Archive

Category Archives for "Networking"

IDG Contributor Network: Are you seeing what I’m seeing?

Enterprises are investing in their networks at an accelerating rate. As legacy IT on-premises infrastructure gives way to hybrid cloud and virtualized environments, and an escalating data tsunami drives data center expansions, increasing investments of time and money are raising the stakes ever higher. Unfortunately, end users’ expectations for service are growing as well, piling additional demands onto network operators and engineers who are already wrestling with network migration challenges.Yet despite the fact that the enterprise networking environment is rapidly changing, IT support teams are still using the same network performance metrics to monitor their networks and evaluate whether or not service delivery is up to par. The problem is that they’re using a one-dimensional tool to measure a subjective experience that tool was not designed to even understand, much less aid in troubleshooting.  It’s kind of like trying to tighten a screw with a hammer.To read this article in full, please click here

IDG Contributor Network: Are you seeing what I’m seeing?

Enterprises are investing in their networks at an accelerating rate. As legacy IT on-premises infrastructure gives way to hybrid cloud and virtualized environments, and an escalating data tsunami drives data center expansions, increasing investments of time and money are raising the stakes ever higher. Unfortunately, end users’ expectations for service are growing as well, piling additional demands onto network operators and engineers who are already wrestling with network migration challenges.Yet despite the fact that the enterprise networking environment is rapidly changing, IT support teams are still using the same network performance metrics to monitor their networks and evaluate whether or not service delivery is up to par. The problem is that they’re using a one-dimensional tool to measure a subjective experience that tool was not designed to even understand, much less aid in troubleshooting.  It’s kind of like trying to tighten a screw with a hammer.To read this article in full, please click here

Vapor IO secures new funding for major U.S. rollout

Vapor IO, the edge computing specialist that builds mini data centers for deployment at locations such as cell phone towers, has secured Series C financing, which the company says will help accelerate the deployment of its Kinetic Edge Platform as a national network for edge colocation.Vapor IO has been all about developing a model for a distributed network of edge colocation sites, with micro modular data centers in containers about the size of a shipping container. The company had been working with Crown Castle, the nation’s largest provider of shared wireless infrastructure, on an edge collaboration project under the name Project Volutus.Vapor IO has now acquired the assets of Project Volutus from Crown Castle and will offer it under the brand name The Kinetic Edge. It uses both wired and wireless connections to create a low-latency network of its colocation sites, allowing cloud providers, wireless carriers and web-scale companies to deliver cloud-based edge computing applications via its data centers.To read this article in full, please click here

Vapor IO secures new funding for major U.S. rollout

Vapor IO, the edge computing specialist that builds mini data centers for deployment at locations such as cell phone towers, has secured Series C financing, which the company says will help accelerate the deployment of its Kinetic Edge Platform as a national network for edge colocation.Vapor IO has been all about developing a model for a distributed network of edge colocation sites, with micro modular data centers in containers about the size of a shipping container. The company had been working with Crown Castle, the nation’s largest provider of shared wireless infrastructure, on an edge collaboration project under the name Project Volutus.Vapor IO has now acquired the assets of Project Volutus from Crown Castle and will offer it under the brand name The Kinetic Edge. It uses both wired and wireless connections to create a low-latency network of its colocation sites, allowing cloud providers, wireless carriers and web-scale companies to deliver cloud-based edge computing applications via its data centers.To read this article in full, please click here

Virtual Cloud Network Deep Dive: Join us in Minneapolis and the Bay Area!

Business moves fast in today’s digital landscape. Applications, services, and data are becoming more distributed, while threats are becoming more sophisticated. From data centers and the cloud to branches and the edge, IT teams are responsible for more environments than ever before, and the complexity is only increasing.

If your IT organization is under pressure to stay productive, increase agility, and help the business innovate, you know that expectations are high. You’re on the hook to:

  • Expand your software fluency and vendor agnostic knowledge for complex, interdependent infrastructures
  • Deliver a seamless and secure cross-cloud networking strategy
  • Keep up with continually changing applications and rapid development lifecycles
  • Identify every threat across environments, no matter how many alerts there are

Traditional, hardware-based approaches to networking and security can’t help you do all that. They’re inflexible and slow-moving; they require time-consuming manual intervention; they can’t connect and protect all the apps your business needs. That’s why it’s time to reinvent the network…in software.

 

Build Your Foundation for a Virtual Cloud Network

Our digital, app-centric world can be daunting, but a programmable network was built to meet these changing demands and evolve right along with them. VMware NSX® delivers the foundation for a Continue reading

Cisco introduces its first server built for AI and ML workloads

Cisco has introduced its first Unified Compute System (UCS) server designed specifically to handle artificial intelligence (AI) and machine learning (ML) workloads. The Cisco UCS C480 ML is designed specifically for data scientists to perform AI and ML at every stage of the lifecycle.It’s not like Cisco whipped up all kinds of special sauce for this server; it’s just a lot of very high-end components. The UCS C480 ML M5 rack server is a 4U device with the latest Intel Xeon processors and 8 Nvidia Tesla V100-32G GPUs with NVLink interconnects.The top-of-the-line configuration features two Xeon processors, up to 128GB of DDR4 RAM, 24 SATA hard drives or SSDs, six NVMe SSD drives, and four x100G Virtual Interface Cards (VICs). The UCS C480 ML M5 is designed to work with Cisco's various servers and HyperFlex systems with GPUs.To read this article in full, please click here

IDG Contributor Network: Logistics and delivery – Embracing the IoT before it was ‘IoT’

Some people love to use the expression “before it was cool”. In hindsight, it can be applied to almost anything that gains acclaim. According to this Reddit thread, for example, Facebook was already cool when it was still known simply as “The Facebook” way back in 2004. My point: the “before it was cool” expression is really about when something’s value or significance is recognized very early on, and this can certainly be applied to many of the technological advancements we see today. Connecting devices, or instrumenting machinery with some form of connectivity, to capture data and provide control, was a used in many industries, before the term ‘Internet of Things’ or ‘IoT’ became cool and all pervasive.To read this article in full, please click here

AWS ABC’s – Logging Into a New EC2 Instance

Ok, you’ve just launched an Amazon EC2 instance (ie, a virtual machine) and you’re ready to login and get to work. Just once teeeensy problem though… you have no idea how to actually connect to the instance!

This post will walk through how to log into brand new Linux/BSD and Windows instances (the steps are slightly different for different OS families).

Regardless of the operating system, one requirement must be met: you must have connectivity into the Virtual Private Cloud (VPC) where you’ve launched the instance. This could be by giving the instance a public IP address so it’s reachable via the Internet or it could be via a VPN or other private connectivity into the VPC. The rest of the article assumes that this basic network connectivity is in place.

Linux/BSD Instances

Linux/BSD instances are accessible via SSH. When the instance is launched, the Amazon Machine Image (AMI)–which acts like the template from which your instance is cloned–is setup to generate the necessary SSH host keys on first boot. You will have to provide the user key.

The Linux/FreeBSD AMIs used to launch the instance must support the generation of SSH host keys on first boot. The AMIs from Continue reading