Fabric versus Network: What’s the Difference?

We often hear about fabrics, and we often hear about networks—but on paper, an in practice, they often seem to be the same thing. Leaving aside the many realms of vendor hype, what’s really the difference? Poking around on the ‘net, I came across a couple of definitions that seemed useful, at least at first blush. For instance, SDN Search gives provides the following insight

The word fabric is used as a metaphor to illustrate the idea that if someone were to document network components and their relationships on paper, the lines would weave back and forth so densely that the diagram would resemble a woven piece of cloth.

While this is interesting, it gives us more of a “on the paper” answer than what might be called a functional view. The entry at Wikipedia is more operationally based

Switched Fabric or switching fabric is a network topology in which network nodes interconnect via one or more network switches (particularly crossbar switches). Because a switched fabric network spreads network traffic across multiple physical links, it yields higher total throughput than broadcast networks, such as early Ethernet.

Greg has an interesting (though older) post up on the topic, Continue reading

Datanet: a New CRDT Database that Let’s You Do Bad Bad Things to Distributed Data

 

We've had databases targeting consistency. These are your typical RDBMSs. We've had databases targeting availability. These are your typical NoSQL databases.

If you're using your CAP decoder ring you know what's next...what databases do we have that target making concurrency a first class feature? That promise to thrive and continue to function when network partitions occur?

No many, but we have a brand new concurrency oriented database: Datanet - a P2P replication system that utilizes CRDT algorithms to allow multiple concurrent actors to modify data and then automatically & sensibly resolve modification conflicts.

Datanet is the creation of Russell Sullivan. Russell spent over three years hidden away in his mad scientist layer researching, thinking, coding, refining, and testing Datanet. You may remember Russell. He has been involved with several articles on HighScalability and he wrote AlchemyDB, a NoSQL database, which was acquired by Aerospike.

So Russell has a feel for what's next. When he built AlchemyDB he was way ahead of the pack and now he thinks practical, programmer friendly CRDTs are what's next. Why?

Concurrency and data locality. To quote Russell:

Datanet lets you ship data to the spot where the action is happening. When the action happens it Continue reading

WikiLeaker Assange’s internet access cut by a ‘state actor’

A "state actor" has cut off internet access for Julian Assange, the founder of WikiLeaks, the transparency activist organization said Monday.Assange's internet link has been "intentionally severed by a state party," WikiLeaks said in a Monday morning tweet."We have activated the appropriate contingency plans," the organization added.In recent days, WikiLeaks has published thousands of leaked emails from the account of John Podesta, chairman of U.S. presidential candidate Hillary Clinton's campaign. Clinton's campaign, along with President Barack Obama's administration, have accused WikiLeaks of cooperating with Russian hackers in an effort to raise questions about the legitimacy of the upcoming U.S. presidential election.To read this article in full or to leave a comment, please click here

WikiLeaker Assange’s internet access cut by a ‘state actor’

A "state actor" has cut off internet access for Julian Assange, the founder of WikiLeaks, the transparency activist organization said Monday.Assange's internet link has been "intentionally severed by a state party," WikiLeaks said in a Monday morning tweet."We have activated the appropriate contingency plans," the organization added.In recent days, WikiLeaks has published thousands of leaked emails from the account of John Podesta, chairman of U.S. presidential candidate Hillary Clinton's campaign. Clinton's campaign, along with President Barack Obama's administration, have accused WikiLeaks of cooperating with Russian hackers in an effort to raise questions about the legitimacy of the upcoming U.S. presidential election.To read this article in full or to leave a comment, please click here

OpenG Rap: Unlicensed to Ill

Indoor cell signal feels so wack! Do not worry though, MC Ruckus and the Dawgs (aka Ruckus OpenG engineers) will set you straight with this funky gold-teeth-laden introduction to new technology. We got your back, yo! #OpenG #WhatDidIJustWatch Read more...

IDG Contributor Network: Parking available! CloudParc uses IoT, machine vision to improve city parking

Finding a parking space is like a treasure hunt. Lots of aggravation for a few moments of joy.Parking is a challenge for city officials, too. How do you maximize both parking revenues and driver convenience?+ Also on Network World: Smart City Challenge: 7 proposals for the future of transportation +Is there a better way to mark parking spots without installing meters? How can drivers be charged automatically for parking? How can cities struggling with tight budgets afford such new services?To read this article in full or to leave a comment, please click here

Catch OpenG in the Wild

In partnership with Dell/EMC, Ruckus, now a Brocade company, will be showing its first live demo of OpenGTM at Dell EMC World this week. OpenG is a solution that greatly improves in-building cellular coverage and capacity at a much lower cost than DAS or traditional small cells. Because OpenG uses the newly-released US 3.5GHz CBRS coordinated shared radio spectrum, enterprises and venues can finally deploy a single in-building cellular solution to serve subscribers of all mobile operators.

