Cisco’s newly released HyperFlex extends Cisco’s strategy of software-defined, policy-driven infrastructure to hyperconvergence to overcome the limitations of early hyperconverged infrastructure solutions.
It’s not like they’re asking for a back door for every device.
If the world goes dark through encryption, we’ll be back to the wild west!
After all, if it were your daughter who had been killed in a terrorist attack, you’d want the government to get to that information, too.
While sitting on a panel this last week, I heard all three reactions to the Apple versus FBI case. But none of these reactions ring true to me.
Let’s take the first one: no, they’re not asking for a back door for every device. Under the time tested balance between privacy and government power, the specific point is that people have a reasonable expectation of privacy until they come under suspicion of wrongdoing. However, it’s very difficult to trust that, in the current environment, that such power, once granted, won’t be broadened to every case, all the time. The division between privacy and justice before the law was supposed to be at the point of suspicion. That wall, however, has already been breached, so the argument now moves to “what information should the government be able to trawl through in order to find crimes?” They are asking for Continue reading
In the previous post (Label Switched Multicast – An Introduction) in this series on Label Switched Multicast (LSM) I introduced the concepts behind LSM and draft-rosen, the two most poplar methods for transporting multicast traffic through MPLS Layer 3 VPNs.
In this article I will talk through the configuration of LSM on the PE and P routers and get to the point where two CEs are successfully passing multicast traffic via the MPLS network. All of the configuration examples will be relevant to Cisco IOS.
As was the case in the introduction article in the series, it’s best if you already have a good understanding of multicast and MPLS before reading this article.
At the end of this article you’ll be able to start configuring your own LSM environment using the configuration samples here as a template.
To the CLI!
In order to keep this post on point, I’m going to start on the basis that basic routing, LDP and MP-BGP are already configured and that unicast traffic is successfully flowing between all CEs.
The basic topology being used here is the same as the one in the introduction post:
Within the Continue reading
How can mobile networks reduce bottlenecks and buffering to meet user needs?
Network functions virtualization may be in its infancy now, but it's sure to make an impact on your enterprise network.
I had a great chat with Enno Rey the morning before Troopers 2016 started in which he he made an interesting remark:
I disagree with your idea of running BGP on servers because I think sysadmins shouldn’t be involved with routing.
As (almost) always, it turned out that we were still in violent agreement ;)
Read more ...If that happens, neither side will look good in the short term. The FBI won’t look good because it went to court and claimed it had no alternatives when an alternative existed. The whole case was for nothing, which will raise suspicions about why the government filed the case and the timing of this new discovery. But Apple won’t look good either. Apple claimed that the sky would fall if it had to create the code in light of the risk outsiders might steal it and threaten the privacy of everyone. If outsiders already have a way in without Apple’s help, then the sky has already fallen. Apple just didn’t know Continue reading
With the correct level of intelligence in the routing device, could a lack of flow be used to signify a change in the network?
The post Which Would Be Quicker – Routing Updates Or Loss Of User Data? appeared first on Packet Pushers.
With the correct level of intelligence in the routing device, could a lack of flow be used to signify a change in the network?
The post Which Would Be Quicker – Routing Updates Or Loss Of User Data? appeared first on Packet Pushers.