LiveAction Acquires Packet Monitoring Software Provider Savvius
Savvius’ suite of packet monitoring technology will be integrated with LiveAction’s monitoring platforms to give a more complete view into network environments.
Savvius’ suite of packet monitoring technology will be integrated with LiveAction’s monitoring platforms to give a more complete view into network environments.
This is a quick update on the CEO Succession process at the Internet Society (ISOC). For background, please check my previous notes to the community.
As you know, the application window for potential candidates for ISOC’s CEO position closed in early April. Let me update you on where we are in the process.
The process for selecting a new CEO for ISOC is progressing well and is on track. As anticipated, and as a consequence of the broad appeal of the role, the open call for applicants resulted in a significant amount of interest from all around the world. The Board received more than one hundred applications from candidates with a diverse set of backgrounds in business and the private sector, government, the technical community, the global NGO space, and the wider Internet community.
The strength and quality of the applications has been very high and it has been an incredibly tough challenge to identify and evaluate the most suitable candidates for this role from such a large and qualified pool of talent and experience.
Nevertheless, given the importance that the CEO position holds for both ISOC and the Internet as a whole, the deliberation by the Board has been Continue reading
Welcome to another entry in the Getting Started series! In this post we’ll talk about how to use Red Hat Satellite 6 as an inventory source within Ansible Tower. A common scenario we see is the use of Satellite 6.3 to manage Red Hat Enterprise Linux infrastructure, which makes adding Red Hat Ansible Tower to the existing environment a snap.
Ansible Tower will need to authenticate to Satellite, so create a user with an integration role that has the permissions needed to manage inventory. The permissions needed are:
Resource | Permission | Access Type |
Fact value | view_facts | Read Satellite Server facts. |
Host | view_hosts | Read Satellite Server hosts. |
Host group | view_hostgroups | View Satellite Server host groups. |
Once you’ve created your user, log in to the Tower host.
Navigate to Settings >> Credentials in Tower and create a new credential.
The credential type can be found in the credential type list:
Once you select ‘Red Hat Satellite 6’, the field to add the Satellite URL will be available:
With the Satellite server prepared and the credential in place within Tower, all that’s left Continue reading
Working or Not Working. There is no such as a good network, just a working network.
In this Network Collective Short Take, Russ talks about practical concepts network engineers need to know to succeed in their careers.
The post Short Take – Practical Career Advice appeared first on Network Collective.
The cost of servers keeps going up and up, thanks in large part to memory, flash, and GPU prices rising as too much demand chases too little supply and also due in part to the rising cost of processors. …
The Old Switcheroo was written by Timothy Prickett Morgan at .
I had a very interesting conversation today with some friends about predictive wireless surveys. The question was really more of a confirmation: Do you need to draw your walls in the survey plan when deciding where to put your access points? Now, before you all run screaming to the comments to remind me that “YES YOU DO!!!”, there were some other interesting things that were offered that I wanted to expound upon here.
One of the most important parts of the wall question is material. Rather than just assuming that every wall in the building is made from gypsum or from wood, you need to actually go to the site or have someone go and tell you what the building material is made from. Don’t guess about the construction material.
Why? Because not everyone uses the same framing for buildings. Wood beams may be popular in one type of building, but steel reinforcement is used in other kinds. And you don’t want to base your predictive survey on one only to find out it’s the other.
Likewise, you need to make sure that the wall itself is actually made of what you think it is. Find Continue reading
In October 2016 I wrote about a triple-provider Vagrant environment I’d created that worked with VirtualBox, AWS, and the VMware provider (tested with VMware Fusion). Since that time, I’ve incorporated Linux (Fedora, specifically) into my computing landscape, and I started using the Libvirt provider for Vagrant (see my write-up here). With that in mind, I updated the triple-provider environment to add support for Libvirt and make it a quadruple-provider environment.
To set expectations, I’ll start out by saying there isn’t a whole lot here that is dramatically different than the triple-provider setup that I shared back in October 2016. Obviously, it supports more providers, and I’ve improved the setup so that no changes to the Vagrantfile are needed (everything is parameterized).
