Daily Roundup: Cisco, Google SD-WAN Soars
Cisco, Google drove SD-WAN to the cloud; Commvault sued competitors Cohesity and Rubrik; and IBM...
Cisco, Google drove SD-WAN to the cloud; Commvault sued competitors Cohesity and Rubrik; and IBM...
When IBM announced that it was acquiring Red Hat for $34 billion eighteen months ago, one of the things we said that Big Blue needed most and would get from taking over – but not messing with – the world’s largest commercial open source software company was a coherent story that it could tell to its customers about how IBM, which more than any other company helped define data processing, was still relevant to the future. …
The Next IBM Platform, Revisited was written by Timothy Prickett Morgan at The Next Platform.
The vendor's 2.0 update includes testing and infrastructure provisioning capabilities that its CEO...
Designing and maintaining networks is hard. When deploying Kubernetes in your on-prem data center, you will need to answer a basic question: Should it be an overlay network on top of an existing network, or should it be part of an existing network? The Networking options table provides guidelines to choose the right type of networking based on various factors. If you decide to use native peering (pre-dominant option for on-prem), you will have to configure the network to ensure availability in the event of network outage (ex. Cable disconnected, TOR switch failure etc.). We cover a typical L3 highly-available network design in this post.
A cluster spans multiple racks. In an L3 deployment, these racks have different CIDR ranges. So the nodes in different racks should be able to talk to each other. Referring to the diagram below, that traffic goes through the network fabric. If you want to build out such a lab for your own learning, here is the example.
If you have a leaf-spine fabric with a single TOR (top-of-rack, or leaf switch), then that TOR becomes a point of failure for the entire rack. If all the master nodes are on the same Continue reading
Long-time executive and short-time co-CEO Jennifer Morgan is set to leave the company on April 30....
IBM CEO Arvind Krishna told financial analysts that “in the last few weeks we faced a shift in...
The Payment Flexibility Program offers customers 0% interest financing with no down payment and up...
“The unauthorized use of our patented technology by Rubrik and Cohesity forces us to compete...
Today's Full Stack Journey examines the Talos open source project, which is aimed at building a fit-for-purpose OS designed expressly for running Kubernetes. My guests are Tim Gerla and Andrew Rynhard of Talos Systems. We discuss the goals of this project, the problems they aim to solve, and more.
The post Full Stack Journey 041: Talos Builds An Open-Source OS For Kubernetes appeared first on Packet Pushers.
I earned about 5% by not working in an office
The post Thought for My Day: Personal Profit by Not Travelling to An Office appeared first on EtherealMind.
Like many who are able, I am working remotely and in this post, I describe some of the ways to deploy Cloudflare Gateway directly from your home. Gateway’s DNS filtering protects networks from malware, phishing, ransomware and other security threats. It’s not only for corporate environments - it can be deployed on your browser or laptop to protect your computer or your home WiFi. Below you will learn how to deploy Gateway, including, but not limited to, DNS over HTTPS (DoH) using a Raspberry Pi, Pi-hole and DNSCrypt.
We recently launched Cloudflare Gateway and shortly thereafter, offered it for free until at least September to any company in need. Cloudflare leadership asked the global Solutions Engineering (SE) team, amongst others, to assist with the incoming onboarding calls. As an SE at Cloudflare, our role is to learn new products, such as Gateway, to educate, and to ensure the success of our prospects and customers. We talk to our customers daily, understand the challenges they face and consult on best practices. We were ready to help!
One way we stay on top of all the services that Cloudflare provides, is by using them ourselves. In this blog, I'll talk about Continue reading
Two weeks ago I started with a seemingly simple question:
If a BGP speaker R is advertising a prefix A with next hop N, how does the network know that N is actually alive and can be used to reach A?
… and answered it for the case of directly-connected BGP neighbors (TL&DR: Hope for the best).
Jeff Tantsura provided an EVPN perspective, starting with “the common non-arguable logic is reachability != functionality".
Now let’s see what happens when we add route reflectors to the mix. Here’s a simple scenario:
Most readers are already familiar with VMware NSX as a natural platform for intrinsic security in the data center. They understand that NSX’s service-defined firewall is enabling network and security operators to use a distributed software-based solution to replace centralized hardware-based deployments.
The intrusion detection and prevention system (IDS/IPS) functionality released with NSX-T 3.0 enhances the security capabilities of the service-defined firewall, enabling operators to address several additional use cases.
In the coming weeks and months, particularly as we are entering the financial reporting season for the first quarter of 2020, we are naturally going to be looking for any good news we can find. …
The Big Will Get Bigger Because We Need Them To was written by Timothy Prickett Morgan at The Next Platform.