On today's Kubernetes Unpacked podcast, Michael catches up with Eric Wright to discuss the current and future of containers and Kubernetes, as well as a look into how the world of containers has evolved. They dive into virtualization, how orchestration actually works, and how to think about ephemeral workloads.
The post Kubernetes Unpacked 011: Containers Past, Present And Future appeared first on Packet Pushers.
Best friends are the family that we get to choose. We share secrets, inside jokes, and a bond that is unbreakable. So it only makes sense that we want to dress up with our BFFs come Halloween!
Dressing up as each other is the perfect way to show off your BFF bond! You can either go for a traditional look by twinning your outfits, or get creative and put your own spin on it.
If you need some inspiration for your costume this year, check out our list of the best friend Halloween costumes below.
The PowerPuff Girls are the perfect example of best friends who also happen to be sisters. If you and your BFF are looking for a cute costume idea, consider dressing up as Blossom, Bubbles, and Buttercup! You can even add a little bit of flair by carrying around a stuffed animal or wearing temporary tattoos.
If you and your bestie are fans of the TV show 2 Broke Girls, then this costume idea is for you! Dress up as the titular characters, Max and Caroline. They may not have much money, but they sure do have a lot of Continue reading
In the EVPN/MPLS Bridging Forwarding Model blog post I mentioned numerous services defined in RFC 7432. That blog post focused on VLAN-Based Service Interface that mirrors the Carrier Ethernet VLAN mode.
RFC 7432 defines two other VLAN services that can be used to implement Carrier Ethernet services:
And then there’s the VLAN-Aware Bundle Service, where a bunch of VLANs share the same MPLS pseudowires while having separate bridging tables.
In the EVPN/MPLS Bridging Forwarding Model blog post I mentioned numerous services defined in RFC 7432. That blog post focused on VLAN-Based Service Interface that mirrors the Carrier Ethernet VLAN mode.
RFC 7432 defines two other VLAN services that can be used to implement Carrier Ethernet services:
And then there’s the VLAN-Aware Bundle Service, where a bunch of VLANs share the same MPLS pseudowires while having separate bridging tables.
What would the Internet look like—or what kinds of services would need to be developed and deployed—to make boradband class service available to every user? What could this kind of development do to drive entire societies forward? Micah Beck, from the University of Tennessee, joins Tom Ammon and Russ White to discuss universal broadband on this episode of the Hedge.
It is perplexing to us that the world’s largest distributor of client and server operating systems and also the creator of the Linux-based, open source SONiC network operating system – that would be Microsoft with its Windows and Windows Server franchises – did not see the benefit or the need to commercialize SONiC and lead the open networking revolution. …
After Long Last, A Commercial-Grade SONiC Network Operating System was written by Timothy Prickett Morgan at The Next Platform.
On today's Day Two Cloud we talk about what it's like to interview for a job at a massive tech company. How do you get yourself in line? What can you expect from the interview? How do you prepare? How do you overcome your own imposter syndrome? Our guest is Nathaniel Avery, Outbound Product Manager at Google Cloud. He recently ran the gauntlet of the tech interview, and is here to share tips and insights on the process.
The post Day Two Cloud 167: Interviewing At A Huge Tech Company appeared first on Packet Pushers.
The post Tier 1 Carriers Performance Report: September, 2022 appeared first on Noction.
The datacenter is becoming hyperdistributed and incorporating some multiple of capacity – 2X, 3X, 4X, or maybe 10X – outside of the traditional datacenter walls because applications and storage live increasingly at the edge. …
The Edge Is The New Frontier For IT was written by Jeffrey Burt at The Next Platform.
This post is also available in Français, Español, Português, 한국어, 简体中文, 繁體中文, and 日本語.
Welcome to our DDoS Threat Report for the third quarter of 2022. This report includes insights and trends about the DDoS threat landscape - as observed across Cloudflare’s global network.
Multi-terabit strong DDoS attacks have become increasingly frequent. In Q3, Cloudflare automatically detected and mitigated multiple attacks that exceeded 1 Tbps. The largest attack was a 2.5 Tbps DDoS attack launched by a Mirai botnet variant, aimed at the Minecraft server, Wynncraft. This is the largest attack we’ve ever seen from the bitrate perspective.
It was a multi-vector attack consisting of UDP and TCP floods. However, Wynncraft, a massively multiplayer online role-playing game Minecraft server where hundreds and thousands of users can play on the same server, didn’t even notice the attack, since Cloudflare filtered it out for them.
Overall this quarter, we've seen:
Daniel Dib posted a number of excellent questions on Twitter, including:
While forwarding a received Type-5 LSA to other areas, why does the ABR not change the Advertising Router ID to it’s own IP address? If ABR were able to change the Advertising Router ID in the Type-5 LSA, then there would be no need for Type-4 LSA which meant less OSPF overhead on the network.
TL&DR: The current implementation of external routes in OSPF minimizes topology database size (memory utilization)
Before going to the details, try to imagine the environment in which OSPF was designed, and the problems it was solving.
Daniel Dib posted a number of excellent questions on Twitter, including:
While forwarding a received Type-5 LSA to other areas, why does the ABR not change the Advertising Router ID to it’s own IP address? If ABR were able to change the Advertising Router ID in the Type-5 LSA, then there would be no need for Type-4 LSA which meant less OSPF overhead on the network.
TL&DR: The current implementation of external routes in OSPF minimizes topology database size (memory utilization)
Before going to the details, try to imagine the environment in which OSPF was designed, and the problems it was solving.