Can NFV Provide Five Nines?
Telcos don't want NFV to screw up their networks.
Telcos don't want NFV to screw up their networks.
You might remember all the fuss about various encapsulations used in overlay virtual networking… just because one wouldn’t be good enough (according to Andrew Lerner “we provide users with choice” actually means “we can’t decide which product to offer you”).
Read more ...On this week's show we're chatting with computer crime lawyer extraordinaire Tor Ekeland! He's worked on a number of high profile CFAA cases. Most recently he's been defending former Reuters and LA Times journalist Matthew Keys on some pretty hefty CFAA charges. He's also the guy who got Andrew Aurenheimer out of jail so he could go and live a free life as a Nazi troll. (Is that really a win?) He also defended Lauri Love... basically if you're a hacker who's fallen foul of the CFAA, this is the guy you want on your team.
iperf -suThen run the following sequence of tests on Server1:
#!/bin/bash
RT="10.0.0. Continue reading
Prediction: Eventually, they will.
Rob Lloyd went to Hyperloop, and Cisco's other ex-president has kept busy as well.
In this post we walk through the steps required to install a 2 node cluster running kubernetes that uses opencontrail as the network provider. In addition to the 2 compute nodes, we use a master and a gateway node. The master runs both the kubernetes api server and scheduler as well as the opencontrail configuration management and control plane.
OpenContrail implements an overlay network using standards based network protocols:
This means that, in production environments, it is possible to use existing network appliances from multiple vendors that can serve as the gateway between the un-encapsulated network (a.k.a. underlay) and the network overlay. However for the purposes of a test cluster we will use an extra node (the gateway) whose job is to provide access between the underlay and overlay networks.
For this exercise, I decided to use my MacBookPro which has 16G of RAM. However all the tools used are supported on Linux also; it should be relativly simple to reproduce the same steps on a Linux machine or on a cloud such as AWS or GCE.
The first step Continue reading
Read the Citrix white paper to reduce risk and data loss with Citrix's best practices checklist for OpenStack and Citrix NetScaler ADC services.
A container that watches other containers for vulnerabilities.
Consulting seems like a dark art. Pay someone a lot of money to sell you something that is also...a lot of money. And then maybe pay them even more money to implement the solution. The Datanauts talk about how to maximize an investment in consulting.
The post Datanauts 014: Making The Most Of Consultants appeared first on Packet Pushers.
In the past week, we have detected the first signs of the Internet returning to Syria’s largest city, Aleppo. Internet service in this part of the country was knocked out on March 24 — over seven months ago. Internet connectivity, and the lack of it, has been a continuing subplot to this bloody civil war well into its fifth year.
A notable difference with the restored service is that it is no longer routed via Turkey (as it had been) — likely due to the fact that the Syrian government no longer controls the ground between Aleppo (in the northern part of the country) and Turkey. The restoration of Internet service in Aleppo may be an outcome of Russia’s recent engagement (with assistance from Iran) in the battle for Aleppo — and perhaps an indicator of the scales tipping towards government forces in this protracted battle.
Background
The first Syrian Internet shutdown occurred in June 2011 during ‘Arab Spring’ protests as two thirds of the country’s routed networks were taken down for over 48 hours. As the conflict has continued over the years, Syria has suffered numerous Internet blackouts including a multi-day outage in November Continue reading