Indian Lending Exchange Runs Hyperledger Fabric in Production
It’s notable because the Hyperledger code is running in a production environment with three competing institutions all running on the same blockchain network.
It’s notable because the Hyperledger code is running in a production environment with three competing institutions all running on the same blockchain network.

Working from Home works.
Today on the Priority Queue we have a roundtable show. We’ve gathered a few engineers around the microphone to talk about their experiences and what’s on their minds.
We often hear this format is an audience favorite, so we plan to record more of these in the Priority Queue and Weekly channels, so keep an eye out.
Today we welcome Alex Clipper, Eric Gullickson, Matt Elliott, and Stafford Rau to the podcast. We discuss encryption, code styles to ensure that code written by networkers is up to snuff, and what it’s like to work in technology after a certain age.
Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your entire IT infrastructure 24/7 and alerts you to problems before users notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better by visiting paessler.com today.
Understanding Media Access Control Security (MACsec) – Technical Documentation – Support – Juniper Networks
Layer 2-Encryptors For Metro And Carrier Ethernet WANs And MANs – Inside-IT (PDF)
Thales L2 Encryption – Thales
Senetas – Senetas.com
What Is Optical Encryption? – Ciena
Google Style Guides – GitHub
Workflow automation has been born of necessity and has evolved an increasingly sophisticated set of tools to manage the growing complexity of the automation itself.
The same theme keeps emerging across the broader spectrum of enterprise and research IT. For instance, we spoke recently about the need to profile software and algorithms when billions of events per iteration are generated from modern GPU systems. This is a similar challenge and fortunately, not all traditional or physical business processes fall into this scale bucket. Many are much less data intensive, but can have a such a critical impact in “time to …
New Approaches to Optimizing Workflow Automation was written by James Cuff at The Next Platform.

Hopefully by now you’ve seen the announcement that CloudFlare has opened a new DNS service at the address of 1.1.1.1. We covered a bit of it on this week’s episode of the Gestalt IT Rundown. Next to Gmail, it’s probably the best April Fool’s announcement I’ve seen. However, it would seem that the Internet isn’t quite ready for a DNS resolver service that’s easy to remember. And that’s thanks in part to the accumulation of bad address hygiene.
The address range of 1/8 is owned by APNIC. They’ve had it for many years now but have never announced it publicly. Nor have they ever made any assignments of addresses in that space to clients or customers. In a world where IPv4 space is at a premium, why would a RIR choose to lose 16 million addresses?
As it turns out, 1/8 is a pretty bad address space for two reasons. 1.1.1.1 and 1.2.3.4. These two addresses are responsible for most of the inadvertent announcements in the entire 1/8 space. 1.2.3.4 is easy to figure out. It’s the most common example IP address Continue reading
RSA today rolled out an orchestration and automation tool for its SIEM product. It also reached a deal to acquire Fortscale, a behavioral analytics startup.


Photo from Wikimedia Commons
Today we’re introducing Argo Tunnel, a private connection between your web server and Cloudflare. Tunnel makes it so that only traffic that routes through Cloudflare can reach your server.
You can think of Argo Tunnel as a virtual P.O. box. It lets someone send you packets without knowing your real address. In other words, it’s a private link. Only Cloudflare can see the server and communicate with it, and for the rest of the internet, it’s unroutable, as if the server is not even there.
This type of private deployment used to be accomplished with GRE tunnels. But GRE tunnels are expensive and slow, they don’t really make sense in a 2018 internet.
GRE is a tunneling protocol for sending data between two servers by simulating a physical link. Configuring a GRE tunnel requires coordination between network administrators from both sides of the connection. It is an expensive service that is usually only available for large corporations with dedicated budgets. The GRE protocol encapsulates packets inside other packets, which means that you will have to either lower the MTU of your origin servers, or have your router do Continue reading
The Internet has the potential to enable Indigenous communities to continue living on remote traditional lands without diminishing their access to services and information. The potential can go a long way towards closing the digital divide and offers new opportunities while preserving Indigenous culture.
In the ongoing debate about what difference the digital makes to the concept of Indigeneity itself, the voices of Indigenous people are what has been missing. It should be left up to community members to be caught up in this age of information and build the future on their own terms.
This is the story of Lenca people of Azacualpa, an Indigenous community of Yamaranguila in Intibucá, Honduras. In June 2017 they decided to start their relationship with technology by creating Radio Azacualpa, a radio station run by women, with the support of Cultural Survival’s Community Media Grants Project. It was a dream come true.
The radio tagline “La voz de las Mujeres” – the voice of women – says it all. “One of our goals as a radio station is to achieve recognition of our rights as women and to achieve equality,” explains Maria Santos, leader of the Azacualpa community.
In 2018, the Lenca decided Continue reading
You can create a sensor to monitor wired and WiFi networks and gain insight into how networks are performing for remote end users.
You can create a sensor to monitor wired and WiFi networks and gain insight into how networks are performing for remote end users.
In this excerpt from "Learning VMware NSX, Second Edition" see the steps involved in setting up the network virtualization software.
In this excerpt from "Learning VMware NSX, Second Edition" see the steps involved in setting up the network virtualization software.
REST API is the way of the world and all network devices should support it, right? Well, Ken Duda (Arista) disagreed with this idea during his Networking Field Day presentation, but unfortunately there wasn’t enough time to go into the details that would totally derail the presentation anyway.
Fixing that omission: should we have REST API on network devices or not?
Read more ...Amazon Web Services essentially sparked the public cloud race a dozen years ago when it first launched the Elastic Compute Cloud (EC2) service and then in short order the Simple Storage Service (S3), giving enterprises access to the large amount compute and storage resources that its giant retail business leaned on.
Since that time, AWS has grown rapidly in the number of services it offers, the number of customers it serves, the amount of money it brings in and the number of competitors – including Microsoft, IBM, Google, Alibaba, and Oracle – looking to chip away …
AWS Puts More Muscle Behind Machine Learning And Database was written by Jeffrey Burt at The Next Platform.
Check out my prior below blogs here on VMware Network Virtualization blog on how NSX is leveraged in VMware Cloud on AWS to provide all the networking and security features. These prior blogs provide a foundation that this blog post builds on. In this blog post I discuss how AWS Direct Connect can be leveraged with VMware Cloud on AWS to provide high bandwidth, low latency connectivity to a SDDC deployed in VMware Cloud on AWS. This is one of my favorite features as it provides high bandwidth, low latency connectivity from on-prem directly into the customer’s VMware Cloud on AWS VPC enabling better and consistent connectivity/performance while also enabling live migration/vMotion from on-prem to cloud! I want to to thank my colleague, Venky Deshpande, who helped with some of the details in this post. Continue reading
The company maintains close ties to AWS' Lambda serverless platform, but it is working more closely with Microsoft Azure.