From the Internet’s earliest days, the tension between a global communication network and local geography-based laws has been obvious. One scenario is that every jurisdiction’s local laws apply to the Internet globally, meaning that the country (or sub-national regulator) with the most restrictive law for any content category sets the global standard for that content.…
Profiling of services is a useful method to find optimizations to improve service performance; the ODP (“On-Demand Profiling”) framework has helped identify many performance problems at LinkedIn. However, as these analyses and subsequent optimizations are done for individual services, common performance problems (patterns) are often rediscovered. This results in wasted effort for teams and doesn’t…
It has been almost a year now since Gen-Z launched, and the consortium is growing and the specifications are being cooked up by the techies. The core Gen-Z spec was published in December 2016 and updated in July to a 0.9 level; it is expected to be at the 1.0 level before the end of…
Network Address Translation (NAT) has often been described as an unfortunate aberration in the evolution of the Internet, and one that will be expunged with the completion of the transition to IPv6. I think that this view, which appears to form part of today’s conventional wisdom about the Internet, unnecessarily vilifies NATs. In my opinion,…
here’s lots of security advice in the press: keep your systems patched, use a password manager, don’t click on links in email, etc. But there’s one thing these adages omit: an attacker who is targeting you, rather than whoever falls for the phishing email, won’t be stopped by one defensive measure. Rather, they’ll go after…
Many of the presenters, like Truman Boyes of Bloomberg and Peyton Maynard-Koran of EA, discussed the idea of building boxes from existing components instead of buying them from established networking vendors like Cisco and Arista. The argument does hold some valid ideas. If you can get your hardware from someone like EdgeCore or Accton and…
With the growth in cloud computing, businesses rely on the network to access information about operational assets being stored away from the local server. Decoupling information assets from other operational assets could result in poor operational resiliency if the cloud is compromised. Therefore, to keep the operational resiliency unaffected, it is essential to bolster information…
And while such backup solutions solved the traditional data center backup to tape, and eventually disk, really well, the solution does not readily translate into a distributed multicloud solution. That’s where a data protection solution requires cloud-scale, multiprovider integration with clear separation of control, data movement and multitier data storage. The separation not only provides…
The impact of a company’s culture is reflected in a company’s ability to achieve their goals and productivity levels, and in their employees’ satisfaction. The company culture can make or break a business. Yet, company culture is the one thing that many aspiring programmers overlook in their job search. Unfortunately, they usually find out after…
If you look at the dictionary’s definition of containers, it would be ‘an object for holding and transporting something’. In the same way, Linux containers (mostly abbreviated as LXC in technical language) help in providing virtualisation to the Linux operating system. Tough to comprehend? Wait! Let’s suppose that your enterprise requires to move your code…