Stuff The Internet Says On Scalability For October 27th, 2017

Hey, it's HighScalability time: 


Perfect! Now, imagine a little dog snuck under Big Dog's cone of shame and covered the food with its own cone of shame, and it won't leave. That's deadlock. Imagine a stream of little dogs sneaking under Big Dog's cone so Big Dog nevers gets a bite. That's livelock.

 

If you like this sort of Stuff then please support me on Patreon.

 

  • $100 billion: projected 2021 combined app store spend; 11 TB: SSD; 16: billion dollar disasters in the US this year; 8: meter long 3D printed bridge; 43%: employees who worry about losing their job due to their age; 125 TFLOPS: new AWS EC2 P3 instances; 7%: global Internet traffic flowing over QUIC; 50%: improvement in new in-package DRAM cache-management scheme; 43%: CockroachDB speed improvement executing parallel SQL statements; 325 billion: hours spent in Android apps in Q3; 4.5 million: C++ programmers; 3 trillion: ops per second in Pixel's Image Processing Unit; 80%: drop in Facebook referrals; 1,300 years: longest running business in the world; 40: age when tech Continue reading

IDG Contributor Network: How IoT is shaping the smart office of the future

The Internet of Things (IoT) has already firmly embedded itself into America’s homes, industries, and infrastructure, and now it’s tackling that final frontier of the market, the office. Increasingly, America’s savviest businesses are adopting IoT tech into their office environments to ease their employees’ workloads, save serious money on overhead and by reducing fraud, and to gather valuable data which can be used to optimize their operations.So how exactly are IoT solutions being applied to office dilemmas, and is the increasingly trendy “smart office” anything more than a temporary fad? A quick look at the union between smart tech and America’s workspaces shows that this phenomenon is anything but temporary, and will fundamentally reshape how we work and run our businesses well into the future.To read this article in full or to leave a comment, please click here

Cisco adds telemetry to storage networks

Fiber Channel (FC) storage networks have always been somewhat of a black box. Servers and storage devices are plugged in, and things magically seem to work.For the most part, storage-area networks (SANs) are reliable and perform well – and they better because the applications that rely of FC-SANs are typically the most important ones in the company. But what happens when things aren’t working? A poorly performing SAN might mean that the database with critical customer information isn’t available or financial records can’t be pulled up. Also on Network World: 10 Most important open source networking projects Historically, troubleshooting SANs has been difficult because the FC switches give off little data that can be used to identify the source of a problem. Typically, engineers would need to deploy a physical test access port (TAP) or packet broker in front of the product to capture the data. This may seem like a reasonable strategy until one prices out TAPs and learns the price per port is about 5-10x a FC port. Companies that go down this route often buy a few and deploy them only when there is a problem. This causes the engineering team to always be in Continue reading

Can We Expand the Multistakeholder Model for Internet Governance? A Feasibility Report

What can be done to expand the usage of the multistakeholder model for Internet governance?

Collaborative decision making has been at the heart of how the Internet has grown and developed since its earliest days. Multistakeholder approaches are used across the Internet ecosystem and have helped create the opportunities made possible by the Internet today. But as we outlined in our Global Internet Report 2017, more work is needed to expand the use of multistakeholder processes in order to tackle some of the most pressing challenges facing the future of the Internet.

As I wrote last summer, the Internet Society commissioned a feasibility study on expanding the use of the multistakeholder model for Internet governance , including three focus areas:

  • Demonstrating the efficacy of the model
  • Capacity building
  • Research

I would like to thank Larry Strickling and Grace Abuhamad, who have led this work. Their report is based on interviews with a wide range ICT experts from academia, industry, the technical community, civil society and governments.  It details a possible framework for such an initiative, as well as the resources required. It also makes clear that any new initiative should support and complement existing initiatives such as the Internet Governance Forum Continue reading

Scary Linux commands for Halloween

With Halloween so fast approaching, it’s time for a little focus on the spookier side of Linux. What commands might bring up images of ghosts, witches and zombies? Which might encourage the spirit of trick or treat?crypt Well, we’ve always got crypt. Despite its name, crypt is not an underground vault or a burial pit for trashed files, but a command that encrypts file content. These days “crypt” is generally implemented as a script that emulates the older crypt command by calling a binary called mcrypt to do its work. Using the mycrypt command directly is an even better option. $ mcrypt x Enter the passphrase (maximum of 512 characters) Please use a combination of upper and lower case letters and numbers. Enter passphrase: Enter passphrase: File x was encrypted. Note that the mcrypt command creates a second file with an added ".nc" extension. It doesn't overwrite the file you are encrypting.To read this article in full or to leave a comment, please click here

MetLife Uses Docker Enterprise Edition to Self Fund Containerization

MetLife is a 150 year old company in the business of securing promises and the information management of over 100M customers and their insurance policies. As a global company, MetLife delivers promises into every corner of the world – some of them built to last a lifetime. With this rich legacy comes a diverse portfolio of IT infrastructure to maintain those promises.

