Comcast Business’ Kevin O’Toole on SD-WAN’s Transformational Promise

SD-WAN Transformational Promise Comcast Business recently launched an SD-WAN offering for distributed enterprises based on its new, virtualized ActiveCoresm platform, which leverages the agility of software-defined networking to enable better application performance, centralized network policy management and more effective cost controls. Comcast is the first cable company to introduce a carrier-grade, SD-WAN offering for multisite businesses, and is... Read more →

Amazon Discounts Fire 7 by $15, Fire HD 8 by $25 For Prime Members – Deal Alert

Amazon's best-selling tablets feature vibrant displays, generous battery life, Alexa, parental controls, and everything you need to surf, check email, watch Netflix, read books, and more. If you're a Prime member, you can get get the Fire 7 for as low as $34.99 after a $15 discount, or the Fire HD 8 for as low as $54.99 after a $25 discount. If you're looking for a tablet that won't drain your bank account these are solid considerations especially at these discounted prices. To read this article in full or to leave a comment, please click here

What does P router mean in MPLS ?

What does P router mean in MPLS ? It is used in MPLS VPN networks mostly but can be used with any MPLS application, use case.     This is very important node in MPLS, and crucial to understand MPLS.   MPLS is one of the most commonly used encapsulation mechanism in Service Provider networks […]

The post What does P router mean in MPLS ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Docker Enterprise Edition for Linux on IBM Z (yes, mainframe!)

Recently we released a new version of Docker Enterprise Edition featuring expansion of the multi-architecture capabilities from Linux to Windows Server and now the IBM Z mainframe platform. Enterprise IT architecture is complex and diverse and include workloads across different server hardware types and operating systems.

Docker on IBMzDocker and IBM have partnered together to deliver the support for Red Hat Enterprise Linux, Ubuntu and SUSE Linux Enterprise Server for IBM Z (x390x) systems as certified infrastructure for Docker Enterprise Edition. This first release features support for the the IBM Z product family.

Why bring Docker containers and mainframe systems together? Enterprises across industries like financial services, government, manufacturing and more use mainframe systems for many high throughput applications. Many organizations recognize that these applications are at the core of their systems but rewriting and refactoring them for a different platform is expensive and time-consuming. By wrapping them in a container, organizations can make these applications easier to maintain and update while bringing them into the same software supply chain as other x86 applications

Multi-Architecture Support for Mainframe Systems

Docker Enterprise Edition allows for the same orchestration, security model, supply chain and integrated management that can be applied across a broader range Continue reading

IDG Contributor Network: The power of machine learning reaches data management

Machine learning is a hot topic across the technology spectrum today. From self-driving cars, to catching nefarious content in the fight against terrorism, to apps that automatically retouch photos before you even take them, it is popping up just about everywhere. Each innovation is creating a new wave of business opportunity while simplifying and automating tasks that are generally beyond the reach of how much data we human beings can process at once, or even in a lifetime.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The power of machine learning reaches data management

Machine learning is a hot topic across the technology spectrum today. From self-driving cars, to catching nefarious content in the fight against terrorism, to apps that automatically retouch photos before you even take them, it is popping up just about everywhere. Each innovation is creating a new wave of business opportunity while simplifying and automating tasks that are generally beyond the reach of how much data we human beings can process at once, or even in a lifetime.To read this article in full or to leave a comment, please click here

Route-based IPsec VPN on Linux with strongSwan

A common way to establish an IPsec tunnel on Linux is to use an IKE daemon, like the one from the strongSwan project, with a minimal configuration1:

conn V2-1
  left        = 2001:db8:1::1
  leftsubnet  = 2001:db8:a1::/64
  right       = 2001:db8:2::1
  rightsubnet = 2001:db8:a2::/64
  authby      = psk
  auto        = start

The same configuration can be used on both sides. Each side will figure out if it is “left” or “right”. The IPsec site-to-site tunnel endpoints are 2001:db8:­1::1 and 2001:db8:­2::1. The protected subnets are 2001:db8:­a1::/64 and 2001:db8:­a2::/64. As a result, strongSwan configures the following policies in the kernel:

$ ip xfrm policy
src 2001:db8:a1::/64 dst 2001:db8:a2::/64
        dir out priority 399999 ptype main
        tmpl src 2001:db8:1::1 dst 2001:db8:2::1
                proto esp reqid 4 mode tunnel
src 2001:db8:a2::/64 dst 2001:db8:a1::/64
        dir fwd priority 399999 ptype main
        tmpl src 2001:db8:2::1 dst 2001:db8:1::1
                proto esp reqid 4 mode tunnel
src 2001:db8:a2::/64 dst 2001:db8:a1::/64
        dir in priority 399999 ptype main
        tmpl src 2001:db8:2::1 dst 2001:db8:1::1
                proto esp reqid 4 mode tunnel
[…]

This kind of IPsec tunnel is a policy-based VPN: encapsulation and decapsulation are governed by these policies. Each of them contains the following elements:

Join Global Celebrations to Inspire the World

The Internet Society’s story has been 25 years in the making.

