Next Platform TV: October 9, 2020

On today’s show, in depth with Google’s lead for technical infrastructure on the topic of open infrastructure; a look at the Arm ecosystem in supercomputing and large-scale datacenters with computing pioneer, Simon McIntosh-Smith; we check in with Matt Kixmoeller of Pure Storage to discuss containers and flash–and all the sticky points in between; the show closes with an in-depth on IBM’s opening of its Power architecture and what it means for their competitive advantage. 

Next Platform TV: October 9, 2020 was written by Nicole Hemsoth at The Next Platform.

Heavy Networking 543: What 2020 Internet Outages Teach Us About Managing Remote Work (Sponsored)

Stuff breaks all the time. With so many people working from home, most of the stuff that's breaking isn't yours, but that doesn’t mean it’s not your problem. Today's Heavy Networking, sponsored by ThousandEyes, reviews critical outages in 2020 and considers network design tips for Internet and remote work. Our guests from ThousandEyes are Angelique Medina and Archana Kesavan.

Heavy Networking 543: What 2020 Internet Outages Teach Us About Managing Remote Work (Sponsored)

Stuff breaks all the time. With so many people working from home, most of the stuff that's breaking isn't yours, but that doesn’t mean it’s not your problem. Today's Heavy Networking, sponsored by ThousandEyes, reviews critical outages in 2020 and considers network design tips for Internet and remote work. Our guests from ThousandEyes are Angelique Medina and Archana Kesavan.

The post Heavy Networking 543: What 2020 Internet Outages Teach Us About Managing Remote Work (Sponsored) appeared first on Packet Pushers.

When Will You Need Wi-Fi 6E at Home?

The pandemic has really done a number on most of our office environments. For some, we went from being in a corporate enterprise with desks and coffee makers to being at home with a slightly different desk and perhaps a slightly better coffee maker. However, one thing that didn’t improve was our home network.

For the most part, the home network has been operating on a scale radically different from those of the average corporate environment. Taking away the discrepancies in Internet speed for a moment you would have a hard time arguing that most home wireless gear is as good or better than the equivalent enterprise solution. Most of us end up buying our equipment from the local big box store and are likely shopping as much on price as we are on features. As long as it supports our phones, gaming consoles, and the streaming box we picked up we’re happy. We don’t need QoS or rogue detection.

However, we now live in a world where the enterprise is our home. We live at work as much as we work where we live. Extended hours means we typically work past 5:00 pm or start earlier than 8:00 or Continue reading

Tech Bytes: Providing Secure Work-From-Anywhere With Zscaler (Sponsored)

For many organizations it’s now incumbent on IT to provide a seamless, secure experience for end users whether they’re working from home, in the office, or anywhere. On today's Tech Bytes podcast, sponsored today by Zscaler, we examine how to deliver a safe, high-performance remote access experience.

The post Tech Bytes: Providing Secure Work-From-Anywhere With Zscaler (Sponsored) appeared first on Packet Pushers.

How to Optimize IT Costs

You do not need to sacrifice quality for a cheaper solution to save your IT department’s costs. Sometimes an optimization of infrastructure management will be sufficient. Alexander Grishin, ISPsystem’s Product Manager for VMmanager virtualization platform, shares his views on the topic.

Hand and Physical Therapy Tips for Arthritis

Millions of people all over the world suffer from arthritis. In the present day, it is one of the most common medical conditions in the world. There is a common misconception about arthritis that it happens due to old age and that most people suffering from it are old. Where old age can affect your bones and joints health, people from all age groups can suffer from arthritis.

What Exactly Is Arthritis?

It is a medical condition that causes pain and inflammation in your joints. It can happen on joints on any part of the body. It can cause severe pain and affect your physical functioning. People who have arthritis in their hand joints have to tolerate excruciating pain. Our hands are something we have to use on a daily basis, and when you have arthritis in your hand joints then it can have severe consequences. You will not be able to perform any task if your hands aren’t at 100% health.

How Can Physical Therapy Be Used to Treat Arthritis?

There are many ways that arthritis can be treated. Doctors would always suggest medication and then ask you to focus on physical therapy as well. Physical therapy is as Continue reading

PCAP Or It Didn’t Happen

The packet capture is the one tool in the network engineer’s pocket that doesn’t lie. Or does it? In this episode we talk about the fundamental components of packet captures and how to use them effectively in troubleshooting and managing your network.

It’s also time for the NetDevOps survey. Whether you’re someone who utilizes automation as a fundamental tool of your network or someone who is just thinking about starting an automation journey, your input is needed. Please take a few minutes to fill out the NetDevOps Survey.

 

Network Collective thanks NVIDIA for sponsoring today’s episode. NVIDIA is positioned as the leader in open networking and provides end-to-end solutions at all layers of the software and hardware stack. You can experience NVIDIA Cumulus in the Cloud for free!  Head on over to:

https://cumulusnetworks.com/automationpod

to see what a modern open network operating system looks like for yourself.

Jasper Bongertz
Guest
Tom Peterson
Guest
Tony Efantis
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post PCAP Or It Didn’t Happen appeared first on Network Collective.

Pondering That Rumored $30 Billion AMD Acquisition Of Xilinx

You can have a strategy, but you can’t buy one.

Nothing illustrates this principle more than the networking buying binges that both Intel and AMD went on nearly a decade ago, which did not really amount to much in the end but which made some sort of sense in the middle of it all happening.

Pondering That Rumored $30 Billion AMD Acquisition Of Xilinx was written by Timothy Prickett Morgan at The Next Platform.

Exploring WebAssembly AI Services on Cloudflare Workers

Exploring WebAssembly AI Services on Cloudflare Workers

This is a guest post by Videet Parekh, Abelardo Lopez-Lagunas, Sek Chai at Latent AI.

