Engineers hardly ever think of the control plane as an attack surface — from the new/old wave of centralized controllers (Rule 11!) to the middle term wave of distributed routing protocols, the control plane just hums along in the background without many people thinking about it from a security perspective. That is, until a big […]
Yes, that’s right, we have another new BGP NLRI: BGP-LS. In this post we will be looking at BGP with Link State (LS) extension which is an integral part of the Carrier SDN strategy. We will look at why we need BGP-LS, its internals and its applications. What I won’t cover is things like do we need SDN?, […]
Incumbents and startups alike are rushing into the SD-WAN market. So how much of an opportunity is there? So far, the data points aren’t very good. And maybe they don’t matter anyway.
Startup Rubrik tackles VM backups with an integrated appliance that offers premises and cloud-based storage, and offers deuplication and replication. It can back up to Amazon S3 or OpenStack private clouds.
Active distributed monitoring gathers network and application performance data from multiple locations to give IT better visibility and improve troubleshooting. Find out how NetBeez simplifies distributed monitoring.
Highlights from Network Field Day 10 include the SD-WAN goldrush, the novel concept of quality products, and the performance-boosting DPDK project.
I recently moved from Windows to Linux on my personal laptop and thought I might share my experience. This isn’t directly network related, but hopefully of interest to some portion of the large and diverse PP audience, especially considering recent events in the Microsoft realm. Ignoring that, using Linux ‘at home’ is a great way to learn about […]
When I’m not working (boring right now), reading Everyday Feminism (fascinating*) or spending time with the family (awesome) I’m writing. I’ve three book projects on the go, two of which are taking far too long and rapidly become a chore. The third is the third edition of my F5 iRules book (I’m not shilling – […]
I’m gearing up for a new certification effort, but after eighteen years of progressive experience in IT, a piece of paper or some new initials in my email signature was an extrinsic motivator I didn’t need. Still I found something about the entire process inviting and realized that it was the intrinsic benefits of certification […]
In the Assured Security Model, software-defined infrastructure is assisted by an analytics system with state awareness of dynamic data center components.