Archive

Category Archives for "Networking"

IBM fuses its software with Red Hat’s to launch hybrid-cloud juggernaut

IBM has wasted no time aligning its own software with its newly acquired Red Hat technoloogy,saying its portfolio would be transformed to work cloud natively and augmented to run on Red Hat’s OpenShift platform.IBM in July finalized its $34 billion purchase of Red Hat and says it will use the Linux powerhouse's open-source know-how and Linux expertise to grow larger scale hybrid-cloud customer projects and to create a web of partnerships to simplify carrying them out.To read this article in full, please click here

Dynatrace Scores $544M IPO, Cloudflare to Follow Suit

Dynatrace raised $544 million in its initial public offering (IPO) today, selling 35.6 million...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BiB 081: 128 Technology Rethinks The WAN Router

128 Technology takes an interesting approach to WAN routing. In this Brief Briefing Ethan Banks and Drew Conry-Murray skim the surface of 128 Technology's approach, which includes stateful sessions, NAT, and encryption--but no tunneling. We also touch on use cases including SD-WAN and security. We also provide links to Networking Field Day videos that have much more detail.

BiB 081: 128 Technology Rethinks The WAN Router

128 Technology takes an interesting approach to WAN routing. In this Brief Briefing Ethan Banks and Drew Conry-Murray skim the surface of 128 Technology's approach, which includes stateful sessions, NAT, and encryption--but no tunneling. We also touch on use cases including SD-WAN and security. We also provide links to Networking Field Day videos that have much more detail.

The post BiB 081: 128 Technology Rethinks The WAN Router appeared first on Packet Pushers.

Self-organizing micro robots may soon swarm the industrial IoT

Miniscule robots that can jump and crawl could soon be added to the industrial internet of things’ arsenal. The devices, a kind of printed circuit board with leg-like appendages, wouldn’t need wide networks to function but would self-organize and communicate efficiently, mainly with one another.Breakthrough inventions announced recently make the likelihood of these ant-like helpers a real possibility.[ Also see: What is edge computing? and How edge networking and IoT will reshape data centers ] Vibration-powered micro robots The first invention is the ability to harness vibration from ultrasound and other sources, such as piezoelectric actuators, to get micro robots to respond to commands. The piezoelectric effect is when some kinds of materials generate an electrical charge in response to mechanical stresses.To read this article in full, please click here

Cisco pays $8.6M to settle security-software whistleblower lawsuit

Cisco has agreed to pay $8.6 million to settle claims it sold video security software that had a vulnerability that could have opened federal, state and local government agencies to hackers.Under terms of the settlement Cisco will pay $2.6 million to the federal government and up to $6 million to 15 states, certain cities and other entities that purchased the product. The states that settled with Cisco are California, Delaware, Florida, Hawaii, Illinois, Indiana, Minnesota, Nevada, New Jersey, New Mexico, New York, North Carolina, Tennessee, Massachusetts and Virginia.RELATED: A conversation with a white hat hacker According to Cisco, the software, which was sold between 2008 and 2014 was created by Broadware, a company Cisco bought in 2007 for its surveillance video technology and ultimately named it Video Surveillance Manager.To read this article in full, please click here

Cisco pays $8.6M to settle security-software whistleblower lawsuit

Cisco has agreed to pay $8.6 million to settle claims it sold video security software that had a vulnerability that could have opened federal, state and local government agencies to hackers.Under terms of the settlement Cisco will pay $2.6 million to the federal government and up to $6 million to 15 states, certain cities and other entities that purchased the product. The states that settled with Cisco are California, Delaware, Florida, Hawaii, Illinois, Indiana, Minnesota, Nevada, New Jersey, New Mexico, New York, North Carolina, Tennessee, Massachusetts and Virginia.RELATED: A conversation with a white hat hacker According to Cisco, the software, which was sold between 2008 and 2014 was created by Broadware, a company Cisco bought in 2007 for its surveillance video technology and ultimately named it Video Surveillance Manager.To read this article in full, please click here

Cisco Pays $8.6M in First-Ever Security Software Whistleblower Payout

It’s essentially pocket change for the vendor — Cisco CEO Chuck Robbin’s house sold for...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

IBM Packs Red Hat OpenShift Into Cloud Paks

The Cloud Paks allow IBM software to run across major public cloud providers like Amazon Web...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Lanner and GTT Leverage uCPE to Bolster SD-WAN Performance

Both companies announced new SD-WAN capabilities leveraging universal customer premises...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco assesses the top enterprise SD-WAN technology drivers

Cisco this week celebrated the second anniversary of its purchase of SD-WAN vendor Viptela and reiterated its expectation that 2019 will see the technology change enterprise networks in major ways.In a blog outlining trends in the SD-WAN world, Anand Oswal, Cisco senior vice president, engineering, in the company’s Enterprise Networking Business described how SD-WAN technology has changed the network for one of its customers,  test and measurement systems vendor National Instruments. To read this article in full, please click here

Cisco assesses the top enterprise SD-WAN technology drivers

Cisco this week celebrated the second anniversary of its purchase of SD-WAN vendor Viptela and reiterated its expectation that 2019 will see the technology change enterprise networks in major ways.In a blog outlining trends in the SD-WAN world, Anand Oswal, Cisco senior vice president, engineering, in the company’s Enterprise Networking Business described how SD-WAN technology has changed the network for one of its customers,  test and measurement systems vendor National Instruments. To read this article in full, please click here

How to enable serverless computing in Kubernetes

In the first two articles in this series about using serverless on an open source platform, I described how to get started with serverless platforms and how to write functions in popular languages and build components using containers on Apache OpenWhisk.

