Featured Guest Article: Deploying SDN in Service Provider Networks
The role the SDN control layer plays.
The role the SDN control layer plays.

This is a guest repost by Mark Russinovich, CTO of Microsoft Azure (and novelist!). We all benefit from a vibrant competitive cloud market and Microsoft is part of that mix. Here's a good container overview along with Microsoft's plan of attack. Do you like their story? Is it interesting? Is it compelling?
You can’t have a discussion on cloud computing lately without talking about containers. Organizations across all business segments, from banks and major financial service firms to e-commerce sites, want to understand what containers are, what they mean for applications in the cloud, and how to best use them for their specific development and IT operations scenarios.
From the basics of what containers are and how they work, to the scenarios they’re being most widely used for today, to emerging trends supporting “containerization”, I thought I’d share my perspectives to better help you understand how to best embrace this important cloud computing development to more seamlessly build, test, deploy and manage your cloud applications.
In abstract terms, all of computing is based upon running some “function” on a set of “physical” resources, like processor, memory, disk, network, etc., to accomplish a task, whether a Continue reading
When I’m not working (boring right now), reading Everyday Feminism (fascinating*) or spending time with the family (awesome) I’m writing. I’ve three book projects on the go, two of which are taking far too long and rapidly become a chore. The third is the third edition of my F5 iRules book (I’m not shilling – […]
The post F5 iRules – What is a Program? appeared first on Packet Pushers.

From the very beginning, the walled garden has been the opposite of what those who work on and around the ‘net have wanted. The IETF, and the protocols it has developed over the years, have always been about free and open access to anyone who wants to learn networking, coding, or even just what the latest baseball score for their favorite team. Of course, a number of tech giants (remember Compuserve?) fought to build walled gardens using the tools of the Internet. A user would dial into a modem pool, and access the world through a small portal that would provide a consistent and controlled interface for their entire experience, from email to news to chat to…
The same battle rages in recent times, as well. Phone makers, mobile providers, and even social media networks would desperately like to make your only interface into the global Internet a single O/S or app. From this one app, you’ll be able to talk to your friends, pay your bills, save all your data, and, in general, live your entire life. And for those times when you can’t get to what you want outside the app or social network, they will gladly Continue reading

The post Worth Reading: Software Defined Overload appeared first on 'net work.

The post Worth Reading: New Port Mapper DDoS Attack appeared first on 'net work.
Intel makes its play for IoT ubiquity.
While cruising in our Galaxy-class starship to another data center, we’ve hit a storage scaling issue. There’s no way to add any more performance to our antimatter storage array! The chief engineer suggests that we perform a saucer separation to decouple capacity from performance, which will allow us to scale the two requirements individually. Release the docking latches, and let’s hope this maneuver can save us! Satyam Vaghani of PernixData joins the Datanauts for this discussion of decoupled storage.
The post Datanauts 007 – Decoupled Storage Architecture appeared first on Packet Pushers.
A few weeks ago I decided to join the SDN group on LinkedIn and quickly discovered the biggest problem of SDN – many people, who try to authoritatively talk about it, have no idea what they’re talking about. Here’s a gem (coming from a “network architect”) I found in one of the discussions:
The SDN local controller can punt across to remote datacenters using not only IP, but even UDP over MPLS
Do I have to explain how misguided that statement is?
Read more ...