Extreme Offers 60-Day Rolling Financing on Networking Products
Short-term subscription financing has been available for networking software, but it’s more rare for networking hardware.
Short-term subscription financing has been available for networking software, but it’s more rare for networking hardware.
The platform integrates with public and private cloud providers, and allows DevOps teams to deploy applications in minutes.
CA Technologies says containers are “no-brainers” because they improve flexibility and increase developer productivity.
Configuring a static route is just like installing an entry directly in the routing table (or the RIB).
I have been told this many times in my work as a network engineer by operations people, coders, designers, and many other folks. The problem is that it is, in some routing table implementations, too true. To understand, it is best to take a short tour through how a typical RIB interacts with a routing protocol. Assume BGP, or IS-IS, learns about a new route that needs to be installed in the RIB:
The last step results in one of two possible reactions. The first Continue reading
The Internet Society Pakistan Islamabad Chapter (PK IBD) organised a webinar on “Digital Empowerment of Women in South Asia” on 15 March, 2018. ISOC Chapter leaders, members, and staff participated in the webinar where the regional and global women-centric initiatives were shared by the speakers.
The undersigned welcomed the audience on behalf of the Internet Society Pakistan Islamabad Chapter followed by a round of introductions. Joyce Dogniez, the Internet Society’s Senior Director, Global Community Engagement, shared the importance and relevance of the UN-EQUALS partnership which is a unique collaboration between state and non-state actors to bridge the digital gender divide. Joyce shared that the Internet Society is an important part of this partnership that primarily emphasizes improving ICT access, imparting digital skills, and promoting leadership of women. Internet and digital literacy leads to economic empowerment of women that can have a profound community impact.
The next session featured updates from the Chapter Leaders of South Asia on the various initiatives being undertaken on the country and Chapter level. Sagarika Wickramasekera from the ISOC Sri Lanka Chapter informed about the initiatives of the Chapter including WomenIGF, IT trainings for girls at school level, Internet learning programmes for women entrepreneurship, etc. Sidra Jalil from Continue reading
After completing its merger with Elfiq Networks, Martello launched an SD-WAN and is putting its scalability to the test with Canada’s Center of Excellence in Next-Generation Networks.
Containers can help enterprises maximize their cloud infrastructure if deployed correctly or cause headaches if treated like more traditional VM infrastructure.
We all know that ‘lock in’ is inevitable. You make a choice and then you live with the consequences of what you have bought. However, I see a number of area where vendors are actively promoting lockin to capture unearned profits and control their partners. These dark patterns are not always obvious and I wanted […]Take a Network Break! Cisco announced that it would allow third-party OSs to run on Nexus 9200 and 9300 switches, and let customers run NX-OS on other hardware. The company is also making its IOS-XR router OS available for “curated” third-party hardware.
AT&T announces a plan to deploy 60,000 whitebox routers as part of its 5G rollout, and its dNOS open network OS moves to the Linux Foundation. Juniper’s OpenContrail also joins the Linux Foundation and gets renamed Tungsten Fabric.
The P4 network programming language becomes an official project of the Open Networking Foundation, HPE buys Cape Networks for WLAN performance monitoring, Microsoft reorganizes the company, and Arista announces new 25 and 100GbE switches.
Get links with more details to all these stories after our sponsor message.
Send files to the cloud quickly and easily with Couchdrop, a cloud-based service that uses the Secure Copy Protocol to transfer files. Couchdrop integrates with Dropbox, GoogleDrive, Amazon S3 buckets and more. Head to Couchdrop.io to get details, and get two months free with a one-year subscription.
An Architectural Approach to Flexible Consumption for Service Providers with IOS XR – Cisco
Enabling IOS-XR on Third-Party Network Hardware Continue reading

This is a guest post by Jonathan Kosgei, founder of ipdata, an IP Geolocation API.
I woke up on Black Friday last year to a barrage of emails from users reporting 503 errors from the ipdata API.
