Reaction: DNS versus anycast

This post raises an obvious question: are techniques using DNS to “steer” traffic (such as IP geolocation) sufficient, or do you need to consider using anycast as LinkedIn did? The short answer is that DNS steering works well and is only getting better. via circleid

Matt’s article is well worth reading, but once you’re finished reading it —

It’s well worth remembering when dealing with different load balancing solutions (like most other things in life) that the right answer is, “it depends.” In this case, do you need TCP anycast, or can you use DNS based load sharing? It depends not only on how effective each one is, but also what sort of application you’re working with. Many apps designed for smart phones don’t use DNS at all, so some form of anycast or appliance based solution are all you have. Between these two, anycast is often just as viable a solution if your network is designed to handle it correctly.

In the end, all three solutions — anycast, DNS, and appliance based — are viable options. Which one you should choose just all depends.

The post Reaction: DNS versus anycast appeared first on 'net work.

Juniper disaggregates even further

Juniper Networks this week unveiled a new access switch supporting 25/50G Ethernet as well as an open version of its Junos operating system for it. Juniper says it disaggregated Junos so it can enable third-party application and service support, and enhanced programmability. Disaggregation is the industry practice of breaking the dependencies of hardware and software on each other so they can be sold independently, giving customers more choice in what they purchase and operate.To read this article in full or to leave a comment, please click here

Google researchers poke holes in Galaxy S6 Edge, show OEMs add risky code

Google's security researchers hunted for bugs in Samsung's Galaxy S6 Edge phone as part of an experiment to see how vulnerable the code that manufacturers add to Android can be. It's pretty bad.The researchers found 11 vulnerabilities in Samsung's code that could be exploited to create files with system privileges, steal the user's emails, execute code in the kernel and escalate the privilege of unprivileged applications."Overall, we found a substantial number of high-severity issues, though there were some effective security measures on the device which slowed us down," the security researchers said in a blog post. "The weak areas seemed to be device drivers and media processing. We found issues very quickly in these areas through fuzzing and code review."To read this article in full or to leave a comment, please click here

DockerCon EU 2015: New Innovators

After the great feedback we received from DockerCon 2015 in SF, we decided to extend our New Innovators Showcase to DockerCon EU 2015 in Barcelona! The New Innovators Showcase is designed to highlight small, young startups in the ecosystem, building cool tools … Continued

SDN and NFV: The brains behind the “smart” city

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

In major metropolitan areas and smaller cities alike, governments are adopting software-defined networking (SDN) and network function virtualization (NFV) to deliver the agility and flexibility needed to support adoption of “smart” technologies that enhance the livability, workability and sustainability of their towns.

Today there are billions of devices and sensors being deployed that can automatically collect data on everything from traffic to weather, to energy usage, water consumption, carbon dioxide levels and more. Once collected, the data has to be aggregated and transported to stakeholders where it is stored, organized and analyzed to understand what’s happening and what’s likely to happen in the future.

To read this article in full or to leave a comment, please click here

Juniper steps up its data center game

This week, Juniper is holding its "NXTWORK 2015" customer summit in Silicon Valley. At the event, Juniper made a number of data center announcements. These announcements come about a month after Juniper rolled out its "Unite" architecture aimed at the enterprise campus (disclosure: Juniper Networks is a client of ZK Research). While the two announcements are aimed at different parts of the network, there is a common focal point, and that's helping businesses build networks that are cloud-ready. The Unite architecture was focused on simplification, whereas Juniper's play in the data center is more about customer choice and automation.To read this article in full or to leave a comment, please click here

Security made simple: RedPhone and TextSecure rolled into Signal for Android

If you want to make free, worldwide encrypted calls, then you should consider using Signal; it supports encrypted texting too.While iPhone users have had the option to use Signal since last year, yesterday Open Whisper Systems founder Moxie Marlinspike announced that TextSecure and RedPhone have been rolled into one Signal for Android app. Open Whisper Systems Signal is so super easy to use, even your granny can make private calls and send private texts. Cryptography researcher Matt Blaze previously tweeted about overhearing an elderly gentleman explaining how to install Signal; Blaze called it a “turning point.”To read this article in full or to leave a comment, please click here