In April, Aaron Aedes from MetLife spoke about their first foray into Docker containerization with a new application, GSSP, delivered through Azure. Six months later, MetLife returns to the DockerCon stage to share their journey since this initial deployment motivated them to find other ways to leverage Docker Enterprise Edition [EE] within MetLife.

Jeff Murr, Director of Engineering for Containers and Open Source at MetLife spoke in the Day 1 DockerCon keynote session about how they are looking to scale containerization with Docker as they scale . He states that new technology typically adds more cost and overhead to an already taxed IT budget. But the Docker Modernize Traditional Apps [MTA] Program presented an opportunity to reduce the costs of their existing applications.

The MTA project at MetLife started with a single Linux Java-based application that handled the “Do Not Continue reading

IDG Contributor Network: How consumer demand is driving development of the Internet of Things

Few industries are as impacted by consumer demand as the Internet of Things (IoT) and the plethora of sectors reliant on in; when consumers demand a new gadget or a new service, an innovative startup springs up seemingly overnight to meet those demands. Similarly, few consumer goods are as customizable or responsive to changing user preferences as the gadgets and software that make up the commercial IoT. So how can savvy IoT enthusiast rely on consumer demand to better the IoT businesses?One can’t find success in the field of IT or within the IoT in general without understanding how crucial consumer demand is to the industry as a whole. More than anything else, this demand is driving the extraordinarily rapid development of the IoT, which could reach a dizzying 50 billion connections by 2020, according to Brookings.To read this article in full or to leave a comment, please click here

QCT Open Data Center Technology Poised to Help Telcos ‘Win 5G Battles’

QCT Open Data Center Technology Poised to Help Telcos ‘Win 5G Battles’ SAN JOSE, California — Quanta Cloud Technology’s (QCT) latest data center technology brings the benefits of disaggregation and composable infrastructure to cloud service providers and telco service providers, said Mike Yang, president of QCT at today’s Q.synergy 2017 event. The Rackgo R portfolio is based on the Intel Rack Scale Design (RSD) software framework, which... Read more →

Devaluing Data Exposures

I had a great time this week recording the first episode of a new series with my co-worker Rich Stroffolino. The Gestalt IT Rundown is hopefully the start of some fun news stories with a hint of snark and humor thrown in.

One of the things I discussed in this episode was my belief that no data is truly secure any more. Thanks to recent attacks like WannaCry and Bad Rabbit and the rise of other state-sponsored hacking and malware attacks, I’m totally behind the idea that soon everyone will know everything about me and there’s nothing that anyone can do about it.

Just Pick Up The Phone

Personal data is important. Some pieces of personal data are sacrificed for the greater good. Anyone who is in IT or works in an area where they deal with spam emails and robocalls has probably paused for a moment before putting contact information down on a form. I have an old Hotmail address I use to catch spam if I’m relative certain that something looks shady. I give out my home phone number freely because I never answer it. These pieces of personal data have been sacrificed in order to provide me Continue reading

IoT market keeps growing, with no end in sight

With all the hype it’s getting, you might think the Internet of Things (IoT) simply couldn’t gain any more momentum. Well, think again, because new market research and a wave of global IoT investments from sovereign nations and top-name companies keeps on accelerating the IoT momentum.Growth, growth and more growth First off, IHS Markit has published a new ebook in which it predicts serious growth for IoT: “The number of connected IoT devices worldwide will jump 12 percent on average annually, from nearly 27 billion in 2017 to 125 billion in 2030.”According to the ebook, titled “The Internet of Things: a movement, not a market,” (pdf) that growth “is impacting virtually all stages of industry and nearly all market areas — from raw materials to production to distribution and even the consumption of final goods.” To read this article in full or to leave a comment, please click here

VMware NSX/Kubernetes and F5 – A Cloud Native App Integration

Introduction

When Bob Dylan wrote back in the 60’s “times they are a-changin” it’s very possible he knew how true that would be today.  Last week, we saw a few things announced in the container technology space during the DockerCon event in Copenhagen – but one thing that I believe came as a surprise to many was Docker’s announcement to begin including Kubernetes in Docker Enterprise edition sometime in early 2018.  This doesn’t concede or mark the death of Docker’s own scheduling and orchestration platform, Docker Swarm, but it does underscore what we’ve heard from many of our customers for quite some time now – almost every IT organization that is using/evaluating containers has jumped on the Kubernetes bandwagon.  In fact, many of you are probably already familiar with the integration supported today with NSX-T 2.0 and Kubernetes from the post that Yves did earlier in the year…

In the past few years, we’ve heard a lot about this idea of digital transformation and what it means for today’s enterprise.  Typically, a part of this transformation is something called infrastructure modernization, and this happens because most IT environments today have some hurdles that need to Continue reading

Technology Short Take 89

Welcome to Technology Short Take 89! I have a collection of newer materials and some older materials this time around, but hopefully all of them are still useful. (I needed to do some housekeeping on my Instapaper account, which is where I bookmark stuff that frequently lands here.) Enjoy!