Lawmakers question DOJ’s appeal of Microsoft Irish data case

Four U.S. lawmakers are questioning a Department of Justice decision to appeal a July court decision quashing a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland.Last Thursday, Preet Bharara, U.S. Attorney for the Southern District of New York, filed an appeal of the ruling by a three-judge panel of the U.S. Court of Appeals for the Second Circuit.To read this article in full or to leave a comment, please click here

Lawmakers question DOJ’s appeal of Microsoft Irish data case

Four U.S. lawmakers are questioning a Department of Justice decision to appeal a July court decision quashing a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland.Last Thursday, Preet Bharara, U.S. Attorney for the Southern District of New York, filed an appeal of the ruling by a three-judge panel of the U.S. Court of Appeals for the Second Circuit.To read this article in full or to leave a comment, please click here

Dyre banking Trojan successor rears its ugly head

Cybercriminals have unleashed a new banking Trojan program on the internet and it bears striking similarities to Dyre, a malware threat believed to have been dead for almost a year.The new Trojan is called TrickBot and first appeared in September, targeting users of banks in Australia. After a closer analysis, researchers from Fidelis Cybersecurity believe that it is a rewrite of the Dyre Trojan that plagued online banking users for over a year until the gang behind it was dismantled by Russian authorities.While TrickBot is still a work in progress and doesn't have all of Dyre's features, there are enough similarities in their components to suggest that at the very least one served as inspiration for the other. At the same time, there are also significant differences in how some functions have been implemented in the new Trojan, which also has more C++ code than its predecessor.To read this article in full or to leave a comment, please click here

Dyre banking Trojan successor rears its ugly head

Cybercriminals have unleashed a new banking Trojan program on the internet and it bears striking similarities to Dyre, a malware threat believed to have been dead for almost a year.The new Trojan is called TrickBot and first appeared in September, targeting users of banks in Australia. After a closer analysis, researchers from Fidelis Cybersecurity believe that it is a rewrite of the Dyre Trojan that plagued online banking users for over a year until the gang behind it was dismantled by Russian authorities.While TrickBot is still a work in progress and doesn't have all of Dyre's features, there are enough similarities in their components to suggest that at the very least one served as inspiration for the other. At the same time, there are also significant differences in how some functions have been implemented in the new Trojan, which also has more C++ code than its predecessor.To read this article in full or to leave a comment, please click here

Cisco bolsters Spark collaboration with Worklife acquisition

Cisco today said it bought Heroik Labs which does business as Worklife and sells collaborative software that helps companies more effectively run and manage online meetings.“With the Worklife team onboard, we see an opportunity to build on the virtual meeting experience that the Cisco Spark platform currently provides, and enhance meeting productivity across the board. For example, we can start offering additional tools, tightly integrated into Cisco Spark, to help users track calendars, create agenda templates, and collaborate on note-taking in real-time during a meeting,” wrote Rob Salvagno vice president of Cisco’s Corporate Business Development in a blog announcing the buy. “Worklife’s technology and talent builds on the success of Cisco’s previous collaboration software acquisitions such as Collaborate.com, Assemblage, Tropo, Acano and Synata.”To read this article in full or to leave a comment, please click here

Cisco bolsters Spark collaboration with Worklife acquisition

Cisco today said it bought Heroik Labs which does business as Worklife and sells collaborative software that helps companies more effectively run and manage online meetings.“With the Worklife team onboard, we see an opportunity to build on the virtual meeting experience that the Cisco Spark platform currently provides, and enhance meeting productivity across the board. For example, we can start offering additional tools, tightly integrated into Cisco Spark, to help users track calendars, create agenda templates, and collaborate on note-taking in real-time during a meeting,” wrote Rob Salvagno vice president of Cisco’s Corporate Business Development in a blog announcing the buy. “Worklife’s technology and talent builds on the success of Cisco’s previous collaboration software acquisitions such as Collaborate.com, Assemblage, Tropo, Acano and Synata.”To read this article in full or to leave a comment, please click here

Cybersecurity Canon book review: There Will Be Cyberwar

Given it’s national cybersecurity awareness month, I hope all cybersecurity professionals are familiar with the Cybersecurity Canon. For those who are not, the goal of the cybersecurity canon is as follows: To identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.To read this article in full or to leave a comment, please click here

Cybersecurity Canon book review: There Will Be Cyberwar

Given it’s national cybersecurity awareness month, I hope all cybersecurity professionals are familiar with the Cybersecurity Canon. For those who are not, the goal of the cybersecurity canon is as follows: To identify a list of must-read books for all cybersecurity practitioners—be they from industry, government or academia—where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.To read this article in full or to leave a comment, please click here

Cybersecurity Canon Book Report: There Will Be Cyberwar

Given that it’s national cybersecurity awareness month, I hope that all cybersecurity professionals are familiar with the Cybersecurity Canon.  For those that are not, the goal of the cybersecurity canon is as follows:To identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.                To read this article in full or to leave a comment, please click here

Consumer PCs: Ailing, but not dead yet

Personal computer shipments again contracted in the third quarter, research firms said this week, as consumers continued to refuse to buy replacements for their aged machines. IDC pegged the PC downturn at 4% for the quarter ending September 30, while rival Gartner said shipments shrank 6% from the same period the year before. Gartner blamed consumers for the two-year slump, the longest decline in the industry's history. "According to our 2016 personal technology survey, the majority of consumers own, and use, at least three different types of devices in mature markets," said Gartner analyst Mikako Kitagawa in a statement. "Among these devices, the PC is not a high priority device for the majority of consumers, so they do not feel the need to upgrade their PCs as often as they used to."To read this article in full or to leave a comment, please click here