Research: BBR: Congestion-Based Congestion Control – ACM Queue

The BBR algorithm appears to be building critical mass of support in the Internet community which makes reading this research paper even more worthwhile.

When bottleneck buffers are small, loss- based congestion control misinterprets loss as a signal
of congestion, leading to low throughput. Fixing these problems requires an alternative to loss-based congestion control. Finding this alternative requires an understanding of where and how network congestion originates.

BBR: Congestion-Based Congestion Control – ACM Queue : http://queue.acm.org/detail.cfm?id=3022184

The post Research: BBR: Congestion-Based Congestion Control – ACM Queue appeared first on EtherealMind.

Opinion – Vendors Please Stop the Mud Slinging!

I’m not known for going on rants but lately I’ve been seeing a lot of stupid tweets from vendors that have really bothered me. So today I’ll give my best Tom Hollingsworth “networkingnerd” impression and tell you what’s on my mind. To give you an example what the vendor marketing teams are putting out there I give you this piece of work:

NSX marketing tweet
NSX marketing tweet

At first it seems a bit cute and funny. Oh look! It’s Star Wars! All nerds love Star Wars! I do too, just to be clear. What this kind of marketing does though is to dumb down the customers. It insults my intelligence as a Network Architect. Hardware still matters. There still is a physical world. Almost all projects in networking has some kind of existing network so almost all deployments are going to be brownfield to some extent. Please show me the organization that does not have an existing network and is going to deploy something like NSX or ACI for their first network. Please show me the organization that has no legacy systems or applications. Please show me the organization that develops and owns all of their applications and they are all nicely Continue reading

Intel Gets Serious About Neuromorphic, Cognitive Computing Future

Like all hardware device makers eager to meet the newest market opportunity, Intel is placing multiple bets on the future of machine learning hardware. The chipmaker has already cast its Xeon Phi and future integrated Nervana Systems chips into the deep learning pool while touting regular Xeons to do the heavy lifting on the inference side.

However, a recent conversation we had with Intel turned up a surprising new addition to the machine learning conversation—an emphasis on neuromorphic devices and what Intel is openly calling “cognitive computing” (a term used primarily—and heavily—for IBM’s Watson-driven AI technologies). This is the first

Intel Gets Serious About Neuromorphic, Cognitive Computing Future was written by Nicole Hemsoth at The Next Platform.

Kubernetes CRI and Minikube

Kubernetes CRI(Container runtime interface) is introduced in experimental mode in Kubernetes 1.15 release. Kubernetes CRI introduces a common Container runtime layer that allows for Kubernetes orchestrator to work with multiple Container runtimes like Docker, Rkt, Runc, Hypernetes etc. CRI makes it easy to plug in a new Container runtime to Kubernetes. Minikube project simplifies Kubernetes … Continue reading Kubernetes CRI and Minikube

NSX-V 6.3: Cross-VC NSX Security Enhancements

NSX-V 6.2 introduced the Cross-NSX feature to allow for NSX logical networking and security across multiple vCenter domains. The ability to apply consistent networking and security across vCenter domains provides for mulitple use cases for Cross-VC NSX: workload mobility, resource pooling, multi-site security, ease of automation across sites, and disaster avoidance/recovery. With the recent release of NSX-V 6.3, several enhancements have been added to the Cross-VC NSX feature to provide for additional capabilities and overall robustness of the solution. In this blog post I’ll discuss the new Cross-VC NSX security enhancements in NSX-V 6.3. For additional information on Cross-VC NSX check-out my prior Cross-VC NSX blog posts.

The security enhancements for Cross-VC NSX can be grouped into two categories:

  1. General Enhancements (Apply Across both Active/Active and Active/Standby deployment models)
  2. Enhancements for Active/Standby Use Case

Active/Active and Active/Standby above refers to if the application is active at both sites or if it is active at one site and standby at another site (ex: disaster recovery). Enhancements for both of these respective categories are discussed in more detail below.

