Web-scale: a healthy choice for healthcare networks

Major cloud providers are able to achieve impressive uptime by distributing the load across a large number of commodity servers. There’s no single master server that can fail and bring down the entire infrastructure. It’s not surprising then that so many healthcare networks are already relying on major cloud providers to run electronic medical records (EMR) and imaging applications and store patient data. So doesn’t it make sense to adopt the same approach for the network?

Healthcare networks face a unique challenge that many other networks don’t: how do you grow your network quickly and reliably while remaining compliant? As patient data grows, this tension between growth and compliance is increasing. Healthcare networks are feeling the pressure to move data faster, and this often requires adding more connections and switches, which entails routing and other configuration changes. These continual and rapid changes come at the cost of long, sometimes unplanned, outages. Planned outages are to be expected, but unexpected outages are a nightmare. Consequently, many healthcare networks have understandably opted for slower network growth to maintain a stable, reliable network.

But thanks to the advent of web-scale networking, the tension between growth and compliance is quickly becoming a thing Continue reading

The Philippines Embraces the Multistakeholder Model in the Development of Its National ICT Ecosystem Framework 2022

Earlier this month in Manila, the Philippines Government Department of ICT (DICT) signed a Memorandum of Understanding (MoU) with the Internet Society (ISOC) to facilitate the development of its National ICT Ecosystem Framework (NIEF) 2022.

The NIEF 2022 – a successor to the Philippine Digital Strategy initiative from 2011-2016 – will serve as a roadmap for the management and development of national Information and Communication Technology (ICT) in the country’s plans, programmes, and projects. NIEF will also serve to promote innovation and development of the ICT sector, encourage collaborative use of ICTs, and promote accessibility, security and sustainability.

Some 67 million people are connected to the Internet in the Philippines today – and a large number are prolific users. The country is a significant market for a number of multinational social media and content providers and has a strong Business Process Outsourcing (BPO) industry. These facts make ICTs a key area of development and critical for the future of the economy.

The multistakeholder model will help facilitate perspectives from a range of stakeholders, which in turn will help NIEF 2022 to be in tune with what would work best for the people of the Philippines. This collaborative approach encourages inclusivity Continue reading

New to the INE Course Library – Building Modern Clouds: Docker, DevOps & Kubernetes

This course covers the basics of Docker and Kubernetes by showing how to build modern clouds with these technologies. By the end of this course students will be able to launch a Kubernetes cluster and deploy self-healing and scalable applications, as well as create their own continuous integration, and continuous delivery pipeline.



Why You Should Watch:

Kubernetes has quickly become the standard platform for running containerized workloads. All the major public clouds now have a Kubernetes-as-a-Service offering and popular container management tools, like Rancher, have migrated their underlying platform from in-house software, like Cattle, to Kubernetes. Even Docker themselves are now natively supporting Kubernetes.

This course is meant to teach you how to get started building modern clouds with Kubernetes and Docker, while covering the basic concepts of DevOps.


Who Should Watch:

This course is intended for anyone wanting to learn about Kubernetes and Docker. A basic familiarity with the Linux command line and the basic high-level concepts of the public cloud are recommended. The recommended public cloud platform for this course is Google Cloud Platform.


About The Instructor

David Coronel has been in the IT field since 2002. David started as a call center agent and quickly made his way to systems administration. David is a Certified Kubernetes Administrator, a Docker Certified Associate, a Certified OpenStack Administrator as well as an AWS Certified Solutions Architect Associate. David is currently employed as a Technical Account Manager at Canonical, the company behind Ubuntu.

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

IDG Contributor Network: Network visibility and assurance for GDPR compliance

The EU General Data Protection Regulation, or GDPR, came into force on May 25. With every organization with customers and suppliers in the European Union now accountable for the way in which they handle or process personal data, much work has been done to ensure compliance by the deadline. As a result, all levels of a business are now concentrated on meeting the requirements of the new regulation, throwing the issue of data protection into focus like never before.When you consider how big and complex IT networks have become in recent times, however, it has become almost impossible to detect just when and how a security breach or network failure might occur. Unsurprisingly, network security and information assurance are crucial to GDPR compliance, with the regulation stating that measures must be put in place to mitigate the risk associated with assuring information integrity and availability in the face of threats such as malicious code or distributed denial of service (DDoS) attacks.To read this article in full, please click here

Thoughts on Impostor Syndrome

How many times, on reading my blog, a book, or watching some video of mine over these many years (the first article I remember writing that was publicly available, many years ago, was the EIGRP white paper on Cisco Online, somewhere in 1997), have you thought—here is an engineer who has it all together, who knows technology in depth and breadth, and who symbolizes everything I think an engineer should be? And yet, how many times have you faced that feeling of self-doubt we call impostor synddome?

