Object Storage Comes Of Age
It's been around for years, but object-based storage is just now becoming widespread.
It's been around for years, but object-based storage is just now becoming widespread.
Almost a year ago I wrote a blog post explaining why I don’t think our future lies in becoming programmers. In the meantime, I found two interesting articles explaining the same idea from a programmer’s point-of-view:
Read more ...Ivan’s post this week was a good reminder that other parts of IT aren’t perfect either. It’s not all roses on the other side of the fence. Networking has done many good things, and often showed the way.
Consider a conversation between a sysadmin & a network engineer:
Look at how I can virtualise these systems! Now I can isolate users and consolidate hardware resources. They have no idea they’re on the same hardware. It’s incredible!
Oh. Bit like these VLANs, VRFs, and VDCs we’ve been doing for 15+ years now?
Look at how I can use Puppet to define this server’s complete configuration using a single text file! This is amazing! I can use version control for my infrastructure!
Oh. You mean like this single text file that defines the configuration of my network device here? Yes, yes that does seem useful.
Why do you networking people have so many different ways of configuring systems? Why don’t you just have one common API?
Oh. You mean like the way that there’s a Universal install script Linux systems?
SNMP sucks. The data format is terrible, implementations are inconsistent. Why don’t you switch to gRPC?
Wait, weren’t you telling me last Continue reading
Linking open source efforts in the name of LSO.
It's make-or-break time for commercial virtualization.
The post Worth Reading: Data is a toxic asset appeared first on 'net work.
How does a network designer, well, actually design something? What process do you use as a designer to get from initial contact with a problem to building a new design to deploying a solution? What is the design mindset? I’ve been asking myself just this question these last few months, going through old documentation to see if I can find a pattern in my own thinking that I could outline in a way that’s more definite than just “follow my example.” What I discovered is my old friends the OODA loop and the complexity model are often in operation.
So, forthwith, a way to grab hold of a designer mindset, played out in an unknown number of posts.
Begin with observe. Observation is the step we often skip, because we’ve either worked on the network for so long “we don’t need to,” or we’re “so experienced we know what to look for.” This is dangerous. Let me give you an example.
A long time ago, in a small shire on the borders of reality (it seems now), I worked on a piece of equipment we called the funnyman. Specifically, this was the FNM-1, which was used to detect runway Continue reading
Last fall, the Interior Minister of Ukraine announced the creation of a national Cyberpolice (Кіберполіцію) to protect the country from everything from credit card fraud to malware. Here’s something that would be great to add to their list: fraudulent BGP routing out of Ukraine. Last year, we reported on an incident in which Ukrainian ISP Vega hijacked routes from British Telecom (including that of the UK’s Atomic Weapons Establishment), an event that could perhaps be chalked up to an innocent mistake. However, the fraudulent routing we’re now seeing from Ukraine is deliberately designed to go unnoticed. We’ll review some of this new behavior in this blog.
Governments take note
The profile of this issue has grown in the past year as governments have had to respond to their address space being fraudulently used. Last July, the Dutch Minister of Foreign Affairs (pictured right) was confronted with parliamentary questions concerning an incident where “attackers” had commandeered IP address space belonging to the Ministry of Foreign Affairs the previous year. In that incident, on 18 November 2014, Decision Marketing (AS62228) out of Sofia, Bulgaria began globally announcing eleven BGP routes that did not belong to Continue reading |
The Network Break speculates whether Cisco's Spark will catch fire and analyzes the latest update in Cisco's patent spat with Arista. We delve into Microsoft's Linux hug and its new open cloud OS, and get real about Google's reasons for joining Open Compute.
The post Network Break 78: Cisco Lights Spark; Microsoft Hugs Linux appeared first on Packet Pushers.
The Network Break speculates whether Cisco's Spark will catch fire and analyzes the latest update in Cisco's patent spat with Arista. We delve into Microsoft's Linux hug and its new open cloud OS, and get real about Google's reasons for joining Open Compute.
The post Network Break 78: Cisco Lights Spark; Microsoft Hugs Linux appeared first on Packet Pushers.
"CS research is timeless." Lessons learned are always pertinent. @aysylu22 #qconlondon
— Paula Walter (@paulacwalter) March 8, 2016
There has been a renaissance in the appreciation of computer science papers as a relevant source of wisdom for building today's complex systems. If you're having a problem there's likely some obscure paper written by a researcher twenty years ago that just might help. Which isn't to say there aren't problems with papers, but there's no doubt much of the technology we take for granted today had its start in a research paper. If you want to push the edge it helps to learn from primary research that has helped define the edge.
If you would like to share your love of papers, be proud, you are not alone:
The post Worth Listening: Aligning IT and the Business appeared first on 'net work.