Worth Reading: Supply Chain Issues are Here

30 August 2021


As busy as it is now, we are just warming up when looking out at the huge amounts of fiber that might be built as the result of the ARPA grants, aggressive state grant programs, and the possibility of a massive federal infrastructure program.

Worth Reading: A brief history of the RFC format

30 August 2021


IETF documents end up looking quite a bit like those legal documents above. Although it’s 2021, and we’re up in the 9,000s of documents published as RFCs, the IETF still specifies a remarkably simple, textual form of document.

Worth Reading: How Alibaba Architects Around Massive Graph Complexity

26 August 2021


Graph processing at hyperscale has historically been a challenge because of the sheer complexity of algorithms and graph workflows. Alibaba has been tackling this issue via a project called GraphScope and was able to show a nearly 3X performance boost on a trillion-scale graph on its own production workloads.

Worth Reading: Amazon Sharing Your Broadband

26 August 2021


Amazon launched its Sidewalk network in June. This is a local network established between Amazon devices in your home and around your neighborhood.

Worth Reading: Simplicity in the Data Center with Auto-EVPN

25 August 2021


There’s no question that the go-to in modern data center designs is an IP fabric to provide base connectivity, overlaid with EVPN-VXLAN to provide end-to-end networking. Today, IP fabrics are commoditized just like the x86 hosts that are connected to the fabric.

Worth Reading: Running Code

25 August 2021


There was an interesting discussion in a working group session at the recent IETF 111 meeting over a proposal that this working group should require at least two implementations (presumably independently developed implementations) of a working group draft before the working group would consider the document ready for submission to the IESG for progression to publication as an RFC.

Worth Reading: How to secure your Kubernetes control plane and node components

24 August 2021


Since Kubernetes is not immune to potential threats, such as misconfiguration, we need to take robust measures to improve overall cluster security.

Worth Reading: A 5-Step Approach to Managing Imposter Syndrome

24 August 2021


Imposter syndrome is a debilitating pattern of thinking that inhibits optimal functioning. Not only does it undermine confidence, but it also produces a need to prove yourself by achieving unrealistic standards —standards that you, the person with imposter syndrome, create for yourself.

Worth Reading: What is Hybrid Cloud?

23 August 2021


Public cloud options have rapidly become the norm in many businesses — rather than needing their own physical infrastructure (including servers), companies find it much easier to outsource to big players like Amazon, Microsoft, and Google.

Worth Reading: Connecting and Protecting Applications within a Zero Trust Data Center Architecture with Juniper Cloud Workload Protection

23 August 2021


Nearly everything we do on the network involves applications, from web browsing and chat to mobile games and services that allow us to get work done. Applications store, process and exchange data, which enables us to connect to each other and makes our digital lives easier.