build large-scale systems is to divide and conquer, which means building many different component parts with clear and defined interaction surfaces (most often expressed as APIs) and combining these many different parts into a complete system. But abstraction, layering, and modularization have negative aspects as well as positive ones. For instance, according to the State/Optimization/Surface triad, any time we remove state in order to control complexity, we either add an interaction surface (which adds complexity) or we reduce optimization.
Another impact of abstraction, though, is the side effect of Conway’s Law: “organizations which design systems … are constrained to produce designs which are copies of the communication structures of these organizations.” The structure of the organization that designs a system is ultimately baked into the modularization, abstraction, and API schemes of the system itself.
To take a networking instance, many networks use one kind of module for data centers and another for campuses. The style of network built in each place, where the lines are between these different topological locations in the network, the Continue reading
AT&T, one of the primary contributors to Airship, has been using the project in its production...
With the complexity of our industry, two things should be obviously necessary. These two things are Network Design and Validation Testing. Design requires identifying the requirements of the business and of dependent systems. This could include things like minimum bandwidth, maximum jitter, convergence time, recovery time, minimal redundancy, etc. It is also important to understand that more rigorous requirements often contribute to cost and operational complexity. Operational complexity creates additional challenges that often erode the very parameters that have been identified as requirements. When this is found true, there are some conversations that need to be had about what is and is not achievable, given the operational and capital budgets–as well as the realistic capabilities of the staff managing the environment.
Validation is also critically important. I posted an article a few weeks ago that illustrated an interesting failure with CAPWAP. Avoiding issues like this require us to first design our network then validate the behavior against the design. Allow me to make a bold statement–If you haven’t designed and validated your network, you DON’T know how it works. Without validation–How do you know that your convergence is subsecond? How do you know that your backup routes work with applications? Continue reading