Archive

Category Archives for "Network World SDN"

ICANN urges adopting DNSSEC now

Powerful malicious actors continue to be a substantial risk to key parts of the Internet and its Domain Name System security infrastructure, so much so that The Internet Corporation for Assigned Names and Numbers is calling for an intensified community effort to install stronger DNS security technology. Specifically ICANN is calling for full deployment of the Domain Name System Security Extensions (DNSSEC) across all unsecured domain names. DNS,often called the internet’s phonebook, is part of the global internet infrastructure that translates between common language domain names and IP addresses that computers need to access websites or send emails.  DNSSEC adds a layer of security on top of DNS.To read this article in full, please click here

IDG Contributor Network: Named data networking: Stateful forwarding plane for datagram delivery

The Internet was designed to connect things easily, but a lot has changed since its inception. Users now expect the internet to find the “what” (i.e., the content), but the current communication model is still focused on the “where.”The Internet has evolved to be dominated by content distribution and retrieval. As a matter of fact, networking protocols still focus on the connection between hosts that surfaces many challenges.The most obvious solution is to replace the “where” with the “what” and this is what Named Data Networking (NDN) proposes. NDN uses named content as opposed to host identifiers as its abstraction.How the traditional IP works To deliver packets from a source to a destination, IP needs to accomplish two phases of operation. The first phase is the routing plane also known as the control plane. This phase enables the routers to share routing updates and select the best path to construct the forwarding information table (FIB). The second phase is the forwarding plane also known as the data plane. This is the phase where forwarding to the next hop is executed upon FIB examination.To read this article in full, please click here

IDG Contributor Network: Named data networking: Stateful forwarding plane for datagram delivery

The Internet was designed to connect things easily, but a lot has changed since its inception. Users now expect the internet to find the “what” (i.e., the content), but the current communication model is still focused on the “where.”The Internet has evolved to be dominated by content distribution and retrieval. As a matter of fact, networking protocols still focus on the connection between hosts that surfaces many challenges.The most obvious solution is to replace the “where” with the “what” and this is what Named Data Networking (NDN) proposes. NDN uses named content as opposed to host identifiers as its abstraction.How the traditional IP works To deliver packets from a source to a destination, IP needs to accomplish two phases of operation. The first phase is the routing plane also known as the control plane. This phase enables the routers to share routing updates and select the best path to construct the forwarding information table (FIB). The second phase is the forwarding plane also known as the data plane. This is the phase where forwarding to the next hop is executed upon FIB examination.To read this article in full, please click here

BrandPost: Silver Peak Powers an SD-WAN Telemedicine Backpack

The software-defined wide-area networking (SD-WAN) revolution knows no boundaries. Now the technology has found its way into a telemedicine backpack that can deliver real-time communications between doctors and first responders on scene in the field.Telemedicine pioneer swyMed, based in Lexington, Mass., offers a high-performance telemedicine backpack called the DOT — Doctors on Tap — which enables reliable, real-time video communications powered by the Silver Peak Unity EdgeConnect™ SD-WAN edge platform that can improve the performance of existing wireless network communications and connect even at long distances from wireless towers.To read this article in full, please click here

BrandPost: Silver Peak Powers an SD-WAN Telemedicine Backpack

The software-defined wide-area networking (SD-WAN) revolution knows no boundaries. Now the technology has found its way into a telemedicine backpack that can deliver real-time communications between doctors and first responders on scene in the field.Telemedicine pioneer swyMed, based in Lexington, Mass., offers a high-performance telemedicine backpack called the DOT — Doctors on Tap — which enables reliable, real-time video communications powered by the Silver Peak Unity EdgeConnect™ SD-WAN edge platform that can improve the performance of existing wireless network communications and connect even at long distances from wireless towers.To read this article in full, please click here

IoT roundup: Outer space, the building is getting smart, and trucking

The classical view of an IoT deployment is relatively centralized – a company wires sensors to important equipment, the sensors send data back to edge gateways, and the gateways do some limited processing of that data and then send it back to the cloud or to the data center. It’s not simple, but it’s easy enough to understand the principles.Some, however, recognize that vastly different architectures for the IoT are possible, including Fleet Space Technologies, a startup that earlier this month announced that it had reached a million device signups for its ambitious satellite-based IoT edge system, which it’s calling Project Galaxy.To read this article in full, please click here

IoT roundup: Outer space, the building is getting smart, and trucking

The classical view of an IoT deployment is relatively centralized – a company wires sensors to important equipment, the sensors send data back to edge gateways, and the gateways do some limited processing of that data and then send it back to the cloud or to the data center. It’s not simple, but it’s easy enough to understand the principles.Some, however, recognize that vastly different architectures for the IoT are possible, including Fleet Space Technologies, a startup that earlier this month announced that it had reached a million device signups for its ambitious satellite-based IoT edge system, which it’s calling Project Galaxy.To read this article in full, please click here

