This week's podcast asks how many Data Processing Units (DPUs) the market can support, discusses a startup that wants to manage your multi-vendor campus network from the cloud, explores new security capabilities in Forward Networks' network verification software, and more tech news.
The post Network Break 340: Marvell Challenges NVIDIA With 5nm DPU; Startup WiteSand Tackles Multi-Vendor Campus Network Management appeared first on Packet Pushers.
Calico was designed from the ground up with a pluggable data plane architecture. The Enterprise 3.6 release introduces an exciting new eBPF (extended Berkeley Packet Filter) data plane that provides multiple benefits to users.
When compared with the standard Linux data plane (based on iptables), the eBPF data plane:
The application of network address translation (NAT) by kube-proxy to incoming network connections to Kubernetes services (e.g. via a service node port) is a frequently encountered friction point with Kubernetes networking. NAT has the unfortunate side effect of removing the original client source IP address from incoming traffic. When this occurs, Kubernetes network policies can’t restrict incoming traffic from specific external clients. By the time the traffic reaches the pod it no longer has the original client IP address. For some applications, knowing the Continue reading
NFA v 21.06 has just been released. The new version comes with configurable Percentile Reporting, BGP Localpref & BGP MED filtering in
The post Noction Flow Analyzer v21.06: you asked, we listened. appeared first on Noction.
PowerShell can be used to codify Microsoft Windows environments. This post covers the basics of getting started with PowerShell. Software The following software was used in this post. Windows - 10 PowerShell - 5.1.19041.1023 Cmdlets Get a list of cmdlets Getting Help Get help for a...continue reading
I'm trying to create perfect screen captures of SDR to explain the world of radio around us. In this blogpost, I'm going to discuss some of the imperfect captures I'm getting, specifically, some notes about WiFi and Bluetooth.
An SDR is a "software defined radio" which digitally samples radio waves and uses number crunching to decode the signal into data. Among the simplest thing an SDR can do is look at a chunk of spectrum and see signal strength. This is shown below, where I'm monitoring part of the famous 2.4 GHz pectrum used by WiFi/Bluetooth/microwave-ovens:
There are two panes. The top shows the current signal strength as graph. The bottom pane is the "waterfall" graph showing signal strength over time, display strength as colors: black means almost no signal, blue means some, and yellow means a strong signal.
The signal strength graph is a bowl shape, because we are actually sampling at a specific frequency of 2.42 GHz, and the further away from this "center", the less accurate the analysis. Thus, the algorithms think there is more signal the further away from the center we are.
What we do see here is two peaks, at 2.402 Continue reading
Less protection for kids: The U.K.’s Department of Digital, Media, Culture and Sport has recommended that children’s accounts on social media platforms and messaging services should not use end-to-end encryption, TechCrunch reports. In the effort to protect kids against online predators, cyber bullying and other bad stuff, the agency says children shouldn’t be protected against cybercrime, […]
The post The Week in Internet News: U.K. Government says ‘No Encryption for Kids’ appeared first on Internet Society.
You’re standing in front of three doors. Door number one is big, tall, and sturdy. Nothing fancy, but seemingly safe. Door number two has more bells and whistles, fancy engravings, and twice the number of locks. Elevated security for sure, but you suspect more form over function, so you’re not entirely sold. Door number three features a winning combination of practicality and advanced locks. This one has to be the best choice, right?
You can’t see behind any door, so your choice is limited to inference. That’s frustrating. Today, choosing the right security solution for your business is no different. Bells and whistles can distract us from our core objective of ultimate, unwavering security. And old reliable doesn’t seem capable of repelling an onslaught of modern threats and distributed exposures.
Organizations need to make the right network security choice to successfully secure their networks in a highly dynamic, distributed world where it’s not a matter of if intruders will get in, but when. Turns out, the right approach is as much about philosophy as it is about technology: trust no one. But, before we get into the relationship between trust and better security, let’s begin with a review of how Continue reading
We’re halfway through 2021 and it’s been going better than last year. Technology seems to be rebounding and we’re seeing companies trying to find ways to get employees to come back into the office. Of course, that is being met head on by the desire to not go back at all and continue to do the job from home that has been done over the past year. Something is going to have to give and I don’t know what that might be.