1.) General Enhancements (Apply Across both Active/Active and Active/Standby deployment models)

Figure 1: Cross-VC NSX Active/Standby and Active/Active Deployment Model

Figure 1: Cross-VC NSX Active/Standby and Continue reading

A real sweetheart deal for Microsoft Build tickets

Tickets for the Microsoft Build 2017, this year's edition of the annual developers' confab, will go on sale at noon EST/9am PST on Valentine's Day, Feb. 14.If you're interested in going, you should register for a shot at tickets at this Microsoft website. Tickets sold out in about a minute last year. It's not clear how much tickets will cost, but at last year's event in San Francisco, the face value was over $2,000.In a blog post about Build 2017, Microsoft EVP of the Cloud and Enterprise Group Scott Guthrie says this year's gathering in Seattle from May 10-12 is expected to attract more than 5,000 developers, plus millions more via live stream. To read this article in full or to leave a comment, please click here

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.“How will other countries react to the FBI hacking in their jurisdictions without prior consent?” wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI’s hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.To read this article in full or to leave a comment, please click here

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.“How will other countries react to the FBI hacking in their jurisdictions without prior consent?” wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI’s hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.To read this article in full or to leave a comment, please click here

On land and in space, IoT networks can now cover the planet

The whole idea of IoT is to connect more things, including devices far from a company’s data centers or maintenance crews. For enterprises that have things all over the world, vendors and service providers are starting to look at the big picture.At Mobile World Congress later this month, Nokia will show off what it calls WING (worldwide IoT network grid), a virtual global infrastructure that may include multiple private and carrier networks and satellite systems, depending on what an enterprise needs to connect and how it intends to use the data that’s collected.“A global enterprise can actually have what they think is their own virtual network of global connectivity for their IoT devices,” said Phil Twist, vice president of mobile networks marketing & communications, in a briefing this week. WING will be commercially available in the second half of this year.To read this article in full or to leave a comment, please click here

On land and in space, IoT networks can now cover the planet

The whole idea of IoT is to connect more things, including devices far from a company’s data centers or maintenance crews. For enterprises that have things all over the world, vendors and service providers are starting to look at the big picture.At Mobile World Congress later this month, Nokia will show off what it calls WING (worldwide IoT network grid), a virtual global infrastructure that may include multiple private and carrier networks and satellite systems, depending on what an enterprise needs to connect and how it intends to use the data that’s collected.“A global enterprise can actually have what they think is their own virtual network of global connectivity for their IoT devices,” said Phil Twist, vice president of mobile networks marketing & communications, in a briefing this week. WING will be commercially available in the second half of this year.To read this article in full or to leave a comment, please click here

25% off Kuna Smart Home Security Outdoor Light & Camera – Deal Alert

Kuna is a smart home security camera in a stylish outdoor light that detects and allows you to interact with people outside your door. The security device includes HD live and recorded video, two-way intercom, alarm, smart motion detection alerts to your phone, and more. Easy 15 minute installation with no batteries to replace so you have continuous protection around the clock. Be protected at all times - Access HD live video with its 720P wide angle camera, communicate via its two way intercom from your mobile device, or activate its 100 dB alarm siren. Smart light control lets you turn on or off your lights remotely, or program a schedule for when you're away. Access live video or review & download events for 2 hours free or up to 30-days on an optional subscription plan, starting as low as $4.99 per month. This Kuna security light averages 4 out of 5 stars from over 600 people (read reviews), and its typical list price of $199 has been reduced 25% to $149. See the discounted Kuna Smart Home Security Light and Camera on Amazon.To read this article in full or to leave a comment, please click here

