Creating a new network value equation

Having worked on Wall Street for many years, I’m a big believer in extracting the biggest return on technology investments. After all, anything that impacts the bottom line should be thoroughly analyzed from all sides of the value equation.  Now more than ever, CIOs are being scrutinized for their ability to increase ROI while driving innovation and digital transformations. According to more than 3,000 CIOs and technology leaders gathered for the 2016 Harvey Nash/KPMG CIO Survey, the role of today’s CIO is being stretched in many directions amid shifting priorities and pressures. + Also on Network World: Network World annual State of the Network survey results + More CIOs report directly to CEOs than at any time in the past decade, rising 10 percent in the past year to 34 percent of the survey respondents. And, while 37 percent of the CIOs surveyed are still focused on saving money, almost two-thirds are helping CEOs identify IT projects that generate revenue. To read this article in full or to leave a comment, please click here

Snippet: The story of the EFP

For a while now, the concept of EVC’s (Ethernet Virtual Circuits) and EFP’s (Ethernet Flow Points), has eluded me.

In this short post, i will provide you with a simple example of a couple of EFP’s. In a later post i will discuss the MEF concept of EVC’s.

As always, here is the topology i will be using:

topology

Its a very simple setup. R1 connects to R2 through its G1 interface and connects to R3 through its G2 interface.

On R2 and R3, we have the very common configuration of using subinterfaces for the individual Vlan’s in question. Namely Vlan 10 for the connection between R1 and R2 and Vlan 20 between R1 and R3.

Here is the configuration of R2 and R3:

R2#sh run int g1.10
Building configuration...
Current configuration : 98 bytes
!
interface GigabitEthernet1.10
encapsulation dot1Q 10
ip address 10.10.10.2 255.255.255.0
end

R3#sh run int g1.20
Building configuration...
Current configuration : 98 bytes
!
interface GigabitEthernet1.20
encapsulation dot1Q 20
ip address 10.10.10.3 255.255.255.0
end

Now on R1 is where the “different” configuration takes place:

R1#sh run int g1
Building configuration...
Current configuration :  Continue reading

BGP VPLS explained (Nokia & Juniper)

It may very well be that VPLS days are numbered and EVPN is to blame. Nevertheless, it would be naive to expect VPLS extinction in the near future. With all its shortcomings VPLS is still very well standardized, interop-proven and has a huge footprint in MPLS networks of various scale. In this post I will cover theory and

Best bookmark managers for Google Chrome

Recently, while going through my bookmarks in Chrome to determine which ones I wanted to keep, I accidentally deleted all of them. Rather than panic, I felt an odd sense of…relief. I realized that I had collected several hundred bookmarks over the years, and that managing them was difficult.To read this article in full or to leave a comment, please click here(Insider Story)

Arribem a Barcelona! Cloudflare’s 101st data center

Hola Barcelona! The land of Antoni Gaudí, Salvador Dalí, Ferrán Adriá and Lionel Messi is now also home to Cloudflare.

Located alongside the Mediterranean, Barcelona, is the capital of the autonomous community of Catalonia, the second-most populated municipality in Spain and the core of the fifth-most populous urban area in the Europe. Our data center in Barcelona is our 3rd in the Iberian Peninsula following our deployments in Madrid and Lisbon, our 28th in Europe, and 101st globally. This means not only better performance in Catalonia and Spain, but additional redundancy for European data centers. As of this moment, Cloudflare has a point of presence (PoP) in 7 out of Europe's 10 most populous urban areas, and with number 8 coming soon (all roads have been said to lead there…).

CC BY-NC-ND 2.0 image by Luc Mercelis

Cloudflare has connected to the Catalunya Neutral Internet Exchange (“CATNIX”). This raises the number of exchanges that Cloudflare is a participant in to over 150. As we expand our peering, more visitors get served locally. If you wish to connect with us at CATNIX (or any of our other locations) you can find our peering details on our PeeringDB profile.

Only a Continue reading

Cool Yule Tools 2016: Our Top Picks

Digital disruption at Santa's WorkshopImage by Stephen SauerSanta's not the only one going digital - here are our favorite digital products to give (or receive) for the holidays. The next 20 slides are the "best of the best" from this year's Cool Yule Tools, now in its 17th incarnation. To access the entire guide, head here.To read this article in full or to leave a comment, please click here

