
Bill Koss reflects on state of networking
The post Closing One Door and Opening Another | SIWDT appeared first on EtherealMind.
In part I of this series, we took a look at creating Docker images and running Containers for Node.js applications. We also took a look at setting up a database in a container and how volumes and network play a part in setting up your local development environment.
In this article we’ll take a look at creating and running a development image where we can compile, add modules and debug our application all inside of a container. This helps speed up the developer setup time when moving to a new application or project.
We’ll also take a quick look at using Docker Compose to help streamline the processes of setting up and running a full microservices application locally on your development machine.
The first thing we want to do is download the code to our local development machine. Let’s do this using the following git command:
git clone [email protected]:pmckeetx/memphis.git
Now that we have the code local, let’s take a look at the project structure. Open the code in your favorite IDE and expand the root level directories. You’ll see the following file structure.
├── docker-compose.yml
├── notes-service
│ ├── config
│ Continue reading
In this episode of the Hedge, Scott Burleigh joins Alvaro Retana and Russ White to discuss the Bundle Protocol, which is designed to support delay tolerant data delivery over intermittently available or “stressed” networks. Examples include interstellar communication, email transmission over networks where access points move around (carrying data with them), etc. You can learn more about delay tolerant networking here, and read the most recent draft specification here.
What's really going on in the cloud? ThousandEyes, our sponsor for this episode, has just released its inaugural Internet Performance Report, which tracks the performance and availability of ISPs, public clouds, CDNs, and DNS across multiple geographical regions. The report measures performance over time and also looks at the current impact of COVID-19 on Internet usage. Angelique Medina, Director, Product Marketing at ThousandEyes, is our guide.
The post Day Two Cloud 060: Charting Global Internet Performance With ThousandEyes (Sponsored) appeared first on Packet Pushers.
The post Tier 1 Carriers Performance Report: July, 2020 appeared first on Noction.


In the first quarter of 2020, within a matter of weeks, our way of life shifted. We’ve become reliant on online services more than ever. Employees that can are working from home, students of all ages and grades are taking classes online, and we’ve redefined what it means to stay connected. The more the public is dependent on staying connected, the larger the potential reward for attackers to cause chaos and disrupt our way of life. It is therefore no surprise that in Q1 2020 (January 1, 2020 to March 31, 2020) we reported an increase in the number of attacks—especially after various government authority mandates to stay indoors—shelter-in-place went into effect in the second half of March.
In Q2 2020 (April 1, 2020 to June 30, 2020), this trend of increasing DDoS attacks continued and even accelerated:
A while ago someone pointed me to an interesting talk explaining why 99th percentile represents a pretty good approximation of user-experienced latency on a typical web page (way longer version: Understanding Latency and Application Responsiveness, also How I Learned to Stop Worrying and Love Misery)
If you prefer reading instead of watching videos, there’s also everything you know about latency is wrong.
It takes money to make money, and if you want to break into the switch ASIC business in the datacenter, even if you are a low-cost designer of such chips, you had better have some rich friends to help the business take off. …
Switch ASIC Thoroughbred Sprouts Wings To Attain Unicorn Status was written by Timothy Prickett Morgan at The Next Platform.
To date, our blog series on securing physical servers with NSX Data Center has covered the use of bare metal agents installed in a physical server. In this scenario, NSX bare metal agents provide management and enforcement of security policy for the physical server. For a quick recap of how NSX Data Center secures physical server traffic, please review our first and second blogs in this multi-part series. In this article, we will discuss the use of one of the NSX-T Gateway services of an NSX Edge Node. Specifically, the NSX-T Gateway Firewall secures physical servers.
The NSX-T Edge is a feature-rich L3-L7 gateway. A brief review of some NSX-T Edge services:
Datacenters have evolved from physical servers, to virtualized systems, and now to composable infrastructure where resources such as storage and persistent memory are disaggregated from the server. …
Datacenter Is The New Unit Of Compute, Open Networking Is How To Automate It was written by Timothy Prickett Morgan at The Next Platform.
Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Cast Box and Sticher!
Click here for our previous episode.
In this episode, Kernel of Truth host Roopa Prabhu is joined by Barak Gafni. The two of them chat about the evolution of hardware telemetry and its software interfaces as well as catch up some of the work on IOAM Barak’s been involved with. We hope you enjoy this episode and don’t forget to also check out the links below with resources referenced in the podcast.
Guest Bios
Roopa Prabhu: Roopa is a Linux Architect at NVIDIA, formally Cumulus Networks. She and her team work on all things kernel networking and Linux system infrastructure areas. Her primary focus areas in the Linux kernel are Linux bridge, Netlink, VxLAN, Lightweight tunnels. She is currently focused on building Linux kernel dataplane for E-VPN. She loves working with the Linux kernel networking and debian communities. Her past experience includes Linux clusters, ethernet drivers and Linux KVM virtualization platforms. She has a BS and MS in Computer Science. You can find her on Twitter at @__roopa.
Barak Gafni: Barak is a Staff Architect at NVIDIA, formally Mellanox Technologies, focusing on enabling Continue reading
GRE was the first tunneling protocol ever designed and deployed—and although it largely been overtaken by VXLAN and other tunnel protocols, it is still in widespread use today. For this episode of the History of Networking, Stan Hanks, the inventor of GRE—and hence the inventor of the concept of tunneling in packet switched networks—joins us to describe how and why GRE tunneling was invented.

What are the challenges with applications supporting IPv6? What do people, particularly those working in enterprises, need to know about how servers and applications work with IPv6? What is the Internet Society’s Open Standards Everywhere project doing to help? How can people get more involved?
To answer all these questions and more, I recently joined Scott Hogg and Tom Coffeen on their IPv6 Buzz Podcast episode 53. You can listen here:
It was a very enjoyable conversation! Thanks to Scott and Tom for having me on their show. I also want to thank Ed Horley, who first contacted me about joining the show but with schedule conflicts was not able to join the recording. I would also encourage you to listen to other IPv6 Buzz episodes to learn more about IPv6.
If you would like to help in the work to get open standards deployed everywhere, please:
The post IPv6 Buzz Podcast Dives into Open Standards Everywhere appeared first on Internet Society.

Office Hours for mid-August.
The post Virtual Open Office Hours – Mid-August 2020 appeared first on EtherealMind.