BrandPost: A Compelling Justification for Your Business-driven SD-WAN Investment at Your Fingertips!

This is the second of a two-part blog series that explores how enterprise IT leaders can effectively measure the return on SD-WAN investments. In my first installment of this series, I discussed how IT leaders can make a business case for moving from a traditional router-centric architecture to a business-first networking model SD-WAN, like the one delivered by Silver Peak. According to a recent report by IDC[1], the SD-WAN market is poised to reach $5.25 Billion in 2023. The report also predicts the SD-WAN industry to grow at a compound annual growth rate (CAGR) of 30.8 percent from 2018 to 2023, and that is driving a lot of attention to this new way of deploying WAN infrastructure. CIOs are asking how and why they will use SD-WAN and how they can justify making SD-WAN investments.To read this article in full, please click here

The First Networking Fundamentals Videos are Online

In mid-June I started another pet project - a series of webinars focused on networking fundamentals. In the first live session on June 18th we focused on identifying the challenges one has to solve when building an end-to-end networking solution, and the role of layered approach to networking.

Not surprisingly, we quickly went down the rabbit holes of computer networking history, including SCSI cables, serial connections and modems… but that’s where it all started, and some of the concepts developed at that time are still used today… oftentimes heavily morphed by recursive application of RFC 1925 Rule 11.

Read more ...

When private LTE is better than Wi-Fi

While cellular wireless is often thought of as a carrier service, IT organizations can benefit from deploying private LTE technology to complement or even replace Wi-Fi and for specific use cases such as supporting IoT devices that generate large data sets and that are spread out over large areas.To read this article in full, please click here(Insider Story)

VMworld 2019: Sneak Peak at Our Keynote Sessions. Plus a Chance to Win!

Networking & Security Keynotes at VMworld 2019

 

About a month ago, we published a VMworld security guide with shortlisted 100 to 300 level sessions that best illustrate real-world application of our products. This time, we’ll be focusing on two networking and security keynotes. The first keynote will highlight how VMware’s single-stack, complete networking and security platform can achieve a consistent operational network fabric for hybrid cloud environments, and the second keynote will focus on how users can leverage existing VMware infrastructure to implement a more effective, intrinsic security.

In addition, you will have a shot at winning Bose headphones simply by attending each event. Although chances are slim (1250 times harder to win both as opposed to just one), duplicate winners will be acknowledged so if you are looking for a present for yourself and a significant other, make sure to register and save on your yearly bonus! Winners will be announced at the end of each keynote, so make sure to stay until the end!

 

Showcase Keynote: Networking and Security for the Cloud Era [NETS3413KU]

 

Single NSX Stack

 

There has never been a more exciting and challenging time in the networking space. As the cloud, application developers, IoT, Continue reading

Adtran Launches CAF Managed Test Service, New Switches

The service is an extension of the company's CAF testing offering announced in February.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft Buys jClarity to Jolt Java Support in Azure

The jClarity team has been a contributor to the AdoptOpenJDK project that helps users build...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

U.S. Delays Huawei Ban Another 90 Days

Huawei earned itself another narrow and temporary reprieve from a blanket ban against doing...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco and F5 Networks Discuss the Value of Tech Partnerships

SDxCentral spoke with Cisco and F5 Networks about their companies’ complementary approaches and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Week in Internet News: White House Proposes Social Media Monitoring

We’re watching you: A leaked proposal from U.S. President Donald Trump’s administration would put the Federal Communications Commission in charge of regulating how social media platforms and other websites decide what appears on their pages, CNN reports. Critics said the proposal amounts to censorship.

We’re watching you, part 2: In other U.S. government news, the Trump administration has asked a court to reauthorized a suspended National Security Agency surveillance program, targeting the telephone records of U.S. residents, the New York Times reports. The Trump administration wants to make the controversial phone records collection program permanent.

Not just the U.S. government: The Indian government wants Twitter to block what it deems is fake news by suspending eight Kashmir-based accounts for allegedly spreading rumors, India Today reports. Indian security forces have alleged that groups in Pakistan have attempted to divide the security forces in Jammu and Kashmir, areas controlled by India but claimed by Pakistan.

Even more watching: Technicians from Chinese networking vendor Huawei have reportedly helped government officials in Uganda and Zambia spy on political opponents, TechCrunch reports. News reports have Huawei technicians helping the officials spy on the use of apps like WhatsApp and Skype and Continue reading

Migrating ipSpace.net Infrastructure to AWS

I’m too stupid to unwind and relax over summer - there’s always some janitorial task to be done, and I simply cannot leave it alone. This summer, I decided to migrate our server infrastructure to AWS.

TL&DR: It went smoother than I expected, and figuring out how AWS virtual networks, public IP addresses, and security groups work while creating AWS Networking webinar definitely helped, but it also took way longer than I expected.

Read more ...

Robust learning from untrusted sources

Robust learning from untrusted sources Konstantinov & Lampert, ICML’19

Welcome back to a new term of The Morning Paper! Just before the break we were looking at selected papers from ICML’19, including “Data Shapley.” I’m going to pick things up pretty much where we left off with a few more ICML papers…

Data Shapley provides us with one way of finding and correcting or eliminating low-value (and potentially harmful) data points from a training set. In today’s paper choice, Konstantinov & Lampert provide a way of assessing the value of datasets as a whole. The idea is that you might be learning e.g. a classifier by combining data from multiple sources. By assigning a value (weighting) to each of those data sources we can intelligently combine them to get the best possible performance out of the resulting trained model. So if you need more data in order to improve the performance of your model, ‘Robust learning from untrusted sources’ provides an approach that lets you tap into additional, potentially noisier, sources.

It’s similar in spirit to Snorkel which we looked at last year, and is designed to let you incorporate data from multiple ‘weakly supervised’ (i.e. noisy) Continue reading

How Cray Makes Ethernet Suited For HPC And AI With Slingshot

Last fall, supercomputer maker Cray announced that it was getting back to making high performance cluster interconnects after a six year hiatus, but the company had already been working on its “Rosetta” switch ASIC for the Slingshot interconnect for quite a while before it started talking publicly about it.

How Cray Makes Ethernet Suited For HPC And AI With Slingshot was written by Timothy Prickett Morgan at .

Oracle Files Trademark Suit Against Cryptocurrency Startup CryptoOracle

Oracle accuses CryptoOracle of unfair business practices, cybersquatting and infringing on and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Fast Friday – Mobility Field Day 4

This week’s post is running behind because I’m out in San Jose enjoying great discussions from Mobility Field Day 4. This event is bringing a lot of great discussion to the community to get everyone excited for current and future wireless technologies. Some quick thoughts here with more ideas to come soon.

  • Analytics is becoming a huge driver for deployments. The more data you can gather, the better everything can be. When you start to include IoT as a part of the field you can see why all those analytics matter. You need to invest in a lot of CPU horsepower to make it all work the way you want. Which is also driving lots of people to build in the cloud to have access to what they need on-demand from an infrastructure side of things.
  • Spectrum is a huge problem and source of potential for wireless. You have to have access to spectrum to make everything work. 2.4 GHz is pretty crowded and getting worse with IoT. 5 GHz is getting crowded as well, especially with LAA being used. And the opening of the 6 GHz spectrum could be held up in political concerns. Are there new investigations Continue reading

Weekly Wrap: HCX, VMware’s Top-Secret Sauce, Comes Out

Weekly Wrap for Aug. 16, 2019: VMware launches standalone HCX software; Pivotal stock surges on...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

1 2 3 2,594