Archive

Category Archives for "Networking"

Family Matters: Introducing the VMware NSX Portfolio

The new VMware NSX portfolio enables organizations to connect, secure and operate an edge-to-edge architecture and delivers networking and security services to applications and data wherever they reside.

This week at Dell Technologies World, Pat Gelsinger, VMware CEO, announced the new VMware NSX portfolio as part of the Virtual Cloud Network unveiling. The NSX networking and security portfolio provides consistent connectivity, integrated security, and the inherent automation to operate an end-to-end architecture that delivers applications and services everywhere. This innovative approach changes the way customers design and deliver services across their enterprises, and the NSX portfolio is the foundation upon which to build the Virtual Cloud Network. Leveraging the benefits of the cloud for the enterprise network is a fundamental shift from the past, where networking and security has relied on hardware-based appliances and features with limited automation abilities.

To support virtual cloud networking, organizations require a robust portfolio. Supporting our customers’ needs around any infrastructure, any cloud, any transport, any application, any platform, any device, we have been thinking about how we architect network elements that sit on top of those foundations. NSX has become a family brand to do just that from data center to cloud to branch Continue reading

Family Matters: Introducing the VMware NSX Portfolio

VMware NSX Portfolio The new VMware NSX portfolio enables organizations to connect, secure and operate an edge-to-edge architecture and delivers networking and security services to applications and data wherever they reside. This week at Dell Technologies World, Pat Gelsinger, VMware CEO, announced the new VMware NSX portfolio as part of the Virtual Cloud Network unveiling. The NSX networking and... Read more →

VMware Welcomes Tom Gillis as SVP & General Manager, Networking and Security Business Unit

Back at Interop Las Vegas in 2013, less than one year after VMware acquired Nicira, then VMware’s chief architect of networking Martin Casado stated what was probably the understatement of the decade: “it’s a very exciting time to be in networking.”

With the birth of software-defined networking, pioneered by folks like Casado, the industry entered into a transformation unlike anything we’ve seen since the invention of Ethernet. The entire industry — from fascinating start-ups to the big players — rushed to challenge networking’s historical operational model, leveraging the power of software to help move networking into the future. Customers have embraced this model, where they can not only provision networking components in minutes without the need to modify the application, but they can also deliver micro-segmentation and granular security to each individual workload. It’s become a huge part of the success story for our customers, our partners and VMware ourselves.

Since then, we have continued to build out the portfolio with Software-Defined WAN, multi-cloud networking, hybrid cloud connectivity and network operations management and visibility solutions. And this week at Dell Technologies World, our CEO Pat Gelsinger laid out the Virtual Cloud Network, our vision for a software-defined network architecture Continue reading

It’s time for network professionals to elevate their game

Enterprise networks certainly aren’t new. They’ve been around for decades and have historically been considered a tactical resource or even a commodity that most business leaders didn’t give a second thought to or really even understand.It’s my belief, though, that the network should be considered a strategic resource that can create competitive differentiation. In fact, for as long as I’ve been analyst, it’s been my thesis that compute changes have continually driven network evolution and have made it more and more important.The network is now a strategic business asset As the industry has gone from mainframes to minicomputers to client-server to the cloud era, a couple of things have happened. The first is that the cost of computing has continued to fall through the floor. When I started my career, just a few megabytes of storage could cost thousands of dollars. Today, I can buy terabytes of cloud-based storage for just a few dollars per month.To read this article in full, please click here

It’s time for network professionals to elevate their game

Enterprise networks certainly aren’t new. They’ve been around for decades and have historically been considered a tactical resource or even a commodity that most business leaders didn’t give a second thought to or really even understand.It’s my belief, though, that the network should be considered a strategic resource that can create competitive differentiation. In fact, for as long as I’ve been analyst, it’s been my thesis that compute changes have continually driven network evolution and have made it more and more important.The network is now a strategic business asset As the industry has gone from mainframes to minicomputers to client-server to the cloud era, a couple of things have happened. The first is that the cost of computing has continued to fall through the floor. When I started my career, just a few megabytes of storage could cost thousands of dollars. Today, I can buy terabytes of cloud-based storage for just a few dollars per month.To read this article in full, please click here

Review: Observium open-source network monitoring won’t run on Windows but has a great user interface, price

Open source network-monitoring tools continue to gain in popularity, and Observium came up on our radar as an enterprise-grade offering. Deployed worldwide by large organizations like eBay, PayPal, Twitter and the US Department of Energy, Observium is capable of handling tens of thousands of devices. The client list is impressive, but our test reveals what’s really under the hood.Observium runs on Linux but can monitor Windows and many other device types. The vendor recommends running Observium on Ubuntu/Debian, but it will also work on distros such as Red Hat/CentOS.[ Don’t miss customer reviews of top remote access tools and see the most powerful IoT companies . | Get daily insights by signing up for Network World newsletters. ] Since Apache and MySQL are prerequisites for Observium, your server needs to meet the hardware requirements to run them. In our test, a quad-core processor with 2GB of RAM and adequate storage provided enough horsepower to run our medium-size test environment.To read this article in full, please click here

Are Chatbots a Security Risk?

Chatbots – ingenious little bits of programming that have been making it possible for companies to automate the handling of queries, sales, and basic customer support. These bots are deployed through a number of different messaging platforms like Facebook Messenger, WhatsApp, etc.

And they have proven very popular. But, how secure is the tech? Lately, especially, there have been a lot of concerns raised. Say, for example, that I head out and use the Nordstrom app. I find the perfect pair of discounted sport shoes and want to buy them.

How safe am I entering my credit card details over the system? Or, more importantly, can chatbots be hacked?

Let's take a step back here for a second. Certainly, a chatbot is essentially just a program, and so, it makes sense that it could be hacked. But the danger is not likely to be any more than your local bank being hacked.

