In this eBrief from SDxCentral, we take an in-depth look at some of the issues hindering NFV interoperability.
Earlier this month, the African Internet community gathered in Dakar, Senegal for the Africa Internet Summit (AIS). The event highlighted some of the great hopes, as well as some of the concerns, that the African Internet community has for the future.
I had the personal honor of speaking at the Opening of the AFNOG meeting where I talked about what the Internet has brought to Africa and the promise that it still holds. I highlighted how Africa has experienced tremendous growth in Internet access and usage over the past few years, and how enormous development opportunities have been opened up for its young population. Believing that we need to put people at the center of our decision-making and build an Internet where everyone’s voice counts, I encouraged the Internet community in Africa to continue to embrace diversity, inclusion, and equality in order to shape an Internet that best serves the billions of people who use it every day, now and into the future.
In many ways, AIS is a showcase for the progress that is being made in creating an Internet for everyone. Key groups are making sure that their voices are being heard.
For example, at a Women in Continue reading
One cloud was never going to be enough, no matter how much Amazon Web Services wants it to be otherwise. …
A Private Rackspace Still Embodies The Public Cloud was written by Jeffrey Burt at .
AI plays doctor: Artificial intelligence can detect skin cancer better than dermatologists, according to a new international study. Flesh-and-blood dermatologists in the study accurately detected 86.6 percent of skin cancers from images, compared to 95 percent for a deep learning convolutional neural network, reports Agence France Presse. Still, there’s no substitute for a thorough clinical examination, the researchers said in a Mirror.co.uk story.
AI can teach, too: Many schools in China are now testing AI as a way to grade homework, reports the South China Morning Post. AI is being used to grade essays, and it recommends improvements in writing style and structure.
AI vs. Internet trolls: AI can even predict when an Internet fight is about to break out, says Bigthink.com. Apparently, one way to predict an online fight is about to happen is when a commenter begins to let the accusations fly by using the word “you.”
Hackers target routers: It’s those Russian hackers again, and they’re after your router. The Russian Sofancy group is among the foreign cyber actors who “have compromised hundreds of thousands of home and office routers and other networked devices,” the FBI warned. One way to limit the attack Continue reading
Open source storage is playing a growing role in the enterprise. Here's why you should consider the software for your data center.
There are two digital explosions simultaneously happening in enterprises across all verticals. Enterprises are moving at a breakneck speed on every aspect of their business. From managing their supply-chain, making purchasing decisions, targeted marketing campaign to users, creating apps to connect with users and making it easier for users to consume their products.
The good news is technology is keeping pace and is a step ahead in helping the business achieve their goals. These business imperatives are forcing software iterations to be faster and be more efficient. This is leading to newer innovative models around people/processes/tools that we collectively call Continuous Integration(CI)/Continuous Development (CD). Teams leading the charge on CI/CD models are working in a “DevOps” model.
The second explosion is related to the first explosion. As complex software become easy-to-use and be ubiquitous, sophisticated tools can be used to attack enterprises. Managing Security is getting harder. Last decade – there was a belief – I am not going to be attacked. Fast forward today – enterprises expect to be attacked and breached. This is not just a baseless impression. Forrester’s 2018 survey shows that 66% of survey respondents have faced a major security incident.
Using EBGP instead of an IGP (OSPF or IS-IS) in leaf-and-spine data center fabrics is becoming a best practice (read: thing to do when you have no clue what you’re doing).
The usual argument defending this design choice is “BGP scales better than OSPF or IS-IS”. That’s usually true (see also: Internet), and so far, EBGP is the only reasonable choice in very large leaf-and-spine fabrics… but does it really scale better than a link-state IGP in smaller fabrics?
Read more ...Hyperledger fabric: a distributed operating system for permissioned blockchains Androulaki et al., EuroSys’18
(If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site).
This very well written paper outlines the design of HyperLedger Fabric and the rationales for many of the key design decisions. It’s a great introduction and overview. Fabric is a permissioned blockchain system with the following key features:
…in popular deployment configurations, Fabric achieves throughput of more than 3500 tps, achieving finality with latency of a few hundred ms and scaling well to over 100 peers.
Examples of use cases powered by Fabric include foreign exchange netting in which a blockchain is used to resolve trades that aren’t settling; enterprise asset management tracking hardware assets as they move from manufacturing to Continue reading
There will be significant Internet Society involvement at SINOG 5 next week, which is being co-organised by our colleague Jan Žorž, supported by ISOC, and will feature talks on NAT64Check and the Online Trust Alliance. SINOG is the Slovenian Network Operators Group, and the meeting is held on 7-8 June 2018 at the Biotehniška Fakulteta in Ljubljana, Slovenia.
It’s well worth coming for the keynote alone, which will be given by Ron Broersma (DREN) – one of the earliest Internet pioneers who operated Node #3 of ARPANET. He’ll be talking about IPv6, the Cloud, and a bit of Internet history, and as he was involved in the NCP-to-TCP/IP migration back in 1983, there are perhaps some lessons to be learned in migrating from IPv4-to-IPv6.
Following-on from this will be how IPv6 was implemented at IBM from Andy Mindnich (IBM), a discussion on the issues of CGN and IPv6 from a law enforcement perspective from Sara Marcolla (Europol), some of which we touched upon in a previous blog, and then an update on version 2 of the NAT64Check portal from Sander Steffann. NAT64Check is a tool allowing you to enter the URL of a particular website and run tests over IPv4, IPv6 and NAT64, and Continue reading
I hate card networks.
Visa and MasterCard are a pair of companies that I feel definitely make the world a worse place to live in, due to the fact that they sit in front of a critical part of how modern society wo
When it comes to troubleshooting, everyone talks about the power of the command tcpdump — after all, “the wire never lies.” But to really use it, you need to put in some time to understand the options. Let us save you some time and give you a quick overview of this powerful tool. You’ll be troubleshooting like a pro in no time!
For those unfamiliar with this powerful command, tcpdump is a packet analyzer that prints out a description of packets being transmitted or received over a network. Each line of output represents a packet. Every line includes a time stamp printed as hours, minutes, seconds, and fractions of a second since midnight. It will also show you packets dropped, packets received by the filter (which can vary depending on your OS) and packets dropped by kernel. Essentially, tcpdump does exactly what its name implies — it “dumps” all the information you need about the content of packets in the CLI so you can analyze it for yourself.
So, why is this so important for troubleshooting? Think of it this way. When box isn’t acting right, seeing what you are getting Continue reading
It’s first version of python app where we have number of devices loopback0 ip address stored in device.txt file.Program will read the file ,fatch loopback0 address and ssh into the respective device.
Program will push the command “sh ip int brief” in second step and display output on screen .We have taken example of 3 devices to test the code.If there are more number of devices ,just need to add the loopback0 of additional device in device.txt file
Python code is written to configure the loopback10 with IP addresss into each respective devices (mentioned in devices.txt file) by reading the required device config file stored as respective device Loopback0.txt file.( if need to add more configuration ,just need to add the config in that respective device loopback0.txt file.)
I have used GNS environment to test the python program.
We have Used Netmiko Library to access cisco devices to get the required output and also configure the device
Below are the functions defined in Python code :