Archive

Category Archives for "Networking"

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

Next Generation Global Connectivity

Technologies like SDWAN have fundamentally changed the way we think about WAN infrastructures for enterprise IT environments over the past few years. Global WAN offerings are no longer a necessity as pretty much ‘any’ connectivity will do. You are no longer bound to private (MPLS-based) connections/networks. Software and smarter routing mechanisms will fix all your […]

Edge security: There’s lots of attack surfaces to worry about

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don’t – or, in some cases, can’t – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process Continue reading

Edge security: There’s lots of attack surfaces to worry about

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don’t – or, in some cases, can’t – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process Continue reading

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router – No. 3: It’s MPLS Contract Renewal Time

Silver Peak continues to count down the Top Ten Reasons to Think Outside the Router in our homage to the iconic David Letterman Top Ten List from his former Late Show. Click for the #4,  #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router – No. 3: It’s MPLS Contract Renewal Time

Silver Peak continues to count down the Top Ten Reasons to Think Outside the Router in our homage to the iconic David Letterman Top Ten List from his former Late Show. Click for the #4,  #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here