Archive

Category Archives for "Networking"

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.Today’s enterprise firewalls must be able to secure an increasingly complex network that includes traditional on-premises data center deployments, remote offices and a range of cloud environments. Then you have to implement and test the firewall once it's installed. Perhaps the only element more complex than configuring, testing and managing a next-generation firewall is the decision-making process regarding which product to trust with your enterprise security.To read this article in full, please click here(Insider Story)

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.To read this article in full, please click here(Insider Story)

The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.To read this article in full, please click here(Insider Story)

Figuring Out AWS Networking

One of my friends reviewing the material of my AWS Networking webinar sent me this remark:

I'm always interested in hearing more about how AWS network works under the hood – it’s difficult to gain that knowledge.

As always, it’s almost impossible to find out the behind-the-scenes details, and whatever Amazon is telling you at their re:Invent conference should be taken with a truckload of salt… but it’s relatively easy to figure out a lot of things just by observing them and performing controlled experiments.

Read more ...

YANG, OpenAPI, Swagger and Code Generation

Sometimes during exploration or projects, I want to take a YANG model and convert it along with related dependencies to a Swagger format (think OpenAPI if you’re not familiar with this) so I can create a REST or RESTConf API interface. OpenDayLight does something very similar for it’s Swagger based North Bound Interface (NBI), more information here and just being able to look at the model this way is sometimes helpful. If you’re wondering how helpful this could be, think about developing a client. Using this approach, it’s possible to create stub client and server code for a software implementation, leaving just the logic of what to do when a POST is made or a GET is requested etc.

You may be familiar enough with YANG to know that YANG is a modeling language with its own extensible type system. These YANG models are mostly used for modeling how a programmatic interface to control a feature should be on routers and switches. More recently thanks to the wave of automation sweeping across the globe, YANG models are now used for modeling services, which in turn are rendered over one or more nodes by something else. We’re not going to cover Continue reading

IoT roundup: Content delivery networks make a play for IoT business

It’s a measure of how big and meaningful a particular technology trend is when big companies that weren’t necessarily in on the ground floor start making a major push for relevance in the market. A couple years ago, every tech company in the world couldn’t wait to tell you about how into the cloud they were, and the same thing is happening to IoT. The pivots, they are a-comin’.This month, some of the heavy hitters moving to make themselves more appealing to the burgeoning IoT market are content delivery networks (CDN) like Akamai and Limelight, both of which were eager to trumpet their edge credentials. More on IoT:To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

Reaction: The Importance of Open APIs

Over at CIMI, Tom Nolle Considers whether the open API is a revolution, or a cynical trap. The line of argument primarily relates to accessing functions in a Virtual Network Function (VNF), which is then related to Network Function Virtualization (NFV). The broader point is made in this line:

One important truth about an API is that it effectively imposes a structure on the software on either side of it. If you design APIs to join two functional blocks in a diagram of an application, it’s likely that the API will impose those blocks on the designer.

This is true—if you design the API first, it will necessarily impose information flow between the different system components, and even determine, at least to some degree, the structure of the software modules on either side of the API. For instance, if you decide to deploy a single network appliance vendor, then your flow of building packet filters will be similar across all devices. However, if you add a second vendor into the mix, you might find the way packet filters are described and deployed are completely different, requiring a per-device module that moves from intent to implementation.

While this problem will always Continue reading

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

Interview with Juniper Networks Ambassador Jeff Fry

In this first ever Juniper Ambassador interview, I spend time with fellow Juniper Ambassador Jeff Fry at the Juniper NXTWORK 2018 conference in Las Vegas. We discuss his life as an Ambassador, his job at Dimension Data, his recent contribution to the 2018 Juniper Ambassador’s Cookbook, his interest in DevOps and automation, and his contribution …