How Much Is Unlimited Anyway?

unlimited-resources

The big news today came down from the Microsoft MVP Summit that OneDrive is not going to support “unlimited” cloud storage going forward. This came as a blow to folks that were hoping to store as much data as possible for the foreseeable future. The conversations have already started about how Microsoft pulled a bait-and-switch or how storage isn’t really free or unlimited. I see a lot of parallels in the networking space to this problem as well.

All The Bandwidth You Can Buy

I remember sitting in a real estate class in college talking to my professor, who was a commercial real estate agent. He told us, “The happiest day of your real estate career is the day you buy an apartment complex. The second happiest day of your career is when you sell it to the next sucker.” People are in love with the idea of charging for a service, whether it be an apartment or cloud storage and compute. They think they can raise the price every year and continue to reap the profits of ever-increasing rent. What they don’t realize is that those increases are designed to cover increased operating costs, not increased money in Continue reading

TCP Port Numbers for Contemporary Applications

A list of default TCP port numbers for contemporary applications such as Docker, Elastic, OpenStack and Puppet. Why? Whenever I’m trying to identify an application by port number, the usual online sources are often still giving me details on AltaVista Web Server and the like. In the oh so hip and cutting edge DevOps environments I live […]

The post TCP Port Numbers for Contemporary Applications appeared first on Packet Pushers.

Top 3 Labs for Networkers to Get Started at Cisco’s DevNet

Today’s post gives a top 3 list: For you networkers, what are three labs to try at Cisco’s DevNet Zone, even before you have a lot of confidence with APIs?

As part of my role in the #CiscoChampion program, I wrote a recent blog post over at Cisco.com. For that post, I could pick any topic that I thought might be of interest to Cisco followers, and I ended up writing about Cisco’s DevNet Zone, Cisco’s software developer portal. I had a few more thoughts about labs beyond the other blog post, so I put those notes in this companion post. If you’re interested in Cisco’s DevNet Zone, check out both posts!

Continue reading

14 DRaaS vendors that will rescue you in a pinch

To the rescueImage by Flickr: Beverley Goodwin According to a Gartner report, the Disaster Recovery as a Service market originally emerged to address IT organizations' need to support increasingly aggressive recovery-time targets and more frequent and lower-cost testing while understaffed, or without requiring a significant time commitment by existing IT staff.To read this article in full or to leave a comment, please click here

Learn to Speak Your Peer’s Language with ipSpace.net Webinars

One of the reasons I started creating ipSpace.net webinars was to help networking engineers grasp the basics of adjacent technologies like virtualization and storage. Based on feedback from an attendee of my Introduction to Virtual Networking webinar it works:

I am completely on the Network side of the house and understand what I need to build for Storage/Data replication, but I really never thoroughly understood why. This allowed me to have a coherent discussion with my counterparts in DB and Storage and some of the pitfalls that can occur if we try to cowboy the network design.

Recommendation: if you have a similar problem, start with Introduction to Virtual Networking and continue with Data Center 3.0 webinar.

Revealed: The top 10 apps that companies hate

Companies are wary about what employees are doing on their smartphones. Be it data loss or time-wasting, a growing number of employers are actively stopping staff from using certain apps on company-controlled devices.After surveying the roughly 6,000 companies that uses its mobile security management software, MobileIron determined the top 10 consumer apps that are most often blocked or blacklisted at companies: Dropbox Angry Birds Facebook Microsoft OneDrive Google Drive Box Whatsapp Twitter Skype SugarSync It's perhaps no surprise that half of the positions in the top 10 are for file-sharing apps. Corporate IT managers are wary about giving users the ability to download and share internal files on apps that aren't under corporate control.To read this article in full or to leave a comment, please click here