The foundation for a global community of people dedicated to bringing the Internet to everyone started in 1992. We have come a long way since then, and today our mission has never been more important or challenging.

This milestone year presents a unique opportunity for us all to reflect on our rich heritage, and to consider how we can impact the Internet for the next 25 years. Our community has a critical role in guiding the decisions that must now be taken for the future Internet in today’s rapidly changing world. 

Ms. Kathryn Brown

BrandPost: SD-WAN Delivers Real Business Outcomes to Cloud-first Enterprises

Analysts agree that SD-WAN is the way forward for enterprises supporting cloud-first initiatives. Everywhere you turn it seems someone is writing about SD-WAN, the trends and how to select the right solution. For example, Andrew Lerner from Gartner recently wrote a blog about SD-WAN going mainstream. I’ve also spent time talking about lessons we’re learning from our customers. In fact, earlier this summer I authored an article that ran on Network World that highlighted key SD-WAN solution evaluation criteria.To read this article in full or to leave a comment, please click here

Automating network troubleshooting with NetQ + Ansible

Network Automation is so hot right now! Joking aside, DevOps tools like Ansible, Puppet, Chef and Salt as well as proprietary tools like Apstra are becoming all the rage in computer networks everywhere. There are python courses, network automation classes and even automation focused events for the first time in the history of computer networks (or at least it feels like it).

For this blog post I want to focus on automating network troubleshooting, the forgotten stepchild of network automation tasks. I think most automation tools focus on provisioning (or first time configuring) because so many network engineers are new to network automation in general. While I think that is great (and I want to encourage everyone to automate!) I think there is so much more potential for network automation. I am introducing Sean’s third category of automation use-cases — OPS!

network troubleshooting

I want to combine Cumulus NetQ, a fabric validation system, with Ansible to:

  • Figure out IF there is a problem (solved by NetQ)
  • Figure out WHAT the problem is (solved by NetQ)
  • FIX the problem (solved by Ansible)
  • AUTOMATE the above 3 tasks (solved by Ansible)

Because I think looking at terminal windows is super boring (no Continue reading

Understanding the prevalence of web traffic interception

Understanding the prevalence of web traffic interception

Understanding the prevalence of web traffic interception

This is a guest post by Elie Bursztein who writes about security and anti-abuse research. It was first published on his blog and has been lightly edited.

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study published at NDSS 2017 authored by several researchers including the author of this post and Nick Sullivan of Cloudflare. We found that between 4% and 10% of the web’s encrypted traffic (HTTPS) is intercepted. Analyzing these intercepted connections further reveals that, while not always malicious, interception products most often weaken the encryption used to secure communication and puts users at risk.

This blog post presents a short summary of our study’s key findings by answering the following questions:

  1. How is encrypted web traffic intercepted? This section offers a short recap of how man-in-the-middle (MITM) interception is performed.
  2. How prevalent is HTTPS interception? This section explains how we measured the prevalence of HTTPS interception in the 8 billion connections we analyzed. Next, it summarizes the key trends observed when grouping these interceptions by OS (operating system), browser, and network.
  3. Who is intercepting secure web communication and why? This section provides an overview of Continue reading

Sponsored Post: Close.io, Loupe, Etleap, Aerospike, Stream, Scalyr, VividCortex, Domino Data Lab, MemSQL, InMemory.Net, Zohocorp

Who's Hiring? 

  • Close.io is a ~25 person fully remote team that is profitable and building a product our customers love! We’re hiring Senior Backend Developers to join our team. Our backend tech stack currently includes Python (Flask, Gunicorn, TaskTiger), Elasticsearch, MongoDB, Postgres, and Redis running in Docker/Kubernetes on AWS. Learn more and apply here!

  • Advertise your job here! 

Fun and Informative Events

  • Advertise your event here!

Cool Products and Services

  • .NET developers dealing with Errors in Production: You know the pain of troubleshooting errors with limited time, limited information, and limited tools. Managers want to know what’s wrong right away, users don’t want to provide log data, and you spend more time gathering information than you do fixing the problem. To fix all that, Loupe was built specifically as a .NET logging and monitoring solution. Loupe notifies you about any errors and tells you all the information you need to fix them. It tracks performance metrics, identifies which errors cause the greatest impact, and pinpoints the root causes. Learn more and try it free today.

  • Enterprise-Grade Database Architecture. The speed and enormous scale of today’s real-time, mission critical applications has exposed gaps in legacy database technologies. Continue reading