Most networking groups have a wireless guy, maybe two – you might be that person. For years, the rest of the campus network group hasn’t really had to think about what they plugged into the network. Give them a gig port, PoE, probably set up a VLAN and that’s it: wireless sorted.Because when it all came down to it, it didn’t matter how many wireless users connected to the access point because only one device, the client or the access point, could transmit at one time. What’s more, a single wireless client is not going to tax a gig port. In fact, the more clients there are on an AP, the less traffic ends up on the wire since they spend more time trying to get a timeslot to transmit, like the seagulls in “Finding Nemo” yelling “Mine, mine, mine.”To read this article in full, please click here
In a competitive environment, with so much emphasis on the need for communications service providers (CSPs) to offer more personalized services to increase customer loyalty, the network plays a crucial role, explains Kent McNeil, Vice President of Software for Blue Planet. While the connection between network infrastructure and the customer relationship isn’t obvious, it is actually what drives personalization of services and competitive edge.Enhancing the customer experience and lowering churn rates are key objectives for CSPs; however, an influx of competition is challenging customer loyalty. Equally, leading-edge technologies, from devices to cloud, have created new visions for consumers and enterprises. This has significantly changed customer demands, as well as expectations about how those requirements are fulfilled. Customers expect more personalized services, with tailored offers and ease-of-use.To read this article in full, please click here
In a competitive environment, with so much emphasis on the need for communications service providers (CSPs) to offer more personalized services to increase customer loyalty, the network plays a crucial role, explains Kent McNeil, Vice President of Software for Blue Planet. While the connection between network infrastructure and the customer relationship isn’t obvious, it is actually what drives personalization of services and competitive edge.Enhancing the customer experience and lowering churn rates are key objectives for CSPs; however, an influx of competition is challenging customer loyalty. Equally, leading-edge technologies, from devices to cloud, have created new visions for consumers and enterprises. This has significantly changed customer demands, as well as expectations about how those requirements are fulfilled. Customers expect more personalized services, with tailored offers and ease-of-use.To read this article in full, please click here
Powerful malicious actors continue to be a substantial risk to key parts of the Internet and its Domain Name System security infrastructure, so much so that The Internet Corporation for Assigned Names and Numbers is calling for an intensified community effort to install stronger DNS security technology. Specifically ICANN is calling for full deployment of the Domain Name System Security Extensions (DNSSEC) across all unsecured domain names. DNS,often called the internet’s phonebook, is part of the global internet infrastructure that translates between common language domain names and IP addresses that computers need to access websites or send emails. DNSSEC adds a layer of security on top of DNS.To read this article in full, please click here
Powerful malicious actors continue to be a substantial risk to key parts of the Internet and its Domain Name System security infrastructure, so much so that The Internet Corporation for Assigned Names and Numbers is calling for an intensified community effort to install stronger DNS security technology. Specifically ICANN is calling for full deployment of the Domain Name System Security Extensions (DNSSEC) across all unsecured domain names. DNS,often called the internet’s phonebook, is part of the global internet infrastructure that translates between common language domain names and IP addresses that computers need to access websites or send emails. DNSSEC adds a layer of security on top of DNS.To read this article in full, please click here
The Internet was designed to connect things easily, but a lot has changed since its inception. Users now expect the internet to find the “what” (i.e., the content), but the current communication model is still focused on the “where.”The Internet has evolved to be dominated by content distribution and retrieval. As a matter of fact, networking protocols still focus on the connection between hosts that surfaces many challenges.The most obvious solution is to replace the “where” with the “what” and this is what Named Data Networking (NDN) proposes. NDN uses named content as opposed to host identifiers as its abstraction.How the traditional IP works
To deliver packets from a source to a destination, IP needs to accomplish two phases of operation. The first phase is the routing plane also known as the control plane. This phase enables the routers to share routing updates and select the best path to construct the forwarding information table (FIB). The second phase is the forwarding plane also known as the data plane. This is the phase where forwarding to the next hop is executed upon FIB examination.To read this article in full, please click here
The Internet was designed to connect things easily, but a lot has changed since its inception. Users now expect the internet to find the “what” (i.e., the content), but the current communication model is still focused on the “where.”The Internet has evolved to be dominated by content distribution and retrieval. As a matter of fact, networking protocols still focus on the connection between hosts that surfaces many challenges.The most obvious solution is to replace the “where” with the “what” and this is what Named Data Networking (NDN) proposes. NDN uses named content as opposed to host identifiers as its abstraction.How the traditional IP works
To deliver packets from a source to a destination, IP needs to accomplish two phases of operation. The first phase is the routing plane also known as the control plane. This phase enables the routers to share routing updates and select the best path to construct the forwarding information table (FIB). The second phase is the forwarding plane also known as the data plane. This is the phase where forwarding to the next hop is executed upon FIB examination.To read this article in full, please click here
The software-defined wide-area networking (SD-WAN) revolution knows no boundaries. Now the technology has found its way into a telemedicine backpack that can deliver real-time communications between doctors and first responders on scene in the field.Telemedicine pioneer swyMed, based in Lexington, Mass., offers a high-performance telemedicine backpack called the DOT — Doctors on Tap — which enables reliable, real-time video communications powered by the Silver Peak Unity EdgeConnect™ SD-WAN edge platform that can improve the performance of existing wireless network communications and connect even at long distances from wireless towers.To read this article in full, please click here