Here in the third article, I’ll walk you through enabling serverless in your Kubernetes environment. Kubernetes is the most popular platform to manage serverless workloads and microservice application containers and uses a finely grained deployment model to process workloads more quickly and easily.

Keep in mind that serverless not only helps you reduce infrastructure management while utilizing a consumption model for actual service use but also provides many capabilities of what the cloud platform serves. There are many serverless or FaaS (Function as a Service) platforms, but Kuberenetes is the first-class citizen for building a serverless platform because there are more than 13 serverless or FaaS open source projects based on Kubernetes.

However, Kubernetes won’t allow you to build, serve, and manage app containers for your serverless workloads in a native way. For example, if you want to build a CI/CD pipeline on Kubernetes to build, test, and deploy cloud-native apps from source code, you need to use your Continue reading

Extend CI/CD with CR for Continuous App Resilience

This is a guest post written by Govind Rangasamy, CEO and Founder, Appranix.

The radical shift towards DevOps and the continuous everything movement have changed how organizations develop and deploy software. As the consolidation and standardization of continuous integration and continuous delivery (CI/CD) processes and tools occur in the enterprise, a standardized DevOps model helps organizations deliver faster software functionality at a large scale. However, newer cyber threats, evolving regulatory requirements, and the need to protect brand reputation are putting tremendous pressure on IT leaders to effectively protect their customer and business-critical data.

Conceptually, DevOps pipeline approach makes a lot of sense, however, in practice, Site Reliability Engineering (SRE) and Ops teams optimize systems for service reliability and robustness at the cost of delivering new features. The need for software reliability inherently decreases Continuous Delivery (CD) throughput. This conundrum is the biggest challenge for any organization adopting DevOps practices at a large scale today. By integrating and extending CI/CD with Continuous Resilience (CR) to provide protection against multitudes of software reliability disruptions, DevOps teams can confidently deploy new software and not affect resiliency of the systems. In other words, Continuous Resilience is the radical new enabler that gives confidence for Continue reading

Cohesity Adds Security Capabilities With CyberScan

“Before us, backup data was just an expensive insurance policy. We are the first ones to make...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Asia-Pacific ICT Ministers Focus on Co-Creating the Future of the Internet

Last month, ICT ministers across Asia-Pacific got together in Singapore to decide on the direction of ICT development in the region. At the end of the three-day gathering, leaders adopted the Singapore Statement of the Asia-Pacific ICT Ministers on Co-creating a Connected Digital Future in the Asia-Pacific, a set of high-level policy guidelines that will set the tone for activities of the Asia-Pacific Telecommunity (APT) in the next five years. 
The Singapore Statement is significant in that it fortifies the principles that underpin a conducive environment for the digital economy to thrive:

  • It reinforces support for the multistakeholder approach, with states highlighting their own efforts to make ICT policy processes more inclusive during the meeting.
  • It renews its commitment to foster digital communities through collaborative projects to connect unserved and underserved areas.
  • It makes explicit references to interoperability and the free and secure flow of information online, putting equal weight on protecting users’ privacy.

It is particularly encouraging to see that amidst the race to capitalize on the vast amounts of data collected from us and our online activities, ICT Ministers opted to focus on trust –  built on accountability, transparency, and ethics – as a fundamental pillar in the Continue reading

Cisco TRex on Ubuntu Server 18.04

TRex is stateful and stateless traffic generator that is designed to benchmark platforms using realistic application traffic. It can generate L3-7 traffic and scale up to 20Gbps. TRex implements the both client and server side. The tutorial provides exact steps that you can follow to install TRex on Ubuntu Server 18.04. Hope you find it useful.

1. Preparing Qemu Ubuntu Server VM for TRex Installation

I assume that you have installed Ubuntu Server 18.0.4 on Qemu disk. Start Qemu Ubuntu Server VM.

$ /usr/local/bin/qemu-system-x86_64 -m 4G -enable-kvm Ubuntu18.04-server-TRex2.vmdk -serial telnet:localhost:2222,server,nowait

Assign IP address from the internal Qemu DHCP server to the guest NIC of Ubuntu Server VM.

$ sudo dhclient

IP address is 10.0.2.15/25 and the default gateway is 10.0.2.2. Now you can connect to the Ubuntu Server issuing telnet from the host.

$ telnet localhost 2222

Copy my script trex-vm.sh from the host to Ubuntu Server Qemu VM. The script installs packages required by TRex. It also redirects VM machine output to serial port and configures old-style Ethernet interfaces naming.

$ scp -rv [email protected]:/home/brezular/trx-vm.sh .

Assign execute privileges to the script and run the Continue reading

Juniper Pushes Security Into MX Routers, Updates Containerized Firewall

The vendor first started talking about Connected Security earlier this year. It involves a layered...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco simplifies Kubernetes container deployment with Microsoft Azure collaboration

Cisco seeks to enhance container deployment with a service to let enterprise customers run containerized applications across both Cisco-based on-premises environments and in the Microsoft Azure cloud.Customers can now further simplify deploying and managing Kubernetes clusters on-premises and in Azure Kubernetes Service (AKS) with one tool, using common identify and control policies, reducing manual tasks and ultimately time-to-market for their application environments, wrote Cisco’s Kip Compton, senior vice president of the company’s Cloud Platform and Solutions group in a blog about the work. To read this article in full, please click here