Networking

  • This is a slightly older post providing an overview of container networking, but still quite relevant. Julia has a very conversational style that works well when explaining new topics to readers, I think.
  • Russell Bryant has a post on Open Virtual Network (OVN), a project within the Open vSwitch (OVS) community. If you’re not familiar with OVN, this is a good post with which to start.

Servers/Hardware

Hmm…I didn’t find anything again this time around. Perhaps I should remove this section?

Security

  • This blog post discusses some of the new network security functionality available in vSphere Integrated Containers (VIC) version 1.2; specifically, the new container network firewall functionality.
  • The NIST and DHS have teamed up on some efforts to secure BGP; more information is available in this article.
  • When I was using Fedora, I needed some useful information on firewall-cmd, and found this article to Continue reading

IDG Contributor Network: Don’t keep squandering one of your greatest storage assets: metadata

Storage has long been one of the biggest line items on the IT budget. Rightly so, given that data is valuable asset and the lifeblood of every business today. Critical applications consume data as quickly as they get it, and many companies are also using their data to find new insights that help them develop novel products and strategies.Regardless of how hot a file is when it is created, in time, its use cools. As a business matures, more and more cool, cold and even frigid data continues to pile up. With analytics now offering new insights on old data, however, no one wants to delete old files or send them to offline archival storage. This means buying more and more capacity is a given, just as death and taxes.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Don’t keep squandering one of your greatest storage assets: metadata

Storage has long been one of the biggest line items on the IT budget. Rightly so, given that data is valuable asset and the lifeblood of every business today. Critical applications consume data as quickly as they get it, and many companies are also using their data to find new insights that help them develop novel products and strategies.Regardless of how hot a file is when it is created, in time, its use cools. As a business matures, more and more cool, cold and even frigid data continues to pile up. With analytics now offering new insights on old data, however, no one wants to delete old files or send them to offline archival storage. This means buying more and more capacity is a given, just as death and taxes.To read this article in full or to leave a comment, please click here

Service Provider MPLS : Inter-AS MPLS Options

Today I am going to talk about the Inter-AS MPLS or you can say that Inter-provider MPLS option. So in this case i am taking the example on the Cisco devices. To maintain the continuity of MPLS VPN services across multiple service providers, mainly for customers who span world wide on different service providers, IETF described 3 types of options. These options are 
  • Option A
  • Option B 
  • Option C
 Inter-AS or Inter-Provider MPLS VPN solutions, while Cisco implemented three options (1, 2 and 3) with Cisco IOS (these options are also known in Cisco documents as 10A, 10B and 10C).

Lets start with all these option one by one. The first option is called as VRF to VRF connection between two different AS border routers and the explanation is as below.

Option A: VRF-to-VRF connections at the AS (Autonomous System) border routers
In this procedure, a PE router in one AS attaches directly to a PE router in another. The two PE routers will be attached by multiple sub-interfaces, at least one for each of the VPNs whose routes need to be passed from AS to AS. 
Fig 1.1- Inter-AS option A

Each PE will treat the other Continue reading

LLDP Information Now Available via the Administration Portal

In oVirt 4.2 we have introduced support for the Link Layer Discovery Protocol (LLDP). It is used by network devices for advertising the identity and capabilities to neighbors on a LAN. The information gathered by the protocol can be used for better network configuration.Learn more about LLDP.

Why do you need LLDP?

When adding a host into oVirt cluster, the network administrator usually needs to attach various networks to it. However, a modern host can have multiple interfaces, each with its non-descriptive name.

Examples

In the screenshot below, taken from the Administration Portal, a network administrator has to know to which interface to attach the network named m2 with VLAN_ID 162. Should it be interface enp4s0, ens2f0 or even ens2f1? With oVirt 4.2, the administrator can hover over enp4s0 and see that this interface is connected to peer switch rack01-sw03-lab4, and learn that this peer switch does not support VLAN 162 on this interface. By looking at every interface, the administrator can choose which interface is the right option for networkm2.

screen

A similar situation arises with the configuration of mode 4 bonding (LACP). Configurating LACP usually starts with network administrator defining a port group Continue reading