Archive

Category Archives for "Networking"

Weekly Show 416: From Reactive To Proactive NetOps With Cisco NAE (Sponsored)

Today's sponsored Weekly Show dives into Cisco's Network Assurance Engine. This software creates a real-time and continuously updated model of the network that IT can use to assess the impact of changes, get deep visibility into network state, and move network ops from reactive to proactive. We hear from an IT engineer inside Cisco who uses NAE in production.

The post Weekly Show 416: From Reactive To Proactive NetOps With Cisco NAE (Sponsored) appeared first on Packet Pushers.

Gotcha pricing from the cloud pushes workloads back on premises

A new survey by cloud software vendor Nutanix finds that most firms are embracing the hybrid model, but few have actually achieved it. And many are shifting their workloads back on premises because of cloud costs.This was Nutanix’s first global Enterprise Cloud Index, so it doesn’t have historical data by which to measure, but its initial findings match what we’ve known for a while. Read also: How to make hybrid cloud work The hybrid cloud, a mix of on-premises and public cloud computing, working in tandem is the preferred method for most firms; 91 percent to be exact. But only 19 percent of firms surveyed said they have that model today. One reason is that app vendors make it hard to operate in hybrid mode, said Wendy Pfeiffer, CIO at Nutanix.To read this article in full, please click here

Gotcha pricing from the cloud pushes workloads back on premises

A new survey by cloud software vendor Nutanix finds that most firms are embracing the hybrid model, but few have actually achieved it. And many are shifting their workloads back on premises because of cloud costs.This was Nutanix’s first global Enterprise Cloud Index, so it doesn’t have historical data by which to measure, but its initial findings match what we’ve known for a while. Read also: How to make hybrid cloud work The hybrid cloud, a mix of on-premises and public cloud computing, working in tandem is the preferred method for most firms; 91 percent to be exact. But only 19 percent of firms surveyed said they have that model today. One reason is that app vendors make it hard to operate in hybrid mode, said Wendy Pfeiffer, CIO at Nutanix.To read this article in full, please click here

Why Is The CCIE Lab Moving?

Cisco confirmed big CCIE rumor this week that the RTP lab was going to be moved to Richardson, TX.

The language Cisco used is pretty neutral. San Jose and RTP are being shut down as full time lab locations and everyone is moving to Richardson. We knew about this thanks to the detective work of Jeff Fry, who managed to figure this out over a week ago. Now that we know what is happening, why is it coming to pass?

They Don’t Build Them Like They Used To

Real estate is expensive. Anyone that’s ever bought a house will tell you that. Now, imagine that on a commercial scale. Many companies will get the minimum amount of building that they need to get by. Sometimes they’re bursting at the seams before they upgrade to a new facility.

Other companies are big about having lots of area. These are the companies that Continue reading

Introducing Apps with Workers

Introducing Apps with Workers

Since its inception, Cloudflare Apps has made it possible for website owners to install a tool or a service directly onto a domain they have that lives on the Cloudflare network.  As an App Developer, you’ve had the ability to deliver your product by modifying traffic and content of a user’s website using a combination of Javascript, HTML, CSS injection with the ability to modify Cloudflare features such as DNS.

Today we are announcing a public beta for our Cloudflare Apps with Workers!  If you are a developer who has been using Workers or Cloudflare Apps, this is a significant step forward to bring together our server-less platform allowing you the next wave of innovation in the Cloudflare marketplace.

Wait!  Yet more Workers news?  It’s already been a furious year of releases for Workers, from our GA launch in February to numerous improvements including the beta of Cache API and a flurry of updates during Cloudflare’s Birthday week, where we made available our K/V Storage and WASM support.  With this beta, developers can now package all Workers capabilities, deliver new worker-powered experiences to Cloudflare customers all within a few clicks via Cloudflare Apps.

Now your Apps can be more powerful, Continue reading

El Buen Fin: Tips to Shop Smart

Last week I had the opportunity to participate in the first edition of the International Internet and Entrepreneurship Forum (FIIE), in Monterrey, Mexico. The event was convened by NIC Mexico and other organizations of the Internet community of Latin America and the Caribbean as part of the activities of INCmty, an entrepreneurial festival with several years of tradition. The intersection between both topics is a fertile ground for reflection, especially in relation to the security of Internet of Things (IoT) devices.

IoT for Innovation and Entrepreneurship

The Internet has been known as a technology for facilitating innovation and entrepreneurship. The pace of technological development, together with the evolution of the Internet, has given rise to new solutions that seek to make life easier. Such is the case of the various devices connected to the Internet, which form the Internet of Things ecosystem.