With that in mind, let’s take a closer look. First, let’s look at the Vagrantfile
itself:
# Specify minimum Vagrant version and Vagrant API version
Vagrant.require_version '>= 1.6.0'
VAGRANTFILE_API_VERSION = '2'
# Require 'yaml' module
require 'yaml'
# Read YAML file with VM details (box, CPU, and RAM)
machines = YAML.load_file(File.join(File.dirname(__FILE__), 'machines.yml'))
# Create and configure the VMs
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
# Always use Vagrant's Continue reading
Vestberg is a relative newcomer to Verizon but as the former CEO of Ericsson he has a long history in the telecom industry.
The Hackathon@AIS is a yearly event, in its second year, aimed at exposing engineers from the Africa region to Open Internet Standards Development. This year, the event was held in Dakar Senegal at the Radisson Blu Hotel, from 9-10 May 2018, during the Africa Internet Summit (AIS-2018).
The event was attended by more than 75 engineers from 15 countries including 11 fellows who were supported to attend the event.
Adama Assiongbon
Hackathon@AIS has been a very good and enriching experience for me because it is a meeting of ICT sharing especially with the IPWAVE workshop which is a technology of the near future where we will be ready on the African continent to implement this technology and bring more to the development of the continent. It is up to us the beneficiaries of Hackathon@AIS to bring a plus to our communities. The idea of Hackathon is very beneficial for the development of Africa. Thank you AFRINIC and ISOC.
Abdeldjalil Bachar Bong
Coming from Chad, I have found the Hackathon@AIS to be a wonderful and collaborative meeting that I have never seen before. It has allowed me Continue reading
Welcome to Technology Short Take #101! I have (hopefully) crafted an interesting and varied collection of links for you today, spanning all the major areas of modern data center technology. Now you have some reading material for this weekend!
command
modules for network devices.In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. In May 2018, we interviewed Arnaud Castaignet, head of public relations for Estonia’s e-Residency programme.
Mr Arnaud Castaignet is the head of public relations for the Republic of Estonia’s e-Residency programme, a government-issued digital ID offering the freedom to join a community of digitally empowered citizens and open and run a global EU company fully online from anywhere in the world. Previously, he worked for the French President François Hollande as a digital strategist. Arnaud is also a Board Member of Open Diplomacy, a Paris-based think tank established in 2010, and a member of the Young Transatlantic Network of Future Leaders, a flagship initiative of the German Marshall Fund of the United States specifically geared toward young professionals 35 years old and younger. Estonia not only became the first country to say that Internet access was a human right, but has given their citizens free public WiFi, enabled them to vote online since 2005, and are protecting them with strong privacy, transparency Continue reading
Terry Slattery discusses how application performance monitoring tools can help provide visibility and how to decide if APM is right for your business.
Erasure coding, an alternative to RAID, and is changing to address emerging data resiliency challenges.
In 2014, we did a series of podcasts on Snabb Switch (Snabb Switch and OpenStack, Deep Dive), a software-only switch delivering 10-20 Gbps of forwarded bandwidth per x86 core. In the meantime, Snabb community slowly expanded, optimized the switching code, built a number of solutions on top of the packet forwarding core, and even forked a just-in-time Lua compiler to get better performance.
To find out the details, listen to Episode 91 of Software Gone Wild in which Luke Gorrie explained how far the Snabb project has progressed in the last four years.
BDS: A centralized near-optimal overlay network for inter-datacenter data replication Zhang et al., EuroSys’18
(If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site).
This is the story of how inter-datacenter multicast transfers at Baidu were sped-up by a factor of 3-5x. That’s a big deal!
For large-scale online service providers, such as Google, Facebook, and Baidu, an important data communication pattern is inter-DC multicast of bulk data — replicating massive amounts of data (e.g., user logs, web search indexes, photo sharing, blog posts) from one DC to multiple DCs in geo-distributed locations.
To set the scene, the authors study inter-DC traffic at Baidu over a period of seven days. Nearly all inter-DC traffic is multicast (91.1%), highlighting the importance of optimising the multicast use case.
When looking at the individual transfers, there is great diversity in the source and destination DCs. Thus it’s not going to suffice to pre-configure a few select routes: “we need a system to automatically route and schedule any given inter-DC multicast transfers.”
60% of the transferred files are over 1TB Continue reading