Cool Yule Tools 2016: Digital disruption at Santa’s Workshop

Things are hopping at Santa 2.0 (S2) – the new name for Santa’s Workshop. The North Pole toy factory has undergone a serious digital transformation, with centuries-old processes giving way to new and more efficient methods. Even the sleigh has gone digital – it’s now a self-driving, self-flying gift distribution system. Initially the S2 team wanted to hire Uber drivers to deliver presents, but after some more tinkering the autonomous system kicked in. But don’t worry – the reindeers are all doing just fine in their retirement.While good girls and boys might still be handwriting their wish lists and delivering them via the post office, once the S2 team gets a hold of the requests, they’re quickly scanned, digitized and processed through the new ecosystem. Collaboration elves all work hard together (via a dedicated private Slack channel) to guarantee that production is on top of their game as well. Drones, robots, virtual reality and other emerging technologies are all being used to make sure that the S2 has another successful holiday season.To read this article in full or to leave a comment, please click here

As Watson matures, IBM plans more AI hardware and software

Just over five years ago, IBM's Watson supercomputer crushed opponents in the televised quiz show Jeopardy. It was hard to foresee then, but artificial intelligence is now permeating our daily lives.Since then, IBM has expanded the Watson brand to a cognitive computing package with hardware and software used to diagnose diseases, explore for oil and gas, run scientific computing models, and allow cars to drive autonomously. The company has now announced new AI hardware and software packages.The original Watson used advanced algorithms and natural language interfaces to find and narrate answers. Then, Watson was one supercomputer, but now AI systems are deployed at a grander scale. Mega data centers run by Facebook, Google, Amazon, and other companies use AI on thousands of servers to recognize images and speech and analyze loads of data.To read this article in full or to leave a comment, please click here

IBM Shows Off AI And HPC Oomph On Power8 Tesla Hybrids

While the machine learning applications created by hyperscalers and the simulations and models run by HPC centers are very different animals, the kinds of hardware that help accelerate the performance for one is also helping to boost the other in many cases. And that means that the total addressable market for systems like the latest GPU-accelerated Power Systems machines or the alternatives from Nvidia and others has rapidly expanded as enterprises try to deploy both HPC and AI to better run their businesses.

HPC as we know it has obviously been around for a long time, and is in a

IBM Shows Off AI And HPC Oomph On Power8 Tesla Hybrids was written by Timothy Prickett Morgan at The Next Platform.

Cray’s New Pascal XC50 Supercomputer Points to Richer HPC Future

Over the course of the last five years, GPU computing has featured prominently in supercomputing as an accelerator on some of the world’s fastest machines. If some supercomputer makers are correct, GPUs will continue to play a major role in high performance computing, but the acceleration they provide will go beyond boosts to numerical simulations. This has been great news for Nvidia’s bottom line since the market for GPU computing is swelling, and for HPC vendors that can integrate those and wrap the proper software stacks around both HPC and machine learning, it could be an equal boon.

Cray’s New Pascal XC50 Supercomputer Points to Richer HPC Future was written by Nicole Hemsoth at The Next Platform.

Testing ovirt-engine changes without a real cluster

The ovirt-engine component of oVirt is the brain of oVirt and is responsible for managing attached systems; providing the webadmin UI and REST interfaces; and other core tasks. The process of setting up a real cluster on which to deploy the project is a time-consuming task that greatly increases patch turnaround time and can provide a significant barrier of entry to those wanting to contribute to the project.

Development Environment

There are couple of preparation steps you must take to create your development environment. I am using CentOS 7 as my development machine so I will use that system to describe everything, but it should be pretty straightforward to adapt the article to Fedora.

We first need the source code for the ovirt-engine itself. You can get it from the project's code review tool: gerrit.ovirt.org. Just execute the following command and wait for it to finish:

# git clone git://gerrit.ovirt.org/ovirt-engine.git

You will also need a directory for the development deployments, so create a directory somewhere. Mine is in ~/Applications/ovirt-engine-prefix. I have set the$OVIRT_PREFIX environment variable to point to that path, so when you see it used throughout this article, substitute the path for your own Continue reading

Best Xbox Black Friday 2016 bundles $50 cheaper than last year

Xbox One  bundles can be had at a slew of big name retailers, from GameStop to Walmart, and what the deals lack in variety they make up for in being $50 cheaper than last year.Xbox One bundles are generally going for $250 this holiday shopping season, $50 off the regular price and $50 off the going price last holiday season. (Compare vs. 2015 Xbox Black Friday deals here.)But not all the deals are exactly alike, and if you shop around, you’ll find some are a bit better when you take into account gift cards and other goodies thrown into the packages.To read this article in full or to leave a comment, please click here