What is Linux? Everything you need to know about the open-source operating system

Linux is a tried-and-true, open-source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web servers and, more recently, networking gear.Its longevity, maturity and security make it one of the most trusted OSes available today, meaning it is ideal for commercial network devices as well as enterprises that want to use it and its peripherals to customize their own network and data center infrastructure.[ Also see Invaluable tips and tricks for troubleshooting Linux. ] That in turn makes Linux skills highly sought after by IT hiring managers. For example, many of the new technologies associated with DevOps, such as containers, infrastructure, and SDN controllers, are built on Linux.To read this article in full, please click here

What is Linux? Everything you need to know about the open-source operating system

Linux is a tried-and-true, open-source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web servers and, more recently, networking gear.Its longevity, maturity and security make it one of the most trusted OSes available today, meaning it is ideal for commercial network devices as well as enterprises that want to use it and its peripherals to customize their own network and data center infrastructure.[ Also see Invaluable tips and tricks for troubleshooting Linux. ] That in turn makes Linux skills highly sought after by IT hiring managers. For example, many of the new technologies associated with DevOps, such as containers, infrastructure, and SDN controllers, are built on Linux.To read this article in full, please click here

Google on-premises Kubernetes solution enters beta

Google this week announced the beta version of its Cloud Services Platform, an on-premises software product that allows enterprises to deploy Google’s Kubernetes Engine inside their own data centers.Google announced CSP last July at its Cloud Next conference. Enterprises can build an in-house duplicate of Google’s cloud service to deploy Kubernetes containers to build, test, and deploy, and then move parts or all of it to the public Google cloud, all while managing it with centralized software.To read this article in full, please click here

Arm introduces Neoverse high-performance CPUs for servers, 5G

There have been some interesting developments in the Arm-as-a-server processor field, from Cavium’s success to Amazon offering much cheaper instances on its home-brew Arm processors. But now Arm Holdings itself is getting into the fray, and it's offering is a whopper.Last October, Arm announced the Neoverse platform designed specifically for cloud computing and edge network environments. This week it revealed the Neoverse N1 and E1 platforms, and they are impressive. Usually when Intel and AMD introduce new server chips, they are basically the same chips with faster clocks and more cores. But these two chips are very different in design and meant for different use cases.To read this article in full, please click here

How to identify shell builtins, aliases and executable files on Linux systems

Shell builtins are commands that are loaded into memory when a shell — such as bash, sh, or zsh — is invoked. The reason for this is that keeping these commands in memory helps ensure that these commands will be run very efficiently whenever someone uses them. They run faster because they don't have to first be loaded into memory. They're "built in."Determining whether commands that you use are builtins, aliases, or executable files on your system that are loaded as needed requires the use of several interesting commands. These include type, which, and compgen. So, let's take a look at how these commands work and what they can tell us.To read this article in full, please click here

How to identify shell builtins, aliases and executable files on Linux systems

Shell builtins are commands that are loaded into memory when a shell — such as bash, sh, or zsh — is invoked. The reason for this is that keeping these commands in memory helps ensure that these commands will be run very efficiently whenever someone uses them. They run faster because they don't have to first be loaded into memory. They're "built in."Determining whether commands that you use are builtins, aliases, or executable files on your system that are loaded as needed requires the use of several interesting commands. These include type, which, and compgen. So, let's take a look at how these commands work and what they can tell us.To read this article in full, please click here

Cisco warns on HyperFlex security vulnerabilities

Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system.  HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here

Cisco warns on HyperFlex security vulnerabilities

Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system.  HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here

HP’s President’s Day Sale Continues With up to 56% off Select Products – Deal Alert

In honor of President's Day, HP's online store has slashed prices up to 56% on various items, with free shipping included. On the list is the HP Pavilion Laptop - 15T which has been discounted $420 down to $579.99.  The budget-friendly 14z laptop is even budget-friendlier at just $189.99, down from $329.99. The HP Probook 640 G4 Notebook PC is slashed 53% from $1310 to just $609. There are many more discounts as well, so browse the full list of deals at HP's online store right here.To read this article in full, please click here

HP’s President’s Day Sale Continues With up to 56% off Select Products – Deal Alert

In honor of President's Day, HP's online store has slashed prices up to 56% on various items, with free shipping included. On the list is the HP Pavilion Laptop - 15T which has been discounted $420 down to $579.99.  The budget-friendly 14z laptop is even budget-friendlier at just $189.99, down from $329.99. The HP Probook 640 G4 Notebook PC is slashed 53% from $1310 to just $609. There are many more discounts as well, so browse the full list of deals at HP's online store right here.To read this article in full, please click here

Power over Wi-Fi: The end of IoT sensor batteries?

Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here