Give Meaning to 100 Billion Events a Day — The Shift to Redshift
In part one, we described our Analytics data ingestion pipeline, with BigQuery sitting as our data warehouse. However, having our analytics events in BigQuery is not enough. Most importantly, data needs to be served to our end-users.

In this article, we will detail:
- Why we chose Redshift to store our data marts,
- How it fits into our serving layer,
- Key learnings and optimization tips to make the most out of it,
- Orchestration workflows,
- How our data visualization apps (Chartio, web apps) benefit from this data.
Data is in BigQuery, now what?
Packet Gets Edgy With Vapor IO, Plans 15 Edge Sites in 2019
It’s part of Packet’s plan to deploy edge locations at the base of cell towers, in commercial...
History Of Networking – MPLS-TE – George Swallow
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – MPLS-TE – George Swallow appeared first on Network Collective.
CNF Testbed Energizes Kubernetes Advantage Over OpenStack
Its purpose is to show the ability to run the same networking code running as VNFs on OpenStack and...
Out of the Clouds and into the weeds: Cloudflare’s approach to abuse in new products


In a blogpost yesterday, we addressed the principles we rely upon when faced with numerous and various requests to address the content of websites that use our services. We believe the building blocks that we provide for other people to share and access content online should be provided in a content-neutral way. We also believe that our users should understand the policies we have in place to address complaints and law enforcement requests, the type of requests we receive, and the way we respond to those requests. In this post, we do the dirty work of addressing how those principles are put into action, specifically with regard to Cloudflare’s expanding set of features and products.
Abuse reports and new products
Currently, we receive abuse reports and law enforcement requests on fewer than one percent of the more than thirteen million domains that use Cloudflare’s network. Although the reports we receive run the gamut -- from phishing, malware or other technical abuses of our network to complaints about content -- the overwhelming majority are allegations of copyright violations copyright or violations of other intellectual property rights. Most of the complaints that we receive do not identify concerns with particular Cloudflare services Continue reading
5G Deployments Will be a Slow Burn, Not a ‘Big Bang’
“While the tone around 5G is exuberant, quietly everyone we are talking with ... are questioning...
Cisco CEO to Telcos: Team Up With Us on Enterprise Killer Apps to Make Money Off 5G
Operators can build new enterprise services using Cisco’s intent-based networking, CEO Chuck...
Meta Networks Expands NaaS Software-Defined Perimeter
The software-defined perimeter category is based on a “zero trust” philosophy in which access...
AT&T Taps Microsoft Azure to Power Its Network Edge Compute
The NEC platform is focused on providing a low latency experience for enterprises without the need...
Wind River Helix Merges Old and New to Support Industrial Edge
The platform integrates the VxWorks proprietary real-time operating system that first premiered in...
Introducing NSX-T 2.4 – A Landmark Release in the History of NSX
In February 2017, we introduced VMware NSX-T Data Center to the world. For years, VMware NSX for vSphere had been spearheading a network transformation journey with a software-defined, application-first approach. In the meantime, as the application landscape was changing with the arrival of public clouds and containers, NSX-T was being designed to address the evolving needs of organizations to support cloud-native applications, bare metal workloads, multi-hypervisor environments, public clouds, and now, even multiple clouds.
Today, we are excited to announce an important milestone in this journey – the NSX-T 2.4 release. This fourth release of NSX-T delivers advancements in networking, security, automation, and operational simplicity for everyone involved – from IT admins to DevOps-style teams to developers. Today, NSX-T has emerged as the clear choice for customers embracing cloud-native application development, expanding use of public cloud, and mandating automation to drive agility.
Let’s take a look at some of the new features in NSX-T 2.4:
Operational Simplicity: Easy to Install, Configure, Operate
What if delivering new networks and network services was as easy as spinning up a workload in AWS? In keeping with the ethos that networking can be made easier, over the past few releases, we Continue reading
More Thoughts on Vendor Lock-In and Subscriptions
Albert Siersema sent me his thoughts on lock-in and the recent tendency to sell network device (or software) subscriptions instead of boxes. A few of my comments are inline.
Another trend in the industry is to convert support contracts into subscriptions. That is, the entrenched players seem to be focusing more on that business model (too). In the end, I feel the customer won't reap that many benefits, and you probably will end up paying more. But that's my old grumpy cynicism talking :)
While I agree with that, buying a subscription instead of owning a box (and deprecating it) also makes it easier to persuade the bean counters to switch the gear because there’s little residual value in existing boxes (and it’s easy to demonstrate total-cost-of-ownership). Like every decent sword this one has two blades ;)
Read more ...