It’s the beginning of a brand new month, and you know what that means… it’s time for the Cumulus content roundup! This month, we can’t stop talking about leveraging Linux and disaggregation — and it looks like we’re not the only ones who have white-box fever (congrats on joining the movement, Cisco)! All the webinars, videos and white papers you could ask for are included in this roundup, so grab a comfy seat and check out everything that piques your interest.
The S.O.U.L revolution: The era of oppressive traditional networking ends today! It’s time to add some S.O.U.L to your data center network. What does S.O.U.L stand for? Watch this video to find out and get into the movement that’s revolutionizing the way we think about networking.
Web-scale networking for telco: Cumulus Networks commissioned Heavy Reading to conduct a survey of 70+ IT leaders in the Telco and CSP space to understand what is top of mind in terms of IT priorities. Download this white paper to see what we discovered about their top concerns.
Why Linux in the data center: a fireside chat: Continue reading
A major transformation is happening now as technological advancements and escalating volumes of diverse data drive change across all industries. Cutting-edge innovations are fueling digital transformation on a global scale, and organizations are leveraging faster, more powerful machines to operate more intelligently and effectively than ever.
Recently, Hewlett Packard Enterprise (HPE) has announced the new HPE Apollo 6500 Gen10 server, a groundbreaking platform designed to tackle the most compute-intensive high performance computing (HPC) and deep learning workloads. Deep learning – an exciting development in artificial intelligence (AI) – enables machines to solve highly complex problems quickly by autonomously analyzing …
Fueling AI With A New Breed of Accelerated Computing was written by Timothy Prickett Morgan at The Next Platform.
Learn about packet slicing, TShark, and other ways for working with large traces in Wireshark or other protocol analyzers in this video.
Learn about packet slicing, TShark, and other ways for working with large traces in Wireshark or other protocol analyzers.
The idea of generating random IPv6 addresses (so you cannot be tracked across multiple networks based on your MAC address) that stay stable within each subnet (so you don’t pollute everyone’s ND cache every time you open your iPad) is pretty old: RFC 7217 was published almost exactly four years ago.
Linux was quick to pick it up, OpenBSD got RFC 7127 support a few weeks ago. However, there’s an Easter egg in the OpenBSD patches that implement it: SLAAC on OpenBSD now works with any prefix length (not just /64).
Read more ...
Lumina can operate a single control plane that software defines the existing routed network and integrates white box switches.
Hi , Am Planning to write a in detail usage of how we can leverage Aws cloud - ansible - github - travis-(ci/cd) with in our networking deployment space. As of now, I will quickly author how you can leverage the usage of Travis CI in our experimental space. You can find more about Travis CI - Here - .org of travis will help to run Opensource Projects https://travis-ci.org/ I am using AWS cloud desktop to do the changes to the code, get it pushed to git-hub and then integrate everything if Travis CI passes the checks To let you know the workflow in a very simpler way -> You write any code or config related to networks on AWS cloud desktop -> push the code into git-hub in a branch later to be integrated into Master Branch -> Setup Travis to automatically run some pre-defined tests -> If all successful, we will merge the code into our master branch -> Lets write a very basic code in a branch and push to git-hub![]()
The github page has been integrated with Travis-CI
![]()
Travis CI peforms the required checks, here it just checks for syntax, obvious this can be exetended Continue reading
Recently, I have scanned nearby wireless networks with airodump. I have discovered five networks transmitting on channel 3. MAC addresses of access points (BSSIDs) transmitting on channel 3 differ only in last two hexa digits and a signal level (PWR) reported by my WiFi card is almost same for all BSSIDs.
$ sudo airodump-ng wlp3s0

Picture 1 - Wireless Networks of Caffe Geo Guru
The following three ESSIDs have caught my attention.
1) Heslo do siete caffe.geo.guru
2) zistis rozlustenim sifry
3) qnw fv qboer cvib
In fact, the ESSIDs represent a cryptography challenge created for customers of caffe.geo.guru. Once the challenge is successfully solved a customer gains a password for connection to the wireless network with ESSID caffe.geo.guru.
Note: The first two ESSID are written in Slovak. Their English version is below.
1) Password to network caffe.geo.guru
2) can be gained by decoding words
3) qnw fv qboer cvib
The third ESSID represents an encoded password. Obviously, letters are substituted in ciphertext which let us to the assumption that ROT cipher is used. Using ROT13 cipher on the encoded text 'qnw fv qboer cvib' gives us a required plain-text password Continue reading
Recently, I have scanned nearby wireless networks with airodump. I have discovered five networks transmitting on channel 3. MAC addresses of access points (BSSIDs) transmitting on channel 3 differ only in last two hexa digits and a signal level (PWR) reported by my WiFi card is almost same for all BSSIDs.
$ sudo airodump-ng wlp3s0

Picture 1 - Wireless Networks of Caffe Geo Guru
The following three ESSIDs have caught my attention.
1) Heslo do siete caffe.geo.guru
2) zistis rozlustenim sifry
3) qnw fv qboer cvib
In fact, the ESSIDs represent a cryptography challenge created for customers of caffe.geo.guru. Once the challenge is successfully solved a customer gains a password for connection to the wireless network with ESSID caffe.geo.guru.
Note: The first two ESSID are written in Slovak. Their English version is below.
1) Password to network caffe.geo.guru
2) can be gained by decoding words
3) qnw fv qboer cvib
The third ESSID represents an encoded password. Obviously, letters are substituted in ciphertext which let us to the assumption that ROT cipher is used. Using ROT13 cipher on the encoded text 'qnw fv qboer cvib' gives us a required plain-text password Continue reading
Short-term subscription financing has been available for networking software, but it’s more rare for networking hardware.
The platform integrates with public and private cloud providers, and allows DevOps teams to deploy applications in minutes.
CA Technologies says containers are “no-brainers” because they improve flexibility and increase developer productivity.
Configuring a static route is just like installing an entry directly in the routing table (or the RIB).
I have been told this many times in my work as a network engineer by operations people, coders, designers, and many other folks. The problem is that it is, in some routing table implementations, too true. To understand, it is best to take a short tour through how a typical RIB interacts with a routing protocol. Assume BGP, or IS-IS, learns about a new route that needs to be installed in the RIB:
The last step results in one of two possible reactions. The first Continue reading