Connecting the Internet of Things: 4 Steps
Follow these guidelines to streamline the deployment and management of IoT devices on the network.
Follow these guidelines to streamline the deployment and management of IoT devices on the network.
More than two-thirds of all data centers will fully or partially adopt SDN by 2021.
Ethan Banks does a quick walk through of VMware's official release notes for NSX 6.4.
The post BiB 31: VMware NSX 6.4 Release Notes Round Up appeared first on Packet Pushers.
A look at some players in an emerging market that aims to radically transform how networks are built and managed.
The post Tier 1 carrier performance report: January, 2018 appeared first on Noction.
A while ago Russ White (answering a reader question) mentioned some areas where we might find machine learning useful in networking:
If we are talking about the overlay, or traffic engineering, or even quality of service, I think we will see a rising trend towards using machine learning in network environments to help solve those problems. I am not convinced machine learning can solve these problems, in the sense of leaving humans out of the loop, but humans could set the parameters up, let the neural network learn the flows, and then let the machine adjust things over time. I tend to think this kind of work will be pretty narrow for a long time to come.
Guess what: as fancy as it sounds, we don’t need machine learning to solve those problems.
Read more ...I gave a presentation at the recent Network Field Day 17 (on my 3rd day working for Juniper). My main goal for this presentation was just to get people excited about building stuff.
We tend to focus on vendor-provided solutions in this industry, and there’s a lot of good reasons for that, but it’s also good to stay sharp and be able to build your own solution to fill gaps where necessary. One reason I joined Juniper is that much of what we offer is built on a highly programmable foundation. So you get the best of both worlds - high-level products to solve the hard problems, but you still have the ability to insert your own custom tooling at various points in the stack.
In the above video, I outlined a simple Github-available demo for applying policies to a vSRX based on the existing services running in Kubernetes, and then verifying those policies are actually working by again using Kubernetes to determine what applications should be available.
My demo is designed to be self-sufficient, meaning you should be able to follow the README and get a working demo. Feel free to watch the above video first for context, then Continue reading
I gave a presentation at the recent Network Field Day 17 (on my 3rd day working for Juniper). My main goal for this presentation was just to get people excited about building stuff.
We tend to focus on vendor-provided solutions in this industry, and there’s a lot of good reasons for that, but it’s also good to stay sharp and be able to build your own solution to fill gaps where necessary. One reason I joined Juniper is that much of what we offer is built on a highly programmable foundation. So you get the best of both worlds - high-level products to solve the hard problems, but you still have the ability to insert your own custom tooling at various points in the stack.
In the above video, I outlined a simple Github-available demo for applying policies to a vSRX based on the existing services running in Kubernetes, and then verifying those policies are actually working by again using Kubernetes to determine what applications should be available.
My demo is designed to be self-sufficient, meaning you should be able to follow the README and get a working demo. Feel free to watch the above video first for context, then Continue reading
I am pleased to publish an infographic called "77 Facts About Cyber Crimes One Should Know In 2018." The infographic includes the top 10 biggest data breaches of the 21st century, top cyber crimes, stats of cyber attacks, fun facts and a ton more interesting info.
I am glad to thank BestVPNs for kind permission to republish the original article on my blog.
Note: Click image to enlarge.
I am pleased to publish an infographic called "77 Facts About Cyber Crimes One Should Know In 2018." The infographic includes the top 10 biggest data breaches of the 21st century, top cyber crimes, stats of cyber attacks, fun facts and a ton more interesting info.
I am glad to thank BestVPNs for kind permission to republish the original article on my blog.
Note: Click image to enlarge.
Did you miss Cumulus Networks’ session at Networking Field Day 2017 on February 26th? Or maybe you tuned in, and you want to reminisce on the best moments? Don’t worry, we’ve got you covered! Check out our top five favorite highlights from Technical Marketing Engineer Pete Lumbis’ presentation about managing EVPN/VXLAN. (You can also watch the whole session here, if you’d prefer to hear it from the man himself. Prepare for an intelligent demonstration peppered with some good laughs!)