Edge networks present a significant opportunity for Artificial Intelligence (AI) performance and applicability. AI technologies already make it possible to run compelling applications like object and voice recognition, navigation, and recommendations.

AI at the edge presents a host of benefits. One is scalability—it is simply impractical to send all data to a centralized cloud. In fact, one study has predicted a global scope of 90 zettabytes generated by billions of IoT devices by 2025. Another is privacy—many users are reluctant to move their personal data to the cloud, whereas data processed at the edge are more ephemeral.

When AI services are distributed away from centralized data centers and closer to the service edge, it becomes possible to enhance the overall application speed without moving data unnecessarily.  However, there are still challenges to make AI from the deep-cloud run efficiently on edge hardware. Here, we use the term deep-cloud to refer to highly centralized, massively-sized data centers. Deploying edge AI services can be hard because AI is both computational and memory bandwidth intensive. We need to tune the AI models so the computational latency and bandwidth Continue reading

Faucet Deep Dive on Software Gone Wild

This podcast introduction was written by Nick Buraglio, the host of today’s podcast.

In the original days of this podcast, there were heavy, deep discussions about this new protocol called “OpenFlow”. Like many of our most creative innovations in the IT field, OpenFlow came from an academic research project that aimed to change the way that we as operators managed, configured, and even thought about networking fundamentals.

For the most part, this project did what it intended, but once the marketing machine realized the flexibility of the technology and its potential to completely change the way we think about vendors, networks, provisioning, and management of networking, they were off to the races.

We all know what happened next.

Faucet Deep Dive on Software Gone Wild

This podcast introduction was written by Nick Buraglio, the host of today’s podcast.

In the original days of this podcast, there were heavy, deep discussions about this new protocol called “OpenFlow”. Like many of our most creative innovations in the IT field, OpenFlow came from an academic research project that aimed to change the way that we as operators managed, configured, and even thought about networking fundamentals.

For the most part, this project did what it intended, but once the marketing machine realized the flexibility of the technology and its potential to completely change the way we think about vendors, networks, provisioning, and management of networking, they were off to the races.

We all know what happened next.

Factcheck: Regeneron’s use of embryonic stem cells

This week, Trump's opponents misunderstood a Regeneron press release to conclude that the REG-COV2 treatment (which may have saved his life) was created from stem cells. When that was proven false, his opponents nonetheless deliberately misinterpreted events to conclude there was still an ethical paradox. I've read the scientific papers and it seems like this is an issue that can be understood with basic high-school science, so I thought I'd write up a detailed discussion.

The short answer is this:

  • The drug is not manufactured in any way from human embryonic tissues.
  • The drug was tested using fetal/embryonic cells, but ones almost 50 years old, not new ones.
  • Republicans want to stop using new embryos, the ethical issue here is the continued use of old embryos, which Republican have consistently agreed to.
  • Yes, the drug is still tainted by the "embryonic stem cell" issue -- just not in any of the ways that people claim it is, and not in a way that makes Republicans inconsistent.
  • Almost all medical advances of the last few decades are similarly tainted.
Now let's do the long, complicated answer. This starts with a discussion of the science of Regeneron's REG-COV2 treatment.

A well-known Continue reading

Closing security gaps and eliminating blind spots in the data center: a software-based approach to securing east-west traffic

It’s no secret that traditional firewalls are illsuited to securing east-west traffic. They’re static, inflexible, and require hair-pinning traffic around the data center. Traditional firewalls have no understanding of application context, resulting in rigid, static policies, and they don’t scaleso they’re unable to handle the massive workloads that make up modern data center traffic. As a result, many enterprises are forced to selectively secure workloads in the data center, creating gaps and blind spots in an organization’s security posture. 

 

A software-based approach to securing east-west traffic changes the dynamic. Instead of hair-pinning traffic, VMware NSX Service-defined Firewall (SDFW) applies security policies to all workloads inside the data center, regardless of the underlying infrastructure. This provides deep context into every single workload 

 

Anyone interested in learning how the Service-defined Firewall can help them implement microsegmentation and network segmentationreplace legacy physical hardwareor meet growing compliance needs and stop the lateral spread of threats, should check out the following sessions: 

 

Creating Virtual Security Zones with NSX Firewall Continue reading

FCC outs telecoms with banned Chinese 5G hardware

The Federal Communications Commission has identified 51 U.S. mobile carriers that still have Huawei and ZTE 5G gear in their networks despite a government policy that bans that equipment from US service-provider networks. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Verizon, CenturyLink (which plans to rebrand as Lumen), and Cincinnati Bell are among the most prominent names on the list, and most of the others are small regional providersTo read this article in full, please click here

Meet compliance requirements cost-efficiently by implementing East-West security at scale 

Compliance is more than a necessary evil. Sure, its complex, expensive, and largely driven by manual processes, but it’s also a business enabler. Without the ability to prove compliance, you wouldn’t be able to sell your products in certain markets or industries. But meeting compliance requirements can’t be cost-prohibitive: if the barriers are too high, it may not make business sense to target certain markets.  

 

The goal, of course, is to meet and prove compliance requirements in the data center in a simple, cost-effective way. With the intent to provide safety and maintain the privacy of customers, new government and industry regulations are becoming more robust, and many require organizations to implement East-West security through micro-segmentation or network segmentation inside the data center. Of course, this is easier said than done. Bandwidth and latency issues caused by hairpinning traffic between physical appliances inhibit network segmentation and micro-segmentation at scale.  

 

VMware NSX applies a software-based approach to firewalling that delivers the simplicity and scalability necessary to secure East-West traffic. It does this with no blind spots or gaps in coverage— Continue reading