Daily Roundup: Google Rolls Out Enterprise BeyondCorp

Google brought BeyondCorp zero-trust security to the masses; Alibaba injected $28B into the cloud;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

As networks grow, web-scale automation is the only way to keep up

Networks just keep growing, don’t they? They’ve evolved from a few machines on a LAN to the introduction of Wi-Fi—and with the Internet of Things (IoT), we’ve now got a whole new class of devices. Throw in the rise of smartphones and tablets, cloud and edge computing, and network management starts to get a little unwieldy. Managing a network with 300 devices manually might be possible—300,000 devices, not so much.

What is web-scale automation?

Network automation has been around awhile now, in various names from various vendors, using a number of proprietary protocols. The key word being “proprietary.” Many traditional network vendors design a well-functioning network automation system, but participate in vendor lock-in by ensuring that the associated automation stack, and its requisite protocols, only run on their hardware.

Web-scale automation is different. It relies on open, extendable standards like HTTPS, JSON, and netconf, among an ever-increasing number of systems and solutions. With web-scale automation in your organization, network management can over time become a background function; something that only notifies you in exceptional circumstances.

This does not, in any way, reduce the need for those who know networks to be employed at your organization—it simply reduces the amount Continue reading

Tech Bytes: Network Verification – Smarter Network Ops With Forward Networks (Sponsored)

Forward Networks builds a real-time software model of your data center network that you can use to verify intent, test changes, and speed troubleshooting. Forward is sponsoring this Tech Bytes episode. Our guest is Nikhil Handigol, co-founder of Forward, and we’re going to talk about the state of network verification and where the technology is heading.

Tech Bytes: Network Verification – Smarter Network Ops With Forward Networks (Sponsored)

Forward Networks builds a real-time software model of your data center network that you can use to verify intent, test changes, and speed troubleshooting. Forward is sponsoring this Tech Bytes episode. Our guest is Nikhil Handigol, co-founder of Forward, and we’re going to talk about the state of network verification and where the technology is heading.

The post Tech Bytes: Network Verification – Smarter Network Ops With Forward Networks (Sponsored) appeared first on Packet Pushers.

Rackspace Readies $10B IPO, Report Says

The move would mean Rackspace’s return to the public market. The managed services company went...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Ericsson 5G Gear Powers Alaska’s GCI Network

Regional operator GCI claims it has invested “tens of millions of dollars” in the Anchorage...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Alibaba Injects $28B Into Cloud

The China-based cloud giant linked the three-year investment plan to bolster support for services...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Brings BeyondCorp Zero-Trust Security to the Masses

Google had originally planned to release the product later this year. But then the COVID-19...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Advanced Dockerfiles: Faster Builds and Smaller Images Using BuildKit and Multistage Builds

Multistage builds feature in Dockerfiles enables you to create smaller container images with better caching and smaller security footprint. In this blog post, I’ll show some more advanced patterns that go beyond copying files between a build and a runtime stage, allowing to get most out of the feature. If you are new to multistage builds you probably want to start by reading the usage guide first.

Note on BuildKit

The latest Docker versions come with new opt-in builder backend BuildKit. While all the patterns here work with the older builder as well, many of them run much more efficiently when BuildKit backend is enabled. For example, BuildKit efficiently skips unused stages and builds stages concurrently when possible. I’ve marked these cases under the individual examples. If you use these patterns, enabling BuildKit is strongly recommended. All other BuildKit based builders support these patterns as well.

• • •

Inheriting from a stage

Multistage builds added a couple of new syntax concepts. First of all, you can name a stage that starts with a FROM command with AS stagename and use --from=stagename option in a COPY command to copy files from that stage. In fact, FROM command and --from flag Continue reading

Network Break 280: Nvidia Advances Mellanox Acquisition; Startup Alkira Tackles Multi-Cloud Networking

Take a Network Break! We discuss Nvidia clearing a major hurdle to its Mellanox acquisition, GitHub changes its pricing, the startup Alkira tackles multi-cloud networking, and more tech news analysis. Our guest commentator is Stephen Foskett, founder of Tech Field Day and GestaltIT.

