Is It Real, or Is It Cumulus VX?

Phew! Cumulus Linux 3.0 has just been released! A big shout out to all of my engineering colleagues who worked so hard to make this happen. JR Rivers gave an overview of all the goodies included in 3.0 in his recent blog post. Stay tuned for more blog posts from other engineers for details on all of those new features.

But Cumulus Linux isn’t the only beneficiary of all the 3.0 work. Cumulus VX, our free virtual machine-based version of Cumulus Linux, also has some pretty cool new tricks. When we launched Cumulus VX last August we thought it would be a way for people to get hands on with a Linux-based switch operating system, in their own environment and without any commitment. Boy, Were we surprised at how it quickly became so much more. With over 3,800 unique users, Cumulus VX is being deployed in all sorts of ways we never dreamed of. As just one example, existing customers are using it to validate their configurations before upgrading their physical switches from one release to another.

What’s New?

is-it-real-or-is-it-cumulus-vx

And that brings me to the first change we’ve made: concurrent releases. Our plan from now on Continue reading

A closer look at Apple’s biggest announcements from WWDC 2016

Analysis of Apple’s biggest announcements from WWDCImage by ReutersApple's WWDC keynote, which included demos and presentations from Craig Federighi, Apple's senior vice president of software engineering, (pictured above) was jam-packed with a number of intriguing announcements and software updates spanning the entirety of the company's product lineup. From watchOS and iOS to tvOS and macOS, Apple gave us a whole lot to digest. To help you make sense of it all, we've compiled a list highlighting the top announcements to come out of WWDC 2016.To read this article in full or to leave a comment, please click here

Russian hackers breach DNC computers, steal data on Trump

Russian hackers managed to breach the computer network of the Democratic National Committee and stole opposition research on Republican presidential candidate Donald Trump.The hackers had access to email and chat traffic as far back as last summer, the Washington Post reported on Tuesday. No financial data was stolen, however, suggesting that espionage was the motive.The hackers belong to two separate groups that have been linked to the Russian government, according to security firm Crowdstrike, which was hired to mitigate the data breach.To read this article in full or to leave a comment, please click here

Russian hackers breach DNC computers, steal data on Trump

Russian hackers managed to breach the computer network of the Democratic National Committee and stole opposition research on Republican presidential candidate Donald Trump.The hackers had access to email and chat traffic as far back as last summer, the Washington Post reported on Tuesday. No financial data was stolen, however, suggesting that espionage was the motive.The hackers belong to two separate groups that have been linked to the Russian government, according to security firm Crowdstrike, which was hired to mitigate the data breach.To read this article in full or to leave a comment, please click here

The Walls Come Down On The Last Bastion Of Proprietary

Open source software has done a lot to transform the IT industry, but perhaps more than anything else it has reminded those who architect complex systems that all elements of a datacenter have to be equally open and programmable for them to make the customizations that are necessary to run specific workloads efficiently and therefore cost effectively.

Servers have been smashed wide open in large enterprises, HPC centers, hyperscalers, and cloud builders (excepting Microsoft Azure, of course) by the double whammy of the ubiquity of the X86 server and the open source Linux operating system, and storage has followed suit

The Walls Come Down On The Last Bastion Of Proprietary was written by Timothy Prickett Morgan at The Next Platform.

Framing Questions for Optimized I/O Subsystems

Building high performance systems at the bleeding edge hardware-wise without considering the way data actually moves through such a system is too common—and woefully so, given the fact that understanding and articulating an application’s requirements can lead to dramatic I/O improvements.

A range of “Frequently Unanswered Questions” are at the root of inefficient storage design due to a lack of specified workflows, and this problem is widespread, especially in verticals where data isn’t the sole business driver.

One could make the argument that data is at the heart of any large-scale computing endeavor, but as workflows change, the habit of

Framing Questions for Optimized I/O Subsystems was written by Nicole Hemsoth at The Next Platform.

What is flow-based load balancing ?

Flow-based load balancing is used mostly in layer 2 networks, although in Layer 3 routing, packets can be load balanced per packets or per flow, flow-based load balancing is commonly used with the Local area network, datacenter and datacenter interconnect technologies. There are two important load balancing mechanisms in layer 2. Vlan-based load balancing and […]

The post What is flow-based load balancing ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Microsoft released 16 security bulletins for June, 5 rated critical

Microsoft released 16 security bulletins for June, five of which are rated critical for remote code execution vulnerabilities. Even the MSRC team doesn’t seem too excited over this month’s patches as the entire Patch Tuesday announcement is a mere three sentences.FYI: You should be keeping an eye out for the Adobe Flash Player patch as Adobe issued a security advisory, warning of a Flash exploit being used in the wild for targeted attacks. The fix for Flash is expected to be released on Thursday, June 16.To read this article in full or to leave a comment, please click here

Microsoft released 16 security bulletins for June, 5 rated critical

Microsoft released 16 security bulletins for June, five of which are rated critical for remote code execution vulnerabilities. Even the MSRC team doesn’t seem too excited over this month’s patches as the entire Patch Tuesday announcement is a mere three sentences.FYI: You should be keeping an eye out for the Adobe Flash Player patch as Adobe issued a security advisory, warning of a Flash exploit being used in the wild for targeted attacks. The fix for Flash is expected to be released on Thursday, June 16.To read this article in full or to leave a comment, please click here

Microsoft and LinkedIn: A match made in uncool heaven

Normally, I’m a huge skeptic of big-bucks tech mergers. But I’m 100 percent on board with Microsoft’s $26.2 billion surprise acquisition of LinkedIn, announced earlier this week.+ Also on Network World: Microsoft scoops up LinkedIn for $26.2B in cash +Why? Because as I see it, merger success isn’t usually based on technology fit or market positioning or trivia like that. Instead, most of the time it all hinges on the compatibility of corporate culture and values, and Microsoft and LinkedIn are eerily similar those regards—like twin sons from different mothers.To read this article in full or to leave a comment, please click here

No Capes, No Wands

As a keen observer of the network engineering world for the last twenty… okay, maybe longer, but I don’t want to sound like an old man telling stories quite yet… years, there’s one thing I’ve always found kind-of strange. We have a strong tendency towards hero worship.

