Intentionally poisoning BGP routes in the Default-Free Zone (DFZ) would always be a bad thing, right? Actually, this is a fairly common method to steer traffic flows away from and through specific autonomous systems. How does this work, how common is it, and who does this? Jared Smith joins us on this episode of the Hedge to discuss the technique, and his research into how frequently it is used.
Applications have never been more important in business than they are today. And where there are applications, there’s a load balancer, working behind the scenes to ensure your applications can be used comfortably and safely at all times. When operating a load balancer, the most troublesome issue is upgrade work. Let’s examine the problems of traditional load balancer upgrades and take a look at VMware’s automated, streamlined solution: NSX Advanced Load Balancer.
Why do you need to upgrade your load balancer in the first place?
The main reasons to upgrade a load balancer are to patch vulnerabilities and bugs, to enable new features, and for EoSL support. A load balancer, located between users and applications, must above all be stable; we particularly want to avoid service disruptions due to defects in the load balancer software. For this reason, load balancer upgrades are inevitable. And for IT, the trick is to make them, as transparent and painless as possible..
For illustration, let’s take a look at a recent international case involving load balancers. To address software glitches, a project was running to upgrade hundreds of load balancers. The upgrade work was carried out little by little over several months, with operations personnel setting Continue reading
IBM continues to tweak its venerable mainframe to keep the Big Iron among the talking points in hybrid cloud.About a year ago the company changed its 20-year mainframe software pricing scheme to make it more palatable to hybrid cloud and multicloud users who might be thinking of moving workloads off the mainframe and into the cloud.To read this article in full, please click here
IBM continues to tweak its venerable mainframe to keep the Big Iron among the talking points in hybrid cloud.About a year ago the company changed its 20-year mainframe software pricing scheme to make it more palatable to hybrid cloud and multicloud users who might be thinking of moving workloads off the mainframe and into the cloud.To read this article in full, please click here
This guest post is by Drew Conry-Murray on behalf of Palo Alto Networks. We thank Palo Alto Networks for being a sponsor. Prisma Access, which delivers security services via the cloud, has added an explicit proxy feature in the 2.0 version. This feature can help companies migrate off of hardware-based proxies while still protecting Web […]
In this week's IPv6 Buzz episode, Ed, Scott, and Tom chat with John Burns, a lead architect at Wells Fargo, about the relatively early adoption of IPv6 at the company. The discussion also covers adoption trends in the financial sector as a whole, along with the key challenges and opportunities of the protocol.
In this week's IPv6 Buzz episode, Ed, Scott, and Tom chat with John Burns, a lead architect at Wells Fargo, about the relatively early adoption of IPv6 at the company. The discussion also covers adoption trends in the financial sector as a whole, along with the key challenges and opportunities of the protocol.
The COVID-19 pandemic has taught us once and for all that broadband access is critical infrastructure. Without it, communities cannot work, learn, or earn online – a necessity during stay-at-home orders. And policymakers are taking notice. In the past few months, trillions of dollars have been proposed by the House, Senate, and White House for […]
The edge's ability to aggregate, process, and analyze data locally opens up new opportunities for entrepreneurial ventures outside major hubs of commerce.
Chris Wahl explains how pipelines, sometimes thought of as a developer tool only, can be used by IT infrastructure professionals delivering infrastructure as code (IaC). Event triggers, automation, and testing.
The public cloud for years has tempted enterprises with the promise of much-needed agility and scalability that come with an elastic IT environment and of cost savings from not having to invest a lot of money upfront to buy a lot of infrastructure, adopting instead more flexible consumption models that allow organizations to pay only for what they use. …
Some time ago I was looking at a hot section in our code and I saw this:
if (debug) {
log("...");
}
This got me thinking. This code is in a performance critical loop and it looks like a waste - we never run with the "debug" flag enabled[1]. Is it ok to have if clauses that will basically never be run? Surely, there must be some performance cost to that...
Just how bad is peppering the code with avoidable if statements?
Back in the days the general rule was: a fully predictable branch has close to zero CPU cost.
To what extent is this true? If one branch is fine, then how about ten? A hundred? A thousand? When does adding one more if statement become a bad idea?
At some point the negligible cost of simple branch instructions surely adds up to a significant amount. As another example, a colleague of mine found this snippet in our production code:
create LSP from R1 to R6. The primary path should have bandwidth constraint (e.g. 500Mbit/s)
describe reserving bandwidth process
examine signaling with cspf and no cspf option
examine opaque LSA
check maximum bandwidth, reservable bandwidth, and unreserved bandwidth fields
Any changes after LSP signaling?
change path bandwidth and check opaque LSA again. Pay attention to Age and Sequence especially. What is a problem that can occur if we have an unstable network and a lot of LSP with bandwidth constraints?
How can we decrease the amount of LSA flood?
configure Threshold-Triggered IGP TE Updates and examine how it works
Bandwidth Reservation Styles
configure LSP to_R6 with primary "totally loose" path (bandwidth 200Mbit/s) and standby secondary "totally loose" path (bandwidth 300Mbit/s)
find a shared link
examine TED
What is unreserved bandwidth?
What is the default Bandwidth Reservation Style?
change Bandwidth Reservation Style and examine TED again
Big Blue got out of the chip foundry business when it sold off its IBM Microelectronics division to GlobalFoundries, itself a spinout of AMD, in 2014. …
I love hearing real-life “how did I start my automation journey” stories. Here’s what one of ipSpace.net subscribers sent me:
Make peace with your network engineering soul and mind and open up to the possibility that the world has moved on to something else when it comes to consuming apps and software. Back in 2017, this was very hard on me :)
I love hearing real-life “how did I start my automation journey” stories. Here’s what one of ipSpace.net subscribers sent me:
Make peace with your network engineering soul and mind and open up to the possibility that the world has moved on to something else when it comes to consuming apps and software. Back in 2017, this was very hard on me :)
If data governance stakeholders can plan for common challenges and address them at the outset of a new initiative, their projects will have a much greater chance for success.
Join host Peter McKee and Python wizard Michael Kennedy for a warts-and-all demo of how to Dockerize a Python app using FastAPI, a popular Python framework. Kennedy is a developer and entrepreneur, and the founder and host of two successful Python podcasts — Talk Python To Me and Python Bytes. He’s also a Python Software Foundation Fellow.
With some skillful back-seat driving by McKee, Kennedy shows how to build a bare-bones web API — in this case one that allows you to ask questions and get answers about movies (director, release date, etc.) — by mashing together a movie service and FastAPI. Next, he shows how to put it into a Docker container, create an app and run it, finally sharing the image on GitHub.
If you’re looking for a scripted, flawless, pre-recorded demo, this is not the one for you! McKee and Kennedy iterate and troubleshoot their way through the process — which makes this a great place to start if you’re new to Dockerizing Python apps. Install scripts, libraries, automation, security, best practices, and a pinch of Python zen — it’s all here. (Duration 1 hour, 10 mins.)
IBM has taken the wraps off a version of its Cloud Pak for Security that aims to help customers looking to deploy zero-trust security facilities for enterprise resource protection.IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of private or public infrastructure, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.To read this article in full, please click here