Cumulus Streamlines Deployments, Maintenance in Latest Release
With NetQ 3.0, Cumulus adds lifecycle management capabilities to make it easier to roll out updates...
With NetQ 3.0, Cumulus adds lifecycle management capabilities to make it easier to roll out updates...
With most of the world on lockdown, children are likely spending more time than ever online. Between virtual classrooms and keeping up with friends on social media, many kids are depending on the Internet to maintain a semblance of normal life amidst the global health crisis.
While parents may worry about how this might affect their children’s well-being, experts have warned that the surge in screen time could also expose kids to safety risks online more often.
In Asia-Pacific, a recent UNICEF report found that 32% of children between 10 to 17 years old in Bangladesh have faced cyberbullying, violence, and harassment online. Meanwhile, a McAfee study in India found that 70% of youngsters have posted their personal details on the Internet, making them an easy target for cybercriminals.
Earlier this month, the Internet Society ran a short webinar, Kids, the Internet and COVID-19, to show parents how they can protect their kids’ privacy and security online through encryption.
Encryption is a way of ‘scrambling’ information to make it unreadable to malicious actors who might want to access it, and works much like the codes that we used as children to send secret messages to each other – but better. Encryption protects our emails, our Continue reading
For all the talk of cloud computing for the past decade and a half, for all the growth that the hyperscale public cloud providers like Amazon Web Services, Microsoft Azure and Google Cloud have undergone in recent years, these are still the early days of the cloud. …
OpenShift, Kubernetes, And The Hybrid Cloud was written by Jeffrey Burt at The Next Platform.
Network operations is all about keeping the network running smoothly and without problems. It includes monitoring the network for performance problems and faults, as well as fixing problems before they affect end users, or at least in the timeliest manner possible. Managing network assets correctly is critical to avoiding application-impacting network outages, performance degradation and security incidents.
However, network operators often struggle with operational challenges such as network disruptions caused by maintenance and configuration changes. Furthermore, business networks are often fairly large and complex, which means the set of tasks a network administrator will need to perform can quickly overwhelm manual efforts. This requires a shift, not only to modern networking, but also to modern operational tools as well.
To help solve these issues, Cumulus Networks has added new lifecycle management (LCM) capabilities to Cumulus NetQ 3.0, offering a simple GUI-driven workflow for provisioning, operating, maintaining and retiring network switches running Cumulus Linux.
With the addition of full lifecycle management functionality, NetQ 3.0 now combines the ability to easily upgrade, configure and deploy network elements with a full suite of operations capabilities, such as visibility, Continue reading


It’s well known that global companies can face challenges doing business in and out of China due to the country’s unique rules, regulations, and norms, not to mention recent political and trade complications. Less well known is that China’s logistical and technical network infrastructure is also quite different from the rest of the world’s. With global Internet traffic up 30% over the past month due to the pandemic, these logistical and technical hurdles are increasing the burden for global businesses at exactly the wrong time. It’s now not unusual for someone based in China to have to wait extended periods and often be unable to access applications hosted elsewhere, or vice-versa, due to the lower performance of international Internet traffic to and from China. This affects global companies with customers, suppliers or employees in China, and Chinese companies who are trying to reach global users.
Our mission is to help build a better Internet, for everyone, everywhere. So, today we’re excited to announce a significant strategic partnership with JD Cloud & AI, the cloud and intelligent technology business unit of Chinese Internet giant JD.com. Through this partnership, we’ll be adding 150 data centers in mainland China, an increase in Continue reading
Cisco recently announced that they are releasing CML-P, which is version two of the product formerly known as VIRL. First of all, I’ve seen the product demoed and helped with feedback on it, it looks stunning! The architecture looks great, it’s fully leveraging APIs and it’s an entirely different beast than VIRL. This is a great product and I want to see it succeed. Unfortunately, this product is never going to be as successful as it could be. Why?
CML-P, where P stands for Private, supports a maximum of 20 nodes. This is supposed to be a differentiator to the the -E version, which is for enterprises that wish to run this product at larger scale, including support. First of all, I don’t agree that a node limit is the proper way to differentiate -P from -E. That can be done through support, training and other means.
CML-P’s competition is going to be GNS3 and EVE-NG. These are freely available, but also offer paid versions with a more advanced feature set. There is no node limit with these products. You can run as much as your server can handle. If CML-P is going to compete Continue reading
Being stuck at home like most everyone else we’re continuing the increased pace of content production in May 2020:
Untangle added predictive routing; AWS gave AI workloads a human touch; and a new Aryaka survey...
The deal for Nvidia to acquire Mellanox, which was announced last March for $6.9 …
Nvidia Plus Mellanox: Talking Datacenter Architecture With Jensen Huang was written by Timothy Prickett Morgan at The Next Platform.
The new Azure confidential computing service allows companies to process data in hardware-based...
The managed service is designed to make it easier for users of Amazon's various AI capabilities to...
You know nothing about DynamoDB. At least that’s what I realized the first time I heard Rick Houlihan give his now infamous talk at AWS re:Invent 2018 on Amazon DynamoDB Deep Dive: Advanced Design Patterns for DynamoDB.
In that talk Rick revealed for the first time the inner arcana of single-table design. Minds were blown. Weaknesses were revealed. Futures were changed.
As a mere novice in the ways of DynamoDB I realized there were many levels of understanding needed before one could become a true AWS Data Hero. For that we need a guide.
Our guide on the Hero’s Journey that is mastering DynamoDB is a wise young wizard named Alex DeBrie. Alex wrote what you might consider to be the Gnostic Gospels of DynamoDB: The DynamoDB Book.

You will know something after reading this book
But it's more than just a book. You can’t buy it on Amazon. Instead, Alex uses Gumroad to offer packages at three different price points along with a team option. Each level provides additional content:
In the run up to the ITU World Telecommunication Standardization Assembly (WTSA-20) later this year there has been some discussion about a proposal called the “New IP.” It is positioned as a top-down architecture to solve a number of use cases that are currently been developed in the ITU-T’s Future Network 2030 Focus Group.
The Internet Society is carefully following the developments in the run-up to WTSA-20. We are trying to understand if and how the New IP works with the Internet as we know it, if it actually solves problems that cannot be solved in the Internet, and, if the ITU-T is developing standards, where other standards development organizations (SDOs) have change control.
In order to get a sense of the environment we commissioned a discussion paper, “An analysis of the ‘New IP’ proposal to the ITU-T.” The paper helps inform us and the broader community whilst the public debate around these proposals shapes up. It also aims to inform and shape the discussion from the Internet’s Society’s perspective. Eventually the debate around it will inform our position and the potential further evolution of the discussion paper itself.
We would like to thank Chip Sharp for authoring the paper, with input Continue reading
The Dockerfile is the starting point for creating a Docker image. The file format provides a well-defined set of directives that allow you to copy files or folders, run commands, set environment variables, and do other tasks required to create a container image. It’s really important to craft your Dockerfile well to keep the resulting image secure, small, quick to build, and quick to update.
In this post, we’ll see how to write good Dockerfiles to speed up your development flow, ensure build reproducibility and that produce images that can be confidently deployed to production.
Note: for this blog post we’ll base our Dockerfile examples on the react-java-mysql sample from the awesome-compose repository.
As developers, we want to match our development environment to the target production context as closely as possible to ensure that what we build will work when deployed.
We also want to be able to develop quickly which means we want builds to be fast and for us to be able to use developer tools like debuggers. Containers are a great way to codify our development environment but we need to define our Dockerfile correctly to be able to interact quickly with our containers.