SDxCentral’s Top 10 Articles — April 2020
VMware claimed SD-WAN dominance over Cisco; Cisco SD-WAN struck back against VMware; and Nokia...
VMware claimed SD-WAN dominance over Cisco; Cisco SD-WAN struck back against VMware; and Nokia...
SDxCentral Weekly Wrap for May 1, 2020: The ongoing COVID-19 outbreak is stressing networks;...
This opinion piece was originally published in SC Magazine.
With social distancing the norm, we’re spending more time on the Internet doing more important things than ever – eg, working, learning, banking, trading, shopping, seeing the doctor and having family time – as well as streaming, gaming and interacting with our connected speakers.
Shouldn’t we be certain, especially now, that no one is eavesdropping, stealing or modifying our data?
Encryption is the primary means of accomplishing that goal. Using encryption, data is scrambled so that only the intended people can see the data. It’s right there under the covers most of the time when you’re on Wi-Fi, Bluetooth, 4G and browsing most websites.
Unfortunately, most online services today still do encryption in a piecemeal manner. Sections along the path are encrypted, but typically there are points along the way where the data is unencrypted and processed in some way before being re-encrypted and sent along.
The good news is that many messaging services – eg, WhatsApp, Telegram and Signal – offer end-to-end encryption, where only the sender and intended recipient can “see” the message. Everyone else along the path – even the company providing the service – can’t see inside. The Continue reading
Recent news about the Internet has mostly been about the great increase in usage as those workers who can have been told to work from home. I've written about this twice recently, first in early March and then last week look at how Internet use has risen to a new normal.
As human behaviour has changed in response to the pandemic, it's left a mark on the charts that network operators look at day in, day out to ensure that their networks are running correctly.
Most Internet traffic has a fairly simple rhythm to it. Here, for example, is daily traffic seen on the Amsterdam Internet Exchange. It's a pattern that's familiar to most network operators. People sleep at night, and there's a peak of usage in the early evening when people get home and perhaps stream a movie, or listen to music or use the web for things they couldn't do during the workday.
But sometimes that rhythm get broken. Recently we've seen the evening peak by joined by morning peaks as well. Here's a graph from the Milan Internet Exchange. There are three peaks: morning, afternoon and evening. These peaks seem to be caused by people working from Continue reading
Hollywood discovering remote meetings is a delight
The post Response: How can Hollywood re-open after coronavirus? Filmmakers react – Los Angeles Times appeared first on EtherealMind.
Packet Pushers co-founders Ethan Banks and Greg Ferro join the 50th episode of IPv6 Buzz to talk about why network engineers haven't prioritized IPv6, and how to change that.
The post IPv6 Buzz 050: How To Get Network Engineers To Prioritize IPv6 appeared first on Packet Pushers.
The vendor's latest update release is looking to entice customers of the legacy "shared-nothing"...
“My advice to companies right now is to really think about what will happen next,” said...
Nokia pinned its a $200M decline on COVID-19; Microsoft Cloud and stock surged; and Infovista...
One of the common themes – and one could say even the main theme – of The Next Platform is that some of technologies developed by the high performance supercomputing centers (usually in conjunction with governments and academia), the hyperscalers, the big cloud builders, and a handful of big and innovative large enterprises eventually get hardened, commercialized, and pushed out into the larger mainstream of information technology. …
Mainstreaming Fast Flash Clusters For Fun And Profit was written by Timothy Prickett Morgan at The Next Platform.
China Mobile donated XGVela, which has also gained support or interest from China Unicom, China...
Meanwhile the company only increased its virtual private network capacity 1.5 times to support all...
Meanwhile, Infoblox teams up with Ciena for universal CPE-based services, and Colt rolls out VoIP...
The company maintains that sales will increase in the second half of the year, but warned that the...
“Build once, deploy anywhere” is really nice on the paper but if you want to use ARM targets to reduce your bill, such as Raspberry Pis and AWS A1 instances, or even keep using your old i386 servers, deploying everywhere can become a tricky problem as you need to build your software for these platforms. To fix this problem, Docker introduced the principle of multi-arch builds and we’ll see how to use this and put it into production.
To be able to use the docker manifest
command, you’ll have to enable the experimental features.
On macOS and Windows, it’s really simple. Open the Preferences > Command Line panel and just enable the experimental features.
On Linux, you’ll have to edit ~/.docker/config.json
and restart the engine.
OK, now we understand why multi-arch images are interesting, but how do we produce them? How do they work?
Each Docker image is represented by a manifest. A manifest is a JSON file containing all the information about a Docker image. This includes references to each of its layers, their corresponding sizes, the hash of the image, its size and also the platform it’s supposed to work on. Continue reading
The cloud and computing giant did admit to a slowdown in business as the quarter came to an end,...