Skyport Systems Grabs Google & Cisco in $30M Series C
Security service provider focuses on zero-trust computing.
Security service provider focuses on zero-trust computing.
Kentik turns NetFlow, BGP, GeoIP and other network data into actionable intelligence for network monitoring, DDoS detection, peering analytics, and planning.
The post Analyzing NetFlow Details To Go Beyond DDoS Detection appeared first on Packet Pushers.
Kentik turns NetFlow, BGP, GeoIP and other network data into actionable intelligence for network monitoring, DDoS detection, peering analytics, and planning.
The post Analyzing NetFlow Details To Go Beyond DDoS Detection appeared first on Packet Pushers.
Learn about the 10 educational tracks at Interop Las Vegas.
The HC 380 appliance targets midsize enterprises and remote offices with a focus on simplicity.
It's been around for years, but object-based storage is just now becoming widespread.
Almost a year ago I wrote a blog post explaining why I don’t think our future lies in becoming programmers. In the meantime, I found two interesting articles explaining the same idea from a programmer’s point-of-view:
Read more ...Ivan’s post this week was a good reminder that other parts of IT aren’t perfect either. It’s not all roses on the other side of the fence. Networking has done many good things, and often showed the way.
Consider a conversation between a sysadmin & a network engineer:
Look at how I can virtualise these systems! Now I can isolate users and consolidate hardware resources. They have no idea they’re on the same hardware. It’s incredible!
Oh. Bit like these VLANs, VRFs, and VDCs we’ve been doing for 15+ years now?
Look at how I can use Puppet to define this server’s complete configuration using a single text file! This is amazing! I can use version control for my infrastructure!
Oh. You mean like this single text file that defines the configuration of my network device here? Yes, yes that does seem useful.
Why do you networking people have so many different ways of configuring systems? Why don’t you just have one common API?
Oh. You mean like the way that there’s a Universal install script Linux systems?
SNMP sucks. The data format is terrible, implementations are inconsistent. Why don’t you switch to gRPC?
Wait, weren’t you telling me last Continue reading
Linking open source efforts in the name of LSO.
It's make-or-break time for commercial virtualization.

The post Worth Reading: Data is a toxic asset appeared first on 'net work.

How does a network designer, well, actually design something? What process do you use as a designer to get from initial contact with a problem to building a new design to deploying a solution? What is the design mindset? I’ve been asking myself just this question these last few months, going through old documentation to see if I can find a pattern in my own thinking that I could outline in a way that’s more definite than just “follow my example.” What I discovered is my old friends the OODA loop and the complexity model are often in operation.
So, forthwith, a way to grab hold of a designer mindset, played out in an unknown number of posts.
Begin with observe. Observation is the step we often skip, because we’ve either worked on the network for so long “we don’t need to,” or we’re “so experienced we know what to look for.” This is dangerous. Let me give you an example.
A long time ago, in a small shire on the borders of reality (it seems now), I worked on a piece of equipment we called the funnyman. Specifically, this was the FNM-1, which was used to detect runway Continue reading