The post Network Break 280: Nvidia Advances Mellanox Acquisition; Startup Alkira Tackles Multi-Cloud Networking appeared first on Packet Pushers.

Will COVID-19 Kill the Data Center?

COVID-19 may kill the data center, or at the very least forever change storage as we know it, says...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Week in Internet News: The Digital Divide During a Pandemic

The great divide: The continuing digital divide in the U.S. is hurting people as they try to shop, attend school, and work during the coronavirus pandemic lockdown, The Guardian says. Broadband Now estimates that 42 million U.S. residents don’t have Internet access, and M-Lab says that the majority of residents in 62 percent of the counties across the U.S. don’t have adequate broadband speeds.

The struggle is real: Meanwhile, students in rural Alabama are struggling to complete their schoolwork because a lack of Internet access, according to an Associated Press story at Enewscourier.com. In nine Alabama counties, less than 30 percent of the population has access. “We don’t want to leave 20 to 30 percent of our population behind just because of where they live,” said John Heard, school superintendent in Perry County.

The good news: Even with many people across the world working from home or attending school from home, the Internet is holding up, ZDNet reports. Fastly, an edge cloud computing provider, found that in the hard-hit New York and New Jersey area, Internet traffic jumped by nearly 45 percent in March, but download speeds decreased by less than 6 percent. In California, traffic Continue reading

Why choose microsegmentation? 3 enterprises explain.

It's a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Here are their stories.Distributed firewalls via VMware NSX Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. "Above all, we protect our databases," he says. "We do anything and everything to keep uninvited guests out of our databases."To read this article in full, please click here(Insider Story)

Why 3 enterprises chose microsegmentation

It's a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Here are their stories.Distributed firewalls via VMware NSX Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. "Above all, we protect our databases," he says. "We do anything and everything to keep uninvited guests out of our databases."To read this article in full, please click here

HS. Part 3. Working out graphs capabilities for the network modelling.

Hello my friend,

There was quite a considerable amount of the feedbacks on the previous post about the data centre network visualisation with graphs. Originally we planned to cover the topology generation today. However, we changed the plan to improve the math model of our graph to make it more flexible and useful from modelling perspective.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Network automation training – boost your career

To be able to understand and, more important, to create such a solutions, you need to have a holistic knowledge about the network automation. Come to our network automation training to get this knowledge and skills.

At this training we teach you all the necessary concepts such as YANG data modelling, working with JSON/YAML/XML data formats, Linux administration basics, programming in Bash/Ansible/Python for multiple network operation systems including Cisco IOS XR, Nokia SR OS, Arista EOS and Cumulus Linux. All the most useful things such as NETCONF, REST API, OpenConfig and many Continue reading

March 2020 on ipSpace.net

We started March 2020 with the second part of Cisco SD-WAN webinar by David Peñaloza Seijas, continued with Upcoming Internet Challenges update, and concluded with 400 GE presentation by Lukas Krattiger and Mark Nowell.

You can access all these webinars with Standard or Expert ipSpace.net subscription. The Cisco SD-WAN presentation is already available with free ipSpace.net subscription, which will also include the edited 400 GE videos once we get them back from our video editor.

Enterprises opt for different microsegmentation architectures

It's a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Here are their stories.Distributed firewalls via VMware NSX Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. "Above all, we protect our databases," he says. "We do anything and everything to keep uninvited guests out of our databases."To read this article in full, please click here

Kubernetes DR

Recently, we had a customer issue where a production GKE cluster was deleted accidentally which caused some outage till the cluster recovery was completed. Recovering the cluster was not straightforward as the customer did not have any automated backup/restore mechanism and also the presence of stateful workloads complicated this further. I started looking at some … Continue reading Kubernetes DR