412 million FriendFinder Network accounts said to be exposed in hack

Over 412 million accounts on dating and entertainment network FriendFinder Networks have reportedly been exposed, the second time that the network has been breached in two years, according to a popular breach notification website.The websites that have been breached include adultfriendfinder.com, described as the "world's largest sex and swinger community," which accounted for over 339.7 million of the 412 million accounts exposed, LeakedSource said Sunday.Other network sites that had user accounts exposed were cams.com with 62.6 million exposed, penthouse.com with 7 million, stripshow.com with 1.4 million, icams.com with about 1 million and an unidentified website adding 35,372 users whose accounts were exposed.To read this article in full or to leave a comment, please click here

412 million FriendFinder Network accounts said to be exposed in hack

Over 412 million accounts on dating and entertainment network FriendFinder Networks have reportedly been exposed, the second time that the network has been breached in two years, according to a popular breach notification website.The websites that have been breached include adultfriendfinder.com, described as the "world's largest sex and swinger community," which accounted for over 339.7 million of the 412 million accounts exposed, LeakedSource said Sunday.Other network sites that had user accounts exposed were cams.com with 62.6 million exposed, penthouse.com with 7 million, stripshow.com with 1.4 million, icams.com with about 1 million and an unidentified website adding 35,372 users whose accounts were exposed.To read this article in full or to leave a comment, please click here

SC16 for HPC Programmers: What to Watch

An event as large and diverse as the annual Supercomputing Conference (SC16) presents a daunting array of content, even for those who specialize in a particular area inside the wider HPC spectrum. For HPC programmers, there are many sub-tracks to follow depending where on the stack on sits.

The conference program includes a “Programming Systems” label for easily finding additional relevant sessions, but we wanted to highlight a few of these here based on larger significance to the overall HPC programming ecosystem.

HPC programmers often have special considerations in how they program that other fields do not. For example, nothing

SC16 for HPC Programmers: What to Watch was written by Nicole Hemsoth at The Next Platform.

Best Deals of the Week, November 7th – November 11th – Deal Alert

Best Deals of the Week, November 7th - November 11th - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of November 7th. All items are highly rated, and dramatically discounted.35% off Oster Cordless Electric Wine Bottle Opener with Foil CutterThis cordless electric wine opener from Oster removes the cork in seconds with one-button operation, and opens up to 30 bottles before needing to be recharged. It features a foil cutter for easily removing seals and a comfortable soft-grip handle. Currently averages 4 out of 5 stars from over 4,000 people (read reviews). It's discounted 35% on Amazon, so you can get it right now for just $12.99. To read this article in full or to leave a comment, please click here

Scoring the DNS Root Server System

The process of rolling the DNS Root’s Key Signing Key of the DNS has now started. During this process there will be a period where the root zone servers’ response to a DNS query for the DNSKEY resource record of the root zone will grow from the current value of 864 octets to 1,425 octets. Does this present a problem? Let’s look at the DNS Root Server system and score it on how well it can cope with large responses. It seems that awarding stars is the current Internet way, so let’s see how many stars we’ll give to the Root Server System for their handling of large responses.

SC16 live real-time weathermaps

Connect to https://inmon.sc16.org/sflow-rt/app/sc16-weather/html/ between now and November 17th to see a real-time heat map of the The International Conference for High Performance Computing, Networking, Storage and Analysis (SC16) network.

From the SCinet web page, "The Fastest Network Connecting the Fastest Computers: SC16 will host the most powerful and advanced networks in the world – SCinet. Created each year for the conference, SCinet brings to life a very high-capacity network that supports the revolutionary applications and experiments that are a hallmark of the SC conference."

The real-time weathermap leverages industry standard sFlow instrumentation built into network switch and router hardware to provide scaleable monitoring of the SCinet network. Link colors are updated every second to reflect operational status and utilization of each link.
Clicking on a link in the map pops up a 1 second resolution strip chart showing the protocol mix carried by the link.
OSiRIS (Open Storage Research Infrastructure) is a "distributed, multi-institutional storage infrastructure that lets researchers write, manage, and share data from their own computing facility locations."

Connect to http://inmon.sc16.org/sflow-rt/app/OSiRIS-weather/html/ to see an animated diagram of the SC16 OSiRIS demonstration connecting SCinet with University of Michigan, Michigan State, Wayne Continue reading

BlackNurse attack: 1 laptop can DoS some firewalls, bring down big servers

An attacker doesn’t need an IoT botnet or massive resources for a denial of service attack to knock large servers offline; researchers warned that all it takes is one laptop for a “BlackNurse” attack to bring vulnerable Cisco, SonicWall, Palo Alto and Zyxel firewalls to their knees.Danish researchers at the Security Operations Center of telecom operator TDC described BlackNurse as a low bandwidth Internet Control Message Protocol (ICMP) attack that “is capable of doing a denial of service to well-known firewalls.”In their report (pdf), the researchers wrote:To read this article in full or to leave a comment, please click here