It makes sense to start with the basics, and that’s exactly how we begin the presentation. In a daring move, Pete decides to illustrate Cumulus Linux’s capabilities sans-Powerpoint, and whiteboards the architecture of a Mellanox switch running our OS.
One of the great things about Cumulus technology is that it’s all based in Linux. So, any configurations you would make on a Linux device are exactly the same on Cumulus Linux. Simple, right? That’s exactly our goal — allowing customers to easily customize their network as they see fit with basic building blocks. As Pete describes it, building the network is like “taking those Lego pieces and turning them into Saturn V.” Continue reading
If you thought the up-front costs and risks were high for a silicon startup, consider the economics of building a full-stack quantum computing company from the ground-up—and at a time when the applications are described in terms of their potential and the algorithms still in primitive stages.
Quantum computing company, D-Wave managed to bootstrap its annealing-based approach and secure early big name customers with a total of $200 million over the years but as we have seen with a range of use cases, they have been able to put at least some funds back in investor pockets with system sales …
What It Takes to Build a Quantum Computing Startup was written by Nicole Hemsoth at The Next Platform.
Symantec, Skyhigh Networks (recently acquired by McAfee), and Netskope are leading vendors.
The company hopes to attract partners and customers on its way into the CNCF.
In December, the oVirt Project shipped version 4.2 of its open source virtualization management system. With a new release comes an update to this howto for running oVirt together with Gluster storage using a trio of servers to provide for the system's virtualization and storage needs, in a configuration that allows you to take one of the three hosts down at a time without disrupting your running VMs.
If you're looking instead for a simpler, single-machine option for trying out oVirt, your best bet is the oVirt Live ISO page. This is a LiveCD image that you can burn onto a blank CD or copy onto a USB stick to boot from and run oVirt. This is probably the fastest way to get up and running, but once you're up, this is definitely a low-performance option, and not suitable for extended use or expansion.
Read on to learn about my favorite way of running oVirt.
Hardware: You’ll need three machines with 16GB or more of RAM and processors with hardware virtualization extensions. Physical machines are best, but you can test oVirt using nested KVM as well. I've written this howto using VMs running on my "real" Continue reading
In December, the oVirt Project shipped version 4.2 of its open source virtualization management system. With a new release comes an update to this howto for running oVirt together with Gluster storage using a trio of servers to provide for the system's virtualization and storage needs, in a configuration that allows you to take one of the three hosts down at a time without disrupting your running VMs.
If you're looking instead for a simpler, single-machine option for trying out oVirt, your best bet is the oVirt Live ISO page. This is a LiveCD image that you can burn onto a blank CD or copy onto a USB stick to boot from and run oVirt. This is probably the fastest way to get up and running, but once you're up, this is definitely a low-performance option, and not suitable for extended use or expansion.
Read on to learn about my favorite way of running oVirt.
Hardware: You’ll need three machines with 16GB or more of RAM and processors with hardware virtualization extensions. Physical machines are best, but you can test oVirt using nested KVM as well. I've written this howto using VMs running on my "real" Continue reading
How did I use over a gigabyte of mobile data in a single day? Why is my phone as warm as a hot plate? If you have ever asked yourself either of these questions, you might be the victim of a malicious application that is using your device and consuming your mobile bandwidth to facilitate ad fraud. We have recently identified a large population of apps being distributed from the Google Play Store that support this behavior. These apps are installed on devices on a majority of the major cell phone carriers around the world. These carriers operate in the US (AT&T, Verizon, Sprint, and T-Mobile), Europe (KPN, Vodafone, Ziggo, Sky, Virgin, Talk Talk, BT, O2, and T-Mobile), and the Asia Pacific region (Optus, Telstra, iinet, and others) [Note: Mobile providers and Google have been notified]. Just this morning, before this article was published, Buzzfeed broke another ad fraud story.
The Mechanics of the Grift
Online advertising consists of a complex ecosystem of ad buyers, sellers, exchanges, and data providers. Operators of websites and application authors have available space in their content layout and interaction in the user experience that can be integrated to include various forms of Continue reading