If you had to pick two really hot topics in the networking space right now, you’d be hard-pressed to find two more discussed than SD-WAN and microsegmentation. SD-WAN is the former “king of the hill” in the network engineering. I can remember having more conversations about SD-WAN in the last couple of years than anything else. But as the SD-WAN market has started to consolidate and iterate, a new challenger has arrived. Microsegmentation is the word of the day.
However, I think that SD-WAN and microsegmentation are quickly heading toward a merger of ideas and solutions. There are a lot of commonalities between the two technologies that make a lot of sense running together.
SD-WAN isn’t just about packet switching and routing any longer. That’s because networking people have quickly learned that packet-by-packet processing of traffic is inefficient. All of our older network analysis devices could only see things one IP packet at a time. But the new wave of devices think in terms of flows. They can analyze a stream of packets to figure out what’s going on. And what generates those flows?
Applications.
The key to the new wave of SD-WAN technology isn’t some kind of magic method Continue reading
MSP program customers are ensured compatibility with Cloudian’s technology partners’ software...
Having been around the block a time or two, I’ve seen my share of trade show event booth giveaways and all manner of tchotchkes, most of which find their way to a trash can before the visitor gets home. For the upcomingDell Technologies World 2019in Las Vegas, we wanted to do something different – something that would impact the world in a positive way.
So, we’ll be raffling off 100 “adoptions” of real North American pikas, as part of the National Wildlife Federation’s Adopt-a-Pika program.
A pika is a small mammal, closely related to rabbits – and it’s in trouble. As the NWF explains, “Pikas live in high mountain ecosystems that are cool and moist. Higher temperatures can cause the pikas to overheat.”
As global warming brings higher temperatures to the pika’s habitat, it’s creating real problems. Pikas can’t just go find higher ground where it’s cooler – because that higher ground is their natural habitat.
“Without our protection and help, American pikas could be the first species with the distinction of going extinct due to global warming,” the NWF says.
Helping to save the pika
To avoid that distinction, the NWF launched the “Adopt an Continue reading
As part of the settlement, Apple agreed to pay Qualcomm an undisclosed amount and inked a six-year...
Pushing your heritage application to the cloud won't digitally transform your company any more that slapping an Autobots symbol on your car makes it a Transformer. On today's Day Two Cloud podcast, guest Martin Ehrnst delves into the nuances of digital transformation in the enterprise.
The post Day Two Cloud 007: Digital Transformation Is More Than Just Cloud Migration appeared first on Packet Pushers.
This blog post will provide a deep dive on the distributed firewall (DFW) on VMware Cloud on AWS (VMC on AWS). Let’s start with the basic concepts of a distributed firewall:
The distributed firewall is an essential feature of NSX Data Center and essentially provides the ability to wrap virtual machines around a virtual firewall.
The virtual firewall is a stateful Layer 4 (L4) firewall – it’s capable of inspecting the traffic up to the Layer 4 of the OSI model: in simple terms, it means they look at IP addresses (source and destination) and TCP/UDP ports and filter the traffic based upon these criteria.
What’s unique about our firewall is that it has contextual view of the virtual data center – this means our distributed firewall can secure workloads based on VM criteria instead of just source and destination IP addresses.
Traditional firewalling is based on source and destination IPs – constructs that have no business logic or context into applications. Our distributed firewall can secure workloads based on smarter criteria such as the name of the virtual machine or metadata such as tags.
This enables us to build security rules based on business logic (using Continue reading
If the proposed merger with T-Mobile fails and SoftBank doesn’t invest further in Sprint, the...
A recent Rightscale enterprise survey had GKE as the seventh most used container tool by those...
The SD-WAN provider claims a 90% win-rate over legacy vendors and other SD-WAN products when...
“Had the attackers wanted to take down the DNS portion of the internet, they could have done...
For us at the Internet Society, the role that people play in our community is vital to carrying our message in favor of an open and trusted Internet for all. We rely on the contributions, knowledge, and experience of our members. For this reason, the Chapters of the Latin American and Caribbean region have come together to offer and implement a pilot training program for their members.
Active participation of people in their local chapter is one of the main objectives of the program. The people involved will contribute to the four focus areas of the Internet Society’s 2019 Action Plan and will adopt our narrative and tone of voice. The sessions of the program will have facilitators from the LAC region with extensive knowledge on the topics addressed. In addition there will be special sessions with participation of experts from Internet Society staff.
180 seats are available to be distributed among Chapters of the LAC region. The selected candidates will have the opportunity to be trained in Internet Governance; community networks and access; Internet technical security; or the Internet of Things and Public Policy. The general criteria for participating is published here, although it is important to emphasize Continue reading