VMware’s Future Is Networking, CEO Pat Gelsinger Says
In addition to NSX, the company’s software-defined storage and hyperconverged products also saw strong growth during the first quarter of its fiscal 2019.
In addition to NSX, the company’s software-defined storage and hyperconverged products also saw strong growth during the first quarter of its fiscal 2019.
Believe it or not, Cisco Systems has a bunch of customers for its UCS blade and rack servers that are in the gaming industry, which has its share of near-hyperscale players who have widely geographically distributed clusters spread around the globe so players can get very low latency access over the Internet to games running on that infrastructure. …
Cisco Gets Modular With Servers In Epyc Fashion was written by Timothy Prickett Morgan at .
CNCF cited a recent Kubernetes application survey that found 64 percent of app developers, operators, and ecosystem tool developers were using Helm to manage applications on Kubernetes.
Linux Foundation offers free course on open source networking; Apstra, Dell EMC, and Awnix deploy OpenSwitch
The Cambridge Analytica data misuse is the most recent high-profile incident to impact Internet trust. Trust – or the lack thereof – is the term used to describe much of the current state of the Internet. For years now, we have been hearing about a decline in user trust because of fears of surveillance, cybercrime, data breaches, crack downs on speech, or misuse of their data.
However, recently updated data from a recently released edition of CIGI’s annual survey on Trust seems to shatter commonly-held views on the state of trust and raise some novel questions. While the survey covers a wide range of issues from privacy to e-commerce and online habits, one particular result is rather striking:
Three quarters of respondents (73%) said that they agree with the statement “overall, I trust the Internet.” Last year only 56% said that. The trust was highest in China (91%) and India (90%).
This result appears to contradict the assumption that overall trust in the Internet is diminishing.
If, indeed, there is an overall increase in trust, then the first question we should ask is: what type of trust are we talking about?
One challenge that every WISP owner or operator has faced is how to leverage unused bandwidth on a backup path to generate more revenue.
For networks that have migrated to MPLS and BGP, this is an easier problem to solve as there are tools that can be used in those protocols like communities or MPLS TE to help manage traffic and set policy.
However, many WISPs rely solely on OSPF and cost adjustment to attempt to influence traffic. Alternatively, trying to use policy routing can lead to a design that doesn’t failover or scale well.
WISPs that are OSPF routed will often have a primary path back to the Internet at one or more points in the network typically from a tower that aggregates multiple backhauls.
As more towers are added that rely on this path, it can create a bottleneck while other paths are unused.
One way to solve this problem is to use VLANs to create another subnet for OSPF to form an adjacency.
By tagging the VLAN from Tower 6 through Tower 3 and into Tower 4, a new path Continue reading
One challenge that every WISP owner or operator has faced is how to leverage unused bandwidth on a backup path to generate more revenue.
For networks that have migrated to MPLS and BGP, this is an easier problem to solve as there are tools that can be used in those protocols like communities or MPLS TE to help manage traffic and set policy.
However, many WISPs rely solely on OSPF and cost adjustment to attempt to influence traffic. Alternatively, trying to use policy routing can lead to a design that doesn’t failover or scale well.
WISPs that are OSPF routed will often have a primary path back to the Internet at one or more points in the network typically from a tower that aggregates multiple backhauls.
As more towers are added that rely on this path, it can create a bottleneck while other paths are unused.
One way to solve this problem is to use VLANs to create another subnet for OSPF to form an adjacency.
By tagging the VLAN from Tower 6 through Tower 3 and into Tower 4, a new path Continue reading
For artificial intelligence in networking to become mainstream, we need a common standard across the IT stack.
For some companies, the goal of intent-based networking may be rather simple.
On today’s Weekly Show the Packet Pushers jump on the live grenade that is the debate over the value of IT certifications.
Spurred by Greg’s blog about giving up his CCIE status, this episode looks at the value of technology certifications such as the CCIE and others.
Greg and guests Mike Fryar, Chris Kluka, and Jeremy Filliben discuss the benefits and limits of professional certifications, the differences between certifications and actual skills, whether certifications represent a standardized body of knowledge or just a set of instructions, and how the industry might better foster learning.
InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at InterOptic.com, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network.
The Cumulus Linux network OS is simple, open, untethered Linux that can run on more than 70 hardware platforms and help you transition from your legacy infrastructure. Cumulus Networks is Web-scale networking for the digital age. Go to cumulusnetworks.com to find out more.
Quitting My CCIE Status – Greg Ferro
Netmiko develop by kirk Byers is open source python library based on Paramiko which simplifies SSH management to network devices .
Netmiko library makes task to automate . Its very tedious to find out the procedure to install Netmiko in Windows enviornment.Let’s make out task simple :-
Steps:




Its done.. Enjoy automating tasks !!!!
Here’s a response I got from Simon Milhomme on my Why Is Network Automation So Hard article:
Read more ...ForkBase: an efficient storage engine for blockchain and forkable applications Wang et al., arXiv’18
ForkBase is a data storage system designed to support applications that need a combination of data versioning, forking, and tamper proofing. The prime example being blockchain systems, but this could also include collaborative applications such as GoogleDocs. Today for example Ethereum and HyperLedger build their data structures directly on top of a key-value store. ForkBase seeks to push these properties down into the storage layer instead:
One direct benefit is that it reduces development efforts for applications requiring any combination of these features. Another benefit is that it helps applications generalize better by providing additional features, such as efficient historical queries, at no extra cost. Finally, the storage engine can exploit performance optimization that is hard to achieve at the application layer.
Essentially what we end up with is a key-value store with native support for versioning, forking, and tamper evidence, built on top of an underlying object storage system. At the core of ForkBase is a novel index structure called a POS-Tree (pattern-oriented-split tree).

From the bottom-up, ForkBase comprises a chunk storage layer that performs chunking and deduplication, a Continue reading

On May 31, 2018 we had a 17 minute outage on our 1.1.1.1 resolver service; this was our doing and not the result of an attack.
Cloudflare is protected from attacks by the Gatebot DDoS mitigation pipeline. Gatebot performs hundreds of mitigations a day, shielding our infrastructure and our customers from L3/L4 and L7 attacks. Here is a chart of a count of daily Gatebot actions this year:

In the past, we have blogged about our systems:
Today, things didn't go as planned.

Cloudflare’s network is large, handles many different types of traffic and mitigates different types of known and not-yet-seen attacks. The Gatebot pipeline manages this complexity in three separate stages:
The benign-sounding "reactive automation" part is actually the most complicated stage in the pipeline. We expected that from the start, which is why we implemented this stage using a custom Functional Reactive Programming (FRP) framework. If you want to know more about it, see the talk and the presentation.