Therefore, one of the issues addressed during the Forum was the role of IoT devices in the entrepreneurial ecosystem in the LAC region. There I took the opportunity to share the Internet Society’s vision of IoT security: we want people to benefit from the use of these devices in a trustworthy environment. The issue is particularly Continue reading

Securing the IoT has become business-critical

The IoT era has arrived.Here's some proof: 83% of organizations say the Internet of Things (IoT) is important to business today, and 92% say it will be in two years.That's according to a recent DigiCert survey conducted by ReRez Research of 700 organizations in five countries to better understand the IoT and IoT security.Anecdotally, I always find that markets have matured when it’s no longer an unusual thing. For example, a few years ago, it was hard to find IoT deployments that were outside of the traditional machine-to-machine industries such as manufacturing and oil and gas. Today, connected things are everywhere. Case in point: I recently interviewed the IT director at an entertainment venue and he walked me through all the connected things without ever saying “IoT.” The organization was connecting more things to improve customer experience, and it was treated as no big deal.To read this article in full, please click here

Securing the IoT has become business-critical

The IoT era has arrived.Here's some proof: 83% of organizations say the Internet of Things (IoT) is important to business today, and 92% say it will be in two years.That's according to a recent DigiCert survey conducted by ReRez Research of 700 organizations in five countries to better understand the IoT and IoT security.Anecdotally, I always find that markets have matured when it’s no longer an unusual thing. For example, a few years ago, it was hard to find IoT deployments that were outside of the traditional machine-to-machine industries such as manufacturing and oil and gas. Today, connected things are everywhere. Case in point: I recently interviewed the IT director at an entertainment venue and he walked me through all the connected things without ever saying “IoT.” The organization was connecting more things to improve customer experience, and it was treated as no big deal.To read this article in full, please click here

Network operations: A new role for AI and ML

Artificial intelligence (AI) and machine learning (ML) are still viewed with skepticism by many in IT, despite a decades-long long history, continuing advances within academia and industry, and numerous successful applications. But it’s not hard to understand why: The very concept of an algorithm running on a digital computer being able to duplicate and even improve upon the knowledge and judgement of a highly-experienced professional – and, via machine learning, improve these results over time – still sounds at the very least a bit off in the future. And yet, thanks to advances in AI/ML algorithms and significant gains in processor and storage performance and especially the price/performance of solutions available today, AI and ML are already hard at work in network operations, as we’ll explore below.To read this article in full, please click here(Insider Story)

Network operations: A new role for AI and ML

Artificial intelligence and machine learning are still viewed with skepticism by many in IT, despite a decades-long long history, continuing advances within academia and industry, and numerous successful applications. But it’s not hard to understand why: The very concept of an algorithm running on a digital computer being able to duplicate and even improve upon the knowledge and judgement of a highly-experienced professional – and, via machine learning, improve these results over time – still sounds at the very least a bit off in the future. And yet, thanks to advances in AI/ML algorithms and significant gains in processor and storage performance and especially the price/performance of solutions available today, AI and ML are already hard at work in network operations, as we’ll explore below.To read this article in full, please click here(Insider Story)

Announcing SSH Access through Cloudflare

Announcing SSH Access through Cloudflare

We held our annual Cloudflare Retreat last week. Over 750 team members from nearly a dozen offices spent three days learning, bonding and some of them got to smash a VPN piñata on stage with a baseball bat. Yes, you read that right.

The latest feature added to Cloudflare Access let us celebrate the replacement of our clunky VPN with a faster, safer way to reach our internal applications. You can now place applications that require SSH connections, like your source control repository, behind Cloudflare Access. We’re excited to release that same feature so that your team can also destroy your own VPN (piñata not included).

Announcing SSH Access through Cloudflare

How we smashed our VPN

We built Access to replace our corporate VPN. We started with browser-based applications, moved to CLI operations, and then began adding a growing list of single sign-on integrations. Our teammates added single sign-on support to the Cloudflare dashboard by combining Access and our serverless product, Workers. We improved the daily workflow of every team member each time we moved another application behind Access. However, SSH connections held us back. Whenever we needed to push code or review a pull request, we had to fall back to our Continue reading

Segment Routing and MPLS VPN

MPLS VPN and Segment Routing. Many people have been asking what are the differences between MPLS VPN and Segment Routing.       In fact, this is a wrong question, because Segment Routing provides transport, MPLS VPN provides Service.   They are not mutually exclusive but they are complementary. In order to create end to …

The post Segment Routing and MPLS VPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Segment Routing and MPLS VPN

MPLS VPN and Segment Routing. Many people have been asking what are the differences between MPLS VPN and Segment Routing.       In fact, this is a wrong question, because Segment Routing provides transport, MPLS VPN provides Service.   They are not mutually exclusive but they are complementary. In order to create end to …

The post Segment Routing and MPLS VPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Segment Routing and MPLS VPN

MPLS VPN and Segment Routing. Many people have been asking what are the differences between MPLS VPN and Segment Routing.       In fact, this is a wrong question, because Segment Routing provides transport, MPLS VPN provides Service.   They are not mutually exclusive but they are complementary. In order to create end to […]

The post Segment Routing and MPLS VPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.