All Things Decentralized
We recently considered how computing was often being called distributed even when it shouldn’t be, or being called something else when it really isn’t. …
All Things Decentralized was written by James Cuff at .
We recently considered how computing was often being called distributed even when it shouldn’t be, or being called something else when it really isn’t. …
All Things Decentralized was written by James Cuff at .
BGP is the kitchen-sink of networking protocols, right? Whatever control-plane information you need to transport around, you can do it with BGP… including the battleship coordinates carried in BGP communities.
On the more serious front, it's nice to see at least some ISPs still care enough about the stability of the global Internet to use BGP route flap dampening.
Intel Atom failures I know the title sounds a bit weird and you may ask why would you need to recover a RAID5 array when all your disks are healthy, right? To understand what is going on, my DS1515+ has an Intel Atom C2538. (source: Synology CPU / NAS Type). It recently caused a lot of issues in the IT industry. (remember the Cisco clock issue? ? ) The Errata AVR54 of the C2000 Specifications update clearly states the following: “system may experience inability to boot or may cease operation”. My NAS was starting to have regular reboots and it completely crashed before I could back up the last delta of data. In the first instance, Synology denied any abnormal failure rate on this specific [Read More...]
The post Recover a RAID5 Array on Linux with healthy disks appeared first on VPackets.net.
One critical decision that executives need to make when assessing their data center architecture is their approach to software vulnerability management across all network components. Vulnerability management primarily revolves around selecting an efficient and modern software management strategy. There are several ways to execute on a software management strategy, and I believe disaggregation is a critical first step in doing it right.
In this post, I want to take a minute to first share my thoughts on the vulnerability management trends I’ve noticed. I will argue that a) you need to prioritize the network in how you manage vulnerabilities and b) disaggregation is the only way to do it properly. We’ll also take a look at the reasons why I think we never had the right framework to manage software delivery, making vulnerability management a challenge on platforms that are closed in nature.
Three weeks ago, I joined 40,000 security professionals in San Francisco to attend the biggest gathering of security conscious professionals — RSA Conference. While there were several presentations and moments from the event that stood out, one that caught my eye was a presentation that discussed challenges in the industry Continue reading
DockerCon is back and better than ever as we welcome our developer community to this year’s DockerCon in San Francisco (June 12-15, 2018)! It doesn’t matter if you’re new to Docker, or an old hand at Dockerizing your applications. For developers, DockerCon is the best place to learn about bringing Docker to your applications.
This year at DockerCon, you have the opportunity to choose the content and create an agenda that is based on your role and where you’re at in your containerization journey. We know you’ll want to choose carefully, so here’s some things to consider.
Whether you’re developing modern microservices applications or are looking for ways to modernize your existing applications, DockerCon will teach you about new features and capabilities, container best practices, containerization strategies and innovative ways to use containers such as serverless apps, using a service mesh, and incorporating machine learning.
For many developers, the best way to learn is hands-on. Our Hands-On Labs and workshops will give you practical knowledge. And our breakout sessions will introduce you to new concepts and ideas on how to incorporate Docker into your enterprise workflow.
DockerCon can show you how Docker can solve the most pressing problems, both for Continue reading
Hewlett Packard built up its conglomerate in the 2000s in good faith, trying to be a larger and more profitable supplier of IT products and services. …
We Fight, Get Beat, Rise, And Fight Again was written by Timothy Prickett Morgan at .
The cloud touches all parts of Cisco’s business making this an important investment area for the company.
Following the Equifax breach, which exploited an open source framework library, many organizations increased their security postures, but that doesn't mean that open source is safe to use again.
Sherlock, a cloud-based platform-as-a-service, will target IoT use cases and verticals including retail, manufacturing, health care, and oil and gas.
AT&T, Google, and Microsoft highlighted significant progress for the ecosystem, but an enterprise survey showed most remain on the sidelines of actual deployment.
The Internet is a network of networks. Where do each of these networks meet to form the global Internet? At Internet Exchange Points or IXPs. In North America, these IXPs are also known as network access points, or NAPs.
Over the years, connecting to a NAP has become increasingly crucial for service providers to get right because of the sheer volume of traffic the Internet carries these days (Hello, Netflix!), the complexity of service provider peering agreements, and endless troubles with security threats.
Joining us today to discuss how to better plan, design, operate, and secure peering is our sponsor Cisco. Our guests from Cisco are Phil Bedard, Service Provider TME; and Bruce McDougall, Consulting Systems Engineer.
We discuss the evolution of Internet traffic flow and interconnection, how peering designs among service providers have changed, the role of telemetry and data, and peering security issues.
BGP Monitoring Protocol (BMP) – IETF
Internet Edge Peering – Current Practice – GitHub
BGP Operations and Security – IETF
Observing BGP activity with BGP Monitoring Protocol – Cisco
Streaming Network Analytics System (SNAS) – snas.io
The Death of Transit And Beyond – Geoff Huston (PDF)
Eyeball network – Wikipedia
The Continue reading
Intel and WindRiver contribute code to the OpenStack project; ETSI Open Source MANO issues Release Four; Samsung creates new silicon technology for high-performance computing.
Mirantis looks to the space where applications people and infrastructure people intersect.
A nonprofit telecommunications provider offering voice and data services to remote areas in southern Mexico has avoided a crippling federal fee after challenging it in court.
A Mexican court recently ordered the Federal Institute of Telecommunications to reconsider the spectrum fee for Indigenous Community Telecommunications (ICT), which serves about 3,500 customers. The fee, about 1 million pesos or US$50,000, is equal to about half of ITC’s annual operating budget, said Peter Bloom, founder and a board member of ITC.
But the ruling, by the Collegiate Circuit Court on Administrative Matters, Specialized in Economic Competition, Broadcasting and Telecommunications, doesn’t end the legal battle between the nonprofit ISP and the federal regulator.
ITC doesn’t feel like the regulator honored the ruling, Bloom said, even though it exempted the ISP from fees in 2017 and beyond as long as it maintains its nonprofit status.
The court instructed the regulator to “take into account fundamental human and constitutional rights when deciding how or if to charge for spectrum use,” he added. “In our case, our mission is social, but we were being taxed as a commercial cellular provider in an amount that would make it impossible for us to continue operating.”
The Continue reading
In this Network Collective short take, Russ shares a story about his time as an electrical engineer and the lesson he learned from it about fixing the problem.
The post Short Take – Fixing The Problem appeared first on Network Collective.