Archive

Category Archives for "Networking"

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Server sales projected to slow, while memory prices drop

The global server market grew about 5 percent in 2018, but it will slow in the first half of 2019, according to market researcher TrendForce. However, the company also projects a buyer’s market for DRAM, as a glut of memory hits and memory manufacturers slow down production.Enterprise servers continue to account for the majority of the global shipments, but the percentage of servers used for internet data centers, such as hyperscale data centers from Amazon and Facebook, grew to nearly 35 percent of total sales. [ Read also: How to plan a software-defined data-center network ] While total server sales were up 5 percent, with Q2 of 2018 being especially strong with more than 10 percent quarter-over-quarter growth in global server shipments, the shipment growth is expected to slow down to 2 percent in the first half of the year.To read this article in full, please click here

Server sales projected to slow, while memory prices drop

The global server market grew about 5 percent in 2018, but it will slow in the first half of 2019, according to market researcher TrendForce. However, the company also projects a buyer’s market for DRAM, as a glut of memory hits and memory manufacturers slow down production.Enterprise servers continue to account for the majority of the global shipments, but the percentage of servers used for internet data centers, such as hyperscale data centers from Amazon and Facebook, grew to nearly 35 percent of total sales. [ Read also: How to plan a software-defined data-center network ] While total server sales were up 5 percent, with Q2 of 2018 being especially strong with more than 10 percent quarter-over-quarter growth in global server shipments, the shipment growth is expected to slow down to 2 percent in the first half of the year.To read this article in full, please click here

Future Thinking: Chris Yiu

In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. While preparing to launch the 2019 Global Internet Report, we interviewed Chris Yiu to hear his perspective on the forces shaping the Internet’s future.

Chris is a senior policy fellow for technology in the Renewing the Centre team at the Tony Blair Institute for Global Change. His work focuses on how new technologies can be used to enhance the functioning of liberal democracy, and on policy solutions to the new economic challenges of automation and the digital economy. Chris was previously a general manager at Uber and has held senior roles in a number of public, private, and third-sector organizations. He recently authored the report, “A New Deal for Big Tech: Next-Generation Regulation Fit for the Internet Age (Tony Blair Institute for Global Change, 2018).

The Internet Society: In your report you write that this “new deal for big tech” is urgent for protecting democratic values globally. Why?

Chris Yiu: Political leaders face an external environment characterised by disruption Continue reading

Research: Legal Barriers to RPKI Deployment

Much like most other problems in technology, securing the reachability (routing) information in the internet core as much or more of a people problem than it is a technology problem. While BGP security can never be perfect (in an imperfect world, the quest for perfection is often the cause of a good solution’s failure), there are several solutions which could be used to provide the information network operators need to determine if they can trust a particular piece of routing information or not. For instance, graph overlays for path validation, or the RPKI system for origin validation. Solving the technical problem, however, only carries us a small way towards “solving the problem.”

One of the many ramifications of deploying a new system—one we do not often think about from a purely technology perspective—is the legal ramifications. Assume, for a moment, that some authority were to publicly validate that some address, such as 2001:db8:3e8:1210::/64, belongs to a particular entity, say bigbank, and that the AS number of this same entity is 65000. On receiving an update from a BGP peer, if you note the route to x:1210::/64 ends in AS 65000, you might think you are safe in using this Continue reading

Episode 42 – SD-WAN Beyond The Hype

There’s no doubt that Software-Defined Wide Area Networking is one of the most hyped technologies we’ve seen recent history. From cost savings to unprecedented simplicity, no claim seemed to be off limits when it came to controller driven networks. Now that’s it’s 2019 and some of the dust is settling we wanted to have a chat with a couple of engineers who have been in the thick of it and know what it’s really like to design, implement, and operate Software-Defined WANs.


 

We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective.


We would also like to think PathSolutions for sponsoring this episode of Network Collective. PathSolutions TotalView is designed to automatically dig deep into network devices to learn what they know about your network’s performance. This means your network is no longer full of mysteries because you know everything your network knows. Try TotalView on your Continue reading

Orange Matter: Where is Your Configuration Source of Truth?

Orange Matter Logo

I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. The post linked here looks at where we define our source of truth for device configurations; is it the device itself? Should it be? This is a key question when looking at automation, and one we should all be asking ourselves.

This post appeared on Orange Matter as “Where Is Your Config Source of Truth?“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent, which is perhaps a bit more in character.

Where Is Your Config Source of Truth?

I’d love it if you were to take a moment to visit and read, and maybe even comment!

If you liked this post, please do click through to the source at Orange Matter: Where is Your Configuration Source of Truth? and give me a share/like. Thank you!

What Makes IoT A Security Risk?

IoT security is a pretty hot topic in today’s world. That’s because the increasing number of smart devices is causing issues with security professionals everywhere. Consumer IoT devices are expected to top 20 billion by 2020. And each of these smart devices represents an attack surface. Or does it?

Hello, Dave

Adding intelligence to a device increases the number of ways that it can compromised. Take a simple thermostat, for example. The most basic themostat is about as dumb as you can get. It uses the expansion properties of metal to trigger switches inside of the housing. You set a dial or a switch and it takes care of the rest. Once you start adding things like programmability or cloud connection, you increase the number of ways that you can access the device. Maybe it’s a webpage or an app. Maybe you can access it via wireless or Bluetooth. No matter how you do it, it’s more available than the simple version of the thermostat.

What about industrial IoT devices? The same rule applies. In this case, we’re often adding remote access to Supervisory Control And Data Acquistion (SCADA) systems. There’s a big market from enterprise IT providers to create Continue reading

Survey: Enterprises want end-to-end management of SD-WAN

(Editor’s note: Recent research by Enterprise Management Associates takes a look at how enterprises view currently available SD-WAN products. This article by Shamus McGillicuddy, EMA’s research director for network management, details highlights of  “Wide-Area Network Transformation: How Enterprises Succeed with Software-Defined WAN,” a report based on EMA’s survey of 305 WAN decision-makers at distributed enterprises. EMA has posted a free webinar  about the report.) To read this article in full, please click here

Survey: Enterprises want end-to-end management of SD-WAN

(Editor’s note: Recent research by Enterprise Management Associates takes a look at how enterprises view currently available SD-WAN products. This article by Shamus McGillicuddy, EMA’s research director for network management, details highlights of  “Wide-Area Network Transformation: How Enterprises Succeed with Software-Defined WAN,” a report based on EMA’s survey of 305 WAN decision-makers at distributed enterprises. EMA has posted a free webinar  about the report.) To read this article in full, please click here

SD-WAN Reality Gap

Here’s some feedback I got from a subscriber who got pulled into an SD-WAN project:

I realized (thanks to you) that it’s really important to understand the basics of how things work. It helped me for example at my work when my boss came with the idea “we’ll start selling SD-WAN and this is the customer wish list”. Looked like business-as-usual until I realized I’ve never seen so big a difference between reality, customer wishes and what was promised to customer by sales guys I never met. And the networking engineers are supposed to save the day afterwards…

How did your first SD-WAN deployment go? Please write a comment!