I don’t really know why this might be, but I’ve seen it in Cisco TAC—the almost hushed tones around a senior engineer who “is brilliant.” I’ve seen it while sitting in a meeting in the middle of an argument over some technical point in a particular RFC. Someone says, “we should just ask the author…” Which is almost always followed by something like: “Really? You know them?”

To some degree, this is understandable—network engineering is difficult, and we should truly honor those in our world who have made a huge impact. In many other ways, it’s unhelpful, and even unhealthy. Why?

First, it tends to create an “us versus them,” atmosphere in our world. There are engineers who work on “normal” networks, and then there are those who work on, well, you know, special ones. Not everyone needs those “special skills,” so we end up creating a vast pool of people Continue reading

What does PE-CE mean in MPLS ?

What does PE-CE mean in the context of MPLS ? What is CE , P and PE device in MPLS and MPLS VPN ? These are foundational terms and definition in MPLS. MPLS is one of the most commonly used encapsulation mechanism in Service Provider networks and before studying more advanced mechanisms, this article is […]

The post What does PE-CE mean in MPLS ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Open Source at Docker, Part 3: The Tooling and Automation

The Docker open source project is among the most successful in recent history by every possible metric: number of contributors, GitHub stars, commit frequency, … Managing an open source project at that scale and preserving a healthy community doesn’t come without challenges.

This post is the last of a 3-part series on how we deal with those challenges on the Docker Engine project. Part 1 was all about the people behind the project, and part 2 focused on the processes. In Part 3, we will cover tooling and automation.

There are many areas for automation in a project such as Docker. We wanted to present and share some of our tooling with you: the CI, the utility bots, and the project dashboards.

Continue reading

BeagleBone board gets long-overdue Wi-Fi and Bluetooth capabilities

Before Raspberry Pi rocked the world of makers, boards from BeagleBoard.org were the computers of choice among developers who were looking to create cool gadgets.One of its boards, BeagleBone, isn't as popular as it used to be, but it still has a loyal following. Seeed Studios has taken a version of the open-source board and given it a much-needed wireless upgrade, adding Wi-Fi and Bluetooth support.The BeagleBone Green Wireless is a significant improvement over predecessors: among other things it now allows makers to add wireless capabilities to smart home devices, wearables, health monitors and other gadgets. The upgrade also brings BeagleBone into the Internet of Things era, in which wirelessly interconnected devices are constantly exchanging data.To read this article in full or to leave a comment, please click here

U.S. appeals court upholds net neutrality rules, but fight is not over

Rejecting challenges by ISPs and broadband trade groups, an appeals court has upheld the U.S. Federal Communications Commission's controversial net neutrality rules, passed in 2015.  The legal wrangling will likely continue for years, however, and may go all the way to the U.S. Supreme Court. Meanwhile, the U.S. Court of Appeals for the District of Columbia Circuit, in an opinion issued Tuesday, ruled that the FCC had the authority to reclassify broadband as a common-carrier telecom service to provide a foundation for net neutrality rules that prohibit broadband providers from selectively blocking or slowing Internet traffic. Past court rulings have given agencies the authority to change their minds, like the FCC did when it re-regulated broadband, Judges David Tatel and Sri Srinivasan wrote in an 184-page opinion.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Scality launches single-server open source software for S3-compliant storage

News this morning from storage vendor Scality that the company is announcing the general availability of its S3 Server Software. The offering is an open source version of Scality's S3 API and allows developers to code to Amazon Web Services' S3 storage API on a local machine.Packaged as a Docker container (what else!) the idea is that developers can local build applications that thereafter can be deployed on premises, on AWS or some combination of the above.RING storage capabilities Scality has grown to scale (pun intended) by offering storage solutions that now store some 800 billion objects. Scality's RING storage supports any file and object application, sited on any hardware and with no capacity constraints. Given its standard API approaches, RING enables storage to be completed across public or private services and can be deployed on any standard x86 hardware, without the need to re-architect as infrastructure changes occur.To read this article in full or to leave a comment, please click here

Sponsored Post: Gusto, Awake Networks, Spotify, Telenor Digital, Kinsta, Aerospike, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

  • Awake Networks is an early stage network security and analytics startup that processes, analyzes, and stores billions of events at network speed. We help security teams respond to intrusions with super-human  efficiency and provide macroscopic and microscopic insight into the networks they defend. We're looking for folks that are excited about applying modern bleeding edge techniques to build systems that handle scale in a constrained environment. We have many open-ended problems to solve around stream-processing, distributed systems, machine learning, query processing, data modeling, and much more! Please check out our jobs page to learn more.

  • Site Reliability Engineer Manager. We at Spotify are looking for an engineering leader (Chapter Continue reading