Our users typically call our API on each page request on their websites to geolocate their users and localize their content. So this particular failure was directly impacting our users’ websites on the biggest sales day of the year.
I only lost one user that day but I came close to losing many more.
This sequence of events and their inexplicable nature — cpu, mem and i/o were nowhere near capacity. As well as concerns on how well (if at all) we would scale, given our outage, were a big wake up call to rethink our existing infrastructure.
Do you believe ICANN should go ahead with the plan to roll the Root Key Signing Key (KSK) on 11 October 2018? If so (or if not), the deadline for public comment is TODAY, 2 April 2018, at 23:59 UTC. That’s about 9.5 hours from the time I’m publishing this post.
My colleague Kevin Meynell provided more info about this public comment process when it began in March. At the IETF 101 meeting in London, I spoke with ICANN staff who again stated that they would like to hear from many voices about whether they should go ahead with the Root KSK Rollover on 11 October 2018. It’s very simple to send in comments:
You can see the current list of comments at: https://mm.icann.org/pipermail/comments-ksk-rollover-restart-01feb18/2018q1/thread.html (All comments are public.)
I would encourage anyone interested to submit comments (even if they are simply “I support the plan.”).
And if you have want more information about how to get started with using DNSSEC, please see our Deploy360 Start page to begin.
Image credit: Bryce Barker on Unsplash
The post Deadline TODAY (23:59 UTC) to submit comments to ICANN Continue reading
I'm positive on Juniper Contrail, but there are many things to think about regarding the company's SDN strategy and the changing market.
What IoT security problem? Most IT professionals realize the Internet of things poses some security risks, but less than a third of them actively monitor for third-party IoT security problems, according to a survey detailed at ZDNet. More than a third of those surveyed said that nobody in their organization is responsible for reviewing the risk-management policies of their IoT vendors.
Some security risks, only faster: Meanwhile, the European Union Agency for Network and Information Security is warning organizations that 5G mobile service may bring the same security risks as earlier mobile standards have. Known flaws in SS7 and Diameter, the signaling protocols used in 2G, 3G, and 4G, could end up in 5G, and allow traffic to be eavesdropped or spoofed, reports ARN.
Community broadband for net neutrality: The American Civil Liberties Union is urging U.S. cities to build their own broadband networks as a way to protect net neutrality principles, now that the Federal Communications Commission has repealed its related regulations. The Hill has a story. Many small U.S. cities are already building their own, in an effort to provide faster or cheaper service than commercial providers, Governing Magazine says.
Fake news in the news: Malaysia Continue reading
Last week I announced my departure from VMware, and my intention to step away from VMware’s products and platforms to focus on a new technology area moving forward. Today marks the “official” start of a journey that’s been building for a couple years, a journey that will take me into a future that’s containerized. That journey starts in Seattle, Washington.
Why Seattle, Washington? Because that’s where Heptio is based, and because today I am joining Heptio as a senior member of the field engineering team to help drive the adoption of Kubernetes across the industry. Only a couple of folks guessed that I was headed to Heptio. If you were one of those folks, you guessed correctly!
Two questions are probably rolling around in your head right now:
Good questions!
It’s clear to me that containers will have a significant impact on how we as IT professionals will develop, deploy, upgrade, and manage applications. It’s also clear to me that when it comes to orchestrating containers, Kubernetes is the clear leader. So, if I accept that containers are going to be a significant part of IT moving forward, then it logically follows that Kubernetes is Continue reading
For networking pros, subnetting is an essential skill. Follow these steps to ensure reliable performance and security in IPv4 networks.
For networking pros, subnetting is an essential skill. Follow these steps to ensure reliable performance and security in IPv4 networks.
What I am saying is that those arguing that we should reject third-party access out of hand haven’t carried their research burden. ... There are two reasons why I think there hasn’t been enough research to establish the no-third-party access position. First, research in this area is “taboo” among security researchers. ... the second reason why I believe more research needs to be done: the fact that prominent non-government experts are publicly willing to try to build secure third-party-access solutions should make the information-security community question the consensus view.