The same HTTPS protocols and metadata techniques used to provide security for the bank's site and messaging services can also secure the information transmitted via chatbots. The tech underlying the chatbot is similar, in fact, to your standard app, so it is not new.

The main difference here, Continue reading

Are Chatbots a Security Risk?

Chatbots – ingenious little bits of programming that have been making it possible for companies to automate the handling of queries, sales, and basic customer support. These bots are deployed through a number of different messaging platforms like Facebook Messenger, WhatsApp, etc.

And they have proven very popular. But, how secure is the tech? Lately, especially, there have been a lot of concerns raised. Say, for example, that I head out and use the Nordstrom app. I find the  perfect pair of discounted sport shoes and want to buy them.

How safe am I entering my credit card details over the system? Or, more importantly, can chatbots be hacked?

Let's take a step back here for a second. Certainly, a chatbot is essentially just a program, and so, it makes sense that it could be hacked. But the danger is not likely to be any more than your local bank being hacked.

The same HTTPS protocols and metadata techniques used to provide security for the bank's site and messaging services can also secure the information transmitted via chatbots. The tech underlying the chatbot is similar, in fact, to your standard app, so it is not new.

The main difference here, Continue reading

Azure accelerated networking: SmartNICs in the public cloud

Azure accelerated networking: SmartNICs in the public cloud Firestone et al., NSDI’18

We’re still on the ‘beyond CPUs’ theme today, with a great paper from Microsoft detailing their use of FPGAs to accelerate networking in Azure. Microsoft have been doing this since 2015, and hence this paper also serves as a wonderful experience report documenting the thought processes that led to an FPGA-based design, and lessons learned transitioning an all-software team to include hardware components.

There’s another reminder here too of the scale at which cloud vendors operate, which makes doing a project like this viable. The bulk purchase of FPGAs keeps their cost low, and the scale of the project makes the development investment worthwhile.

One question we are often asked is if FPGAs are ready to serve as SmartNICs more broadly outside Microsoft… We’ve observed that necessary tooling, basic IP blocks, and general support have dramatically improved over the last few years. But this would still be a daunting task for a new team… The scale of Azure is large enough to justify the massive development efforts — we achieved a level of performance and efficiency simply not possible with CPUs, and programmability far beyond an ASIC, Continue reading

Announcing Cumulus Linux 3.6 and…early access to Voyager!

The reign of proprietary networking in optical and data center interconnect falls

In furthering our mission to bring S.O.U.L. to networking through Simple, Open, Untethered, Linux-based networking solutions, and just on the heels of our Cumulus NetQ 1.3 announcement around simplifying container networking and operations, today we continue the mission to advance web-scale networking in the digital age with our release of Cumulus Linux 3.6. Our focus has been to help organizations move towards a modern world of simplification, flexibility and scale — where complex applications reside on standardized infrastructure that is automated, repeatable and scalable. We see a world of agility built upon cloud principles; of converged administrative teams where sysadmins can manage the network and network admins can manage systems.

What’s new in Cumulus Linux 3.6

In this release of Cumulus Linux 3.6, we are not only driving network efficiency and simplicity, but also expanding our solution set to include data center interconnect (DCI) use cases. Additionally, to help organizations adopt these web-scale principles in networking, we are enhancing our portfolio by adding popular networking capabilities to the open Linux platform. These include:

Voyager code is available for early access

From Continue reading

CONSENT: Privacy Is Key to Reinforcing Trust

To address mounting US user concerns, Senators Ed Markey (D-MA) and Richard Blumenthal (D-CT) have introduced the Consumer Online Notification for Stopping Edge-provider Network Transgressions (CONSENT) Act. (They have also introduced legislation to increase transparency and consumer privacy protection, though the text is not yet public.) While the Internet Society is weary of a reactionary regulatory trend and would rather see proactive anticipatory movement towards stronger privacy protections, we are supportive of legislation, like the CLOUD Act, that puts more control over how data is used in consumers’ hands, and moves towards a more user-centric Internet.

Currently, US users often have to go through an extensive and complicated process to opt out of data usage practices. Some may not even be aware that those options exist. Opt-out processes make data collection the “default” setting and weaken consumers’ ability to really consent to data handling practices.

The CONSENT Act, however, would require “edge-providers” (defined by the Act as persons that provide a service over the Internet) to notify users when they subscribe, establish an account, purchase, or begin receiving service if their data will be collected. This would make significant gains for user trust, as it would increase transparency at Continue reading

Rackspace offers on-premises ‘cloud’ and a bare-metal cloud offering

Rackspace’s latest project is called Private Cloud Everywhere and is a collaboration with VMware to offer what it calls Private Cloud as a Service (PCaaS), making on-demand provisioning of virtualized servers available at most colocation facilities and data centers.PCaaS basically means provisioning data center hardware the same way you would on Amazon Web Services, Microsoft Azure or Google Cloud, but instead of using the cloud providers, you use your own hardware, use Rackspace data centers, or set it up in a third-party colocation facility.Because customers have the option of deploying a private cloud wherever they want physically, it can help with data sovereignty requirements, such as rules in Europe that restrict data inside national borders.To read this article in full, please click here

Rackspace offers on-premises ‘cloud’ and a bare-metal cloud offering

Rackspace’s latest project is called Private Cloud Everywhere and is a collaboration with VMware to offer what it calls Private Cloud as a Service (PCaaS), making on-demand provisioning of virtualized servers available at most colocation facilities and data centers.PCaaS basically means provisioning data center hardware the same way you would on Amazon Web Services, Microsoft Azure or Google Cloud, but instead of using the cloud providers, you use your own hardware, use Rackspace data centers, or set it up in a third-party colocation facility.Because customers have the option of deploying a private