Frinx Does Software-Defined Networking for SoftBank
"SoftBank trusted us in 2016, and we’ve been working with them as partners ever since," says Frinx's CEO. "Folks say it is very important who your first customer is.”
"SoftBank trusted us in 2016, and we’ve been working with them as partners ever since," says Frinx's CEO. "Folks say it is very important who your first customer is.”
The company's CEO attempted to moderate his previous comments about growing pricing pressure from larger rivals, stating "You should assume that I communicated very poorly last quarter."
Since ETSI set standards for NFV six years ago, the technology has yet to reach its full potential as operators get stuck on physical limitations.
Over the last several years, VMware has been heavily investing in technology and solutions to transform security. Our goal has been simple; leverage the virtual and mobile infrastructure to build security in – making it intrinsic, simple, aligned to applications and data, and infinitely more effective.
5 years ago, with NSX, we introduced the concept of micro-segmentation, enabling organizations to leverage network virtualization to compartmentalize their critical applications at a network level.
Last VMworld, we introduced VMware AppDefense, to protect the applications running on that virtual infrastructure. This enabled organizations to leverage server virtualization to ensure the only thing running is what the application intended – flipping the security model to “ensuring good” versus “chasing bad”
Meanwhile, our Workspace ONE team has been steadily building out their platform that leverages user infrastructure, to ensure only legitimate users can get access to critical applications from devices we can trust.
The momentum for NSX, AppDefense, and Workspace ONE has been growing exponentially. And our product teams have not been standing still. They’ve been hard at work on some incredible innovations and integrations.
In my security showcase session, Transforming Security in Continue reading
There are a lot of cool nuggets in Google's New Book: The Site Reliability Workbook. If you haven't put it on your reading list, here's a tantalizing excerpt from CHAPTER 11 Managing Load by Cooper Bethea, Gráinne Sheerin, Jennifer Mace, and Ruth King with Gary Luo and Gary O’Connor.
Niantic launched Pokémon GO in the summer of 2016. It was the first new Pokémon game in years, the first official Pokémon smartphone game, and Niantic’s first project in concert with a major entertainment company. The game was a runaway hit and more popular than anyone expected—that summer you’d regularly see players gathering to duel around landmarks that were Pokémon Gyms in the virtual world.
Pokémon GO’s success greatly exceeded the expectations of the Niantic engineering team. Prior to launch, they load-tested their software stack to process up to 5x their most optimistic traffic estimates. The actual launch requests per second (RPS) rate was nearly 50x that estimate—enough to present a scaling challenge for nearly any software stack. To further complicate the matter, the world of Pokémon GO is highly interactive and globally shared among its users. All players in a given area see the same view of the game Continue reading
Networking is hard enough when deploying it into typical environments like campuses and datacenters, but what happens when you’re tasked with doing networking in areas that were never meant to support technology? In this episode of Network Collective, Scott Morris and Jeremy Austin join us to share their experience with networking in harsh environments.
We would like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus is bringing S.O.U.L. back to the network. Simple. Open. Untethered. Linux. For more information about how you can bring S.O.U.L. to your network, head on over to https://cumulusnetworks.com/networkcollectivehassoul. There you can find out how Cumulus Networks can help you build a datacenter as efficient and as flexible as the worlds largest data centers and try Cumulus technology absolutely free.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 32 – Networking In Harsh Environments appeared first on Network Collective.
Cloud giants Amazon, Alibaba, Baidu, Facebook, Google, and Microsoft are now designing their own AI accelerator chips. …
Designing Custom Chips In-House For Specific Tasks Is The New Normal was written by Paul Teich at .
In honor of International Cat Day, the Internet Society is sharing the journal of Internet Hall of Mane recipient, LOL Cat. LOL Cat first achieved fame with her humorous memes written in “kitty pawtois.” A graduate of Stanfur Universekitty, her work has earned her the Purritzer Prize and many other hon-roars.
Cattain’s Log, Day 1
Sunday night patrol. The dusty creature on the wall has not moved for days. This is my vow: I will bide my time and someday I shall pounce.
Day 8
My human taunts me with the shiny red dot.
Day 13
Bathroom remodel. My human has replaced my old litter box with a loud scary one. The flashing lights blind me. I am not feline good about this.
Day 14
When I hop out of this new litter box, a scary rake comes to gather the litter, ruining my sense of order. I shall spread litter around the house to rectify this mess, but first I must hide behind the new contraption.
I see the word “smart.” This must be a clue. I feel that I am onto something. I have no time to lose, and must dash to the room with the Continue reading
There are multiple occasions for which you may need two IPv4 addresses. This video from Tony Fortunato explains how to configure them.
You probably know my opinion on nerd knobs and the resulting complexity, but sometimes you desperately need something to get the job done.
In traditional vendor-driven networking world, you might be able to persuade your vendor to implement the knob (you think) you need in 3 years by making it a mandatory requirement for a $10M purchase order. In open-source world you implement the knob, write the unit tests, and submit a pull request.
Read more ...HHVM JIT: A profile-guided, region-based compiler for PHP and Hack Ottoni, PLDI’18
HHVM is a virtual machine for PHP and Hack (a PHP extension) which is used to power Facebook’s website among others. Today’s paper choice describes the second generation HHVM implementation, which delivered a 21.7% performance boost when running the Facebook website compared to the previous HHVM implementation.
…the PHP code base that runs the Facebook website includes tens of millions of lines of source code, which are translated to hundreds of megabytes of machine code during execution.
I’m clearly suffering from an over-simplified understanding of what the Facebook web application actually does, but at the same time if I asked you to write a Facebook clone for just the website (not the backing services, not the mobile apps, etc.), would your initial estimate be on the order of tens of millions of lines of code???!
The starting point for HHVM is source code in PHP or Hack. Hack is a PHP dialect used by Facebook and includes support for a richer set of type hints. From the perspective of HHVM though the two languages are fundamentally equivalent. In particular, Hack’s type hints are Continue reading