The software-defined wide-area networking (SD-WAN) revolution knows no boundaries. Now the technology has found its way into a telemedicine backpack that can deliver real-time communications between doctors and first responders on scene in the field.Telemedicine pioneer swyMed, based in Lexington, Mass., offers a high-performance telemedicine backpack called the DOT — Doctors on Tap — which enables reliable, real-time video communications powered by the Silver Peak Unity EdgeConnect™ SD-WAN edge platform that can improve the performance of existing wireless network communications and connect even at long distances from wireless towers.To read this article in full, please click here
Configuration management (CM) utilities can automate the configuration of network devices, saving time and eliminating many of the human errors introduced during manual configuration.To read this article in full, please click here(Insider Story)
Configuration management (CM) utilities can automate the configuration of network devices, saving time and eliminating many of the human errors introduced during manual configuration.To read this article in full, please click here(Insider Story)
The classical view of an IoT deployment is relatively centralized – a company wires sensors to important equipment, the sensors send data back to edge gateways, and the gateways do some limited processing of that data and then send it back to the cloud or to the data center. It’s not simple, but it’s easy enough to understand the principles.Some, however, recognize that vastly different architectures for the IoT are possible, including Fleet Space Technologies, a startup that earlier this month announced that it had reached a million device signups for its ambitious satellite-based IoT edge system, which it’s calling Project Galaxy.To read this article in full, please click here
The classical view of an IoT deployment is relatively centralized – a company wires sensors to important equipment, the sensors send data back to edge gateways, and the gateways do some limited processing of that data and then send it back to the cloud or to the data center. It’s not simple, but it’s easy enough to understand the principles.Some, however, recognize that vastly different architectures for the IoT are possible, including Fleet Space Technologies, a startup that earlier this month announced that it had reached a million device signups for its ambitious satellite-based IoT edge system, which it’s calling Project Galaxy.To read this article in full, please click here
Linux is a tried-and-true, open-source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web servers and, more recently, networking gear.Its longevity, maturity and security make it one of the most trusted OSes available today, meaning it is ideal for commercial network devices as well as enterprises that want to use it and its peripherals to customize their own network and data center infrastructure.[ Also see Invaluable tips and tricks for troubleshooting Linux. ]
That in turn makes Linux skills highly sought after by IT hiring managers. For example, many of the new technologies associated with DevOps, such as containers, infrastructure, and SDN controllers, are built on Linux.To read this article in full, please click here
Linux is a tried-and-true, open-source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web servers and, more recently, networking gear.Its longevity, maturity and security make it one of the most trusted OSes available today, meaning it is ideal for commercial network devices as well as enterprises that want to use it and its peripherals to customize their own network and data center infrastructure.[ Also see Invaluable tips and tricks for troubleshooting Linux. ]
That in turn makes Linux skills highly sought after by IT hiring managers. For example, many of the new technologies associated with DevOps, such as containers, infrastructure, and SDN controllers, are built on Linux.To read this article in full, please click here
Google this week announced the beta version of its Cloud Services Platform, an on-premises software product that allows enterprises to deploy Google’s Kubernetes Engine inside their own data centers.Google announced CSP last July at its Cloud Next conference. Enterprises can build an in-house duplicate of Google’s cloud service to deploy Kubernetes containers to build, test, and deploy, and then move parts or all of it to the public Google cloud, all while managing it with centralized software.To read this article in full, please click here
There have been some interesting developments in the Arm-as-a-server processor field, from Cavium’s success to Amazon offering much cheaper instances on its home-brew Arm processors. But now Arm Holdings itself is getting into the fray, and it's offering is a whopper.Last October, Arm announced the Neoverse platform designed specifically for cloud computing and edge network environments. This week it revealed the Neoverse N1 and E1 platforms, and they are impressive. Usually when Intel and AMD introduce new server chips, they are basically the same chips with faster clocks and more cores. But these two chips are very different in design and meant for different use cases.To read this article in full, please click here
Shell builtins are commands that are loaded into memory when a shell — such as bash, sh, or zsh — is invoked. The reason for this is that keeping these commands in memory helps ensure that these commands will be run very efficiently whenever someone uses them. They run faster because they don't have to first be loaded into memory. They're "built in."Determining whether commands that you use are builtins, aliases, or executable files on your system that are loaded as needed requires the use of several interesting commands. These include type, which, and compgen. So, let's take a look at how these commands work and what they can tell us.To read this article in full, please click here
Shell builtins are commands that are loaded into memory when a shell — such as bash, sh, or zsh — is invoked. The reason for this is that keeping these commands in memory helps ensure that these commands will be run very efficiently whenever someone uses them. They run faster because they don't have to first be loaded into memory. They're "built in."Determining whether commands that you use are builtins, aliases, or executable files on your system that are loaded as needed requires the use of several interesting commands. These include type, which, and compgen. So, let's take a look at how these commands work and what they can tell us.To read this article in full, please click here
Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system. HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system.
More about edge networking
How edge networking and IoT will reshape data centers
Edge computing best practices
How edge computing can help secure the IoT
The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here