I am going to let you in on a little secret. I’m an impostor, too. After all these years, I still feel like I am going to be speaking in front of a crowd, explaining something at a meeting, I am going to hit publish on something, and the entire world is going to “see through the charade,” and realize I’m not all that good of an engineer. That I am an ordinary person, just doing ordinary things.

While I often think about these things, what has led me down the path of thinking about them this week is some reading I’ve been doing for a PhD seminar about human nature, work Continue reading

IDG Contributor Network: 6 sneaky ways cloud infrastructure providers lock you in

With more enterprises adopting multi-cloud and hybrid cloud computing strategies, it's more important than ever to avoid getting locked into just one cloud provider's tools and technologies. Multi-cloud and hybrid cloud deployments offer many benefits. They include the ability to pick and choose which cloud vendor's add-on services are right for your business, as well as the ability to implement best-of-breed solutions when the time is right. Multi-cloud also adds redundancy and security because all of your proverbial eggs are not in one basket.Despite the trend toward multi-cloud, however, there are still plenty of ways to find yourself locked in. Here's a quick look at six common ways enterprises get locked into using one provider, along with some advice on how businesses can keep cloud implementations open and interoperable. To read this article in full, please click here

Happy Amazon Crash Day

On one of the biggest shopping days of the year for Amazon.com the company’s web site crapped out intermittently for hours yesterday.Instead of Prime Day purchases, many customers just got error messages and pictures of the dogs of Amazon, along with a message from Amazon that read: "Sorry, we're experiencing unusually heavy traffic. Please try again in a few seconds. Your items are still waiting in your cart," or “"Uh-Oh. Something went wrong on our end." [ Related: How to plan a software-defined data-center network.] Prime Day started at 3PM ET and the problems emerged almost immediately after.  Around 5 p.m., Amazon tweeted acknowledgement of the problem stating: “Some customers are having difficulty shopping and we are working to resolve this issue quickly.  Many are shopping successfully – in the first hour of Prime day in the US, customers have ordered more items compared to the first hour last year.”To read this article in full, please click here

Happy Amazon Crash Day

On one of the biggest shopping days of the year for Amazon.com the company’s web site crapped out intermittently for hours yesterday.Instead of Prime Day purchases, many customers just got error messages and pictures of the dogs of Amazon, along with a message from Amazon that read: "Sorry, we're experiencing unusually heavy traffic. Please try again in a few seconds. Your items are still waiting in your cart," or “"Uh-Oh. Something went wrong on our end." [ Related: How to plan a software-defined data-center network.] Prime Day started at 3PM ET and the problems emerged almost immediately after.  Around 5 p.m., Amazon tweeted acknowledgement of the problem stating: “Some customers are having difficulty shopping and we are working to resolve this issue quickly.  Many are shopping successfully – in the first hour of Prime day in the US, customers have ordered more items compared to the first hour last year.”To read this article in full, please click here

BrandPost: How Cloud Migration Impacts Network Infrastructure

The Cloud ImperativeEnterprise IT is increasingly a multi-cloud affair. With Gartner projecting that 85 percent of enterprises are currently using a multi-cloud strategy, it seems difficult to find an enterprise that doesn’t. IT leaders are like conductors – orchestrating SaaS, PaaS, and on-premises code and data in increasingly virtualized, software-defined environment. With the cloud taking center stage, what impacts does migration of workloads have on infrastructure overall?Migration Challenges for InfrastructureAs IT strives to be more responsive to both lines of business and development teams seeking to spin up new instances and environments, workloads often need to move – and rapidly. But workload mobility has a downside, namely an increasing demand on the shared services on- and off-premises.To read this article in full, please click here

1 2 3 2,234