25% off Kuna Smart Home Security Outdoor Light & Camera – Deal Alert

Kuna is a smart home security camera in a stylish outdoor light that detects and allows you to interact with people outside your door. The security device includes HD live and recorded video, two-way intercom, alarm, smart motion detection alerts to your phone, and more. Easy 15 minute installation with no batteries to replace so you have continuous protection around the clock. Be protected at all times - Access HD live video with its 720P wide angle camera, communicate via its two way intercom from your mobile device, or activate its 100 dB alarm siren. Smart light control lets you turn on or off your lights remotely, or program a schedule for when you're away. Access live video or review & download events for 2 hours free or up to 30-days on an optional subscription plan, starting as low as $4.99 per month. This Kuna security light averages 4 out of 5 stars from over 600 people (read reviews), and its typical list price of $199 has been reduced 25% to $149. See the discounted Kuna Smart Home Security Light and Camera on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Avaya’s Chapter 11 filing sends waves of disruption

The numbers involved in Avaya’s Chapter 11 filing are big.A company netting just under a $1 billion per year owes about seven years’ profits to repay the leverage heaped on the otherwise healthy company in an $8.2 billion private equity buyout in 2007.It also has over 5,500 patents and was named in 2012 one the 100 most innovative companies in Silicon Valley. That’s just the beginning of the saga. There are many more stories to tell.+ Also on Network World: Avaya says bankruptcy is a step toward software and services + All hope for a fair and speedy resolution to the Chapter 11 filing, and so far, so good, according to multiple observers.To read this article in full or to leave a comment, please click here

Ford to pump $1B into AI for driverless cars

Ford plans to spend US$1 billion over the next five years on the development of an artificial intelligence system for driverless cars.Ford will investment the money in Argo AI, a start-up founded by former leaders from Google and Uber's self-driving car research units, and they will work toward the goal of a system that's ready for deployment in 2021.The research will be focused on a virtual driver system capable of operating at what's called "SAE level 4." It's one of five levels defined for self-driving cars and specifically describes an autonomous car that's capable of completely controlling the vehicle in almost any condition. After it has been engaged, drivers do not need to pay attention to the driving.To read this article in full or to leave a comment, please click here

Using oVirt and Vagrant

Introducing oVirt virtual machine management via Vagrant.

In this short tutorial I'm going to give a brief introduction on how to use vagrant to manage oVirt with the new community developed oVirt v4 Vagrant provider.

Background

Vagrant is a way to tool to create portable and reproducible environments. We can use it to provision and manage virtual machines in oVirt by managing a base box (small enough to fit in github as an artifact) and a Vagrantfile. The Vagrantfile is the piece of configuration that defines everything about the virtual machines: memory, cpu, base image, and any other configuration that is specific to the hosting environment.

Prerequisites

  • A fully working and configured oVirt cluster of any size
  • A system capable of compiling and running the oVirt ruby SDK gem
  • Vagrant 1.8 or later
  • The oVirt vagrant plugin installed via $ vagrant plugin install vagrant-ovirt4

The Vagrantfile

To start off, I'm going to use this Vagrantfile:

Vagrant.configure("2") do |config|
  config.vm.box = 'ovirt4'
  config.vm.hostname = "test-vm"
  config.vm.box_url = 'https://github.com/myoung34/vagrant-ovirt4/blob/master/example_box/dummy.box?raw=true'

  config.vm.network :private_network,
    :ip => '192.168.56.100', :nictype => 'virtio', :netmask  Continue reading

IDG Contributor Network: How to automate your app dev process—and improve code quality

As your business grows, it’s increasingly important to understand how to scale engineering processes and methodologies. The amount of time spent on setup, deployment and manually testing code is often ignored by technology teams and managers. Manual server configuration and code quality tests are not only error prone, but they ultimately result wasted time and money.3 steps to automate software development Introducing automation into your Software Development Lifecycle (SDLC) and infrastructure scaling projects is the most effective way to improve code quality and deployment velocity. These three steps will help you do that:1. Implement a continuous integration strategy Continuous integration (CI) is a development practice where code is checked into a code repository, tested and verified in an automated process. By regularly integrating changes into a centralized repository that is automatically tested for code quality, syntax errors and unit/integration test issues, errors can be detected and located more easily.To read this article in full or to leave a comment, please click here