Network Break 66 looks at a pair of SD-WAN deals, examines IoT news from Cisco and HPE, reviews switch and router sales, and considers the impact of China's chip ambitions.
The post Network Break 66: SD-WAN Deals, IoT Lights Up appeared first on Packet Pushers.
Network Break 66 looks at a pair of SD-WAN deals, examines IoT news from Cisco and HPE, reviews switch and router sales, and considers the impact of China's chip ambitions.
The post Network Break 66: SD-WAN Deals, IoT Lights Up appeared first on Packet Pushers.
Adobe reports massive increase in revenue and profits on the back of moving to the cloud. First, let’s have a look at the numbers. Adobe reported a record $1.31 billion in revenue for the quarter, a 22 percent year over year increase. It disclosed record annual revenue of $4.8 billion. Mind you these are significant, but the big number to […]
The post Response: Adobe Profits Show Cloud is Expensive For Consumers appeared first on EtherealMind.
Join SDxCentral and KulCloud on January 22nd at 10:00am PT to learn how PRISM can unlock the potential of disaggregated routing to power OpenStack Neutron.
The post Worth Reading: Understanding IPv6 appeared first on 'net work.
Alfred Bratterud is Assistant Professor and PhD scholar at Oslo and Akershus University College of Applied Science where he is currently working full time leading the development of IncludeOS at the NetSys research group.
We’ve finally lifted the lid on IncludeOS, just in time for the IEEE CloudCom paper presentation recently. A preprint of the paper is available from our repo. However, we’ve done quite a lot of work since the paper was written, so here’s an update on what IncludeOS is now, and what you can expect in the near future.
A Java Virtual Machine is a portable language runtime environment. Java is portable across hardware architectures and operating systems because it uses a common instruction set. Once you’ve started a Java program, you can’t log into it (unless your program itself provides the facilities), and you can’t boot up any other programs inside it.
IncludeOS is like a safe language runtime for C++ programs, compiled into the x86 instruction set. This has the obvious advantage of removing one layer of abstraction, compared to Java: with hardware virtualization the code will execute directly on the CPU. Like with Continue reading
The ‘web has been abuzz with security stuff the last couple of weeks; forthwith a small collection for your edification.
The man in the middle attack is about as overused as the trite slippery slope fallacy in logic and modern political “discourse” (loosely termed — political discourse is the latest term to enter the encyclopedia of oxymorons as it’s mostly been reduced to calling people names and cyberbullying, — but of course, putting the social media mob in charge of stopping bullying will fix all of that). But there are, really, such things as man in the middle attacks, and they are used to gather information that would otherwise be unavailable because of normal security provided by on the wire encryption. An example? There is no way to tell if your cell phone is connecting to a real cell phone tower or a man-in-the-middle device that sucks all your information out and ships it to an unintended recipient before forwarding your information along to its correct destination.
The idea for this post came from someone I was working with recently. Thanks Fan (and Carson, and Shree) :-)
In Service Software Upgrade (ISSU) is a method of upgrading software on a switch without interrupting the flow of traffic through the switch. The conditions for successfully completing an ISSU are usually pretty strict and if you don’t comply, the hitless upgrade can all of a sudden become impacting.
The conditions for ISSU on the Nexus 5000 are pretty well documented (cisco.com link) however, there are a couple bits of knowledge that are not. This post is a reminder of the ISSU conditions you need to comply with and a call out to the bits of information that aren’t so well documented.
The two major ISSU conditions on the n5k are:
Designated
state unless the port is an Edge port.The first one is easy: the switch cannot be doing any routing. Even if the switch is Layer 2 only, this condition will still fail if any of the following are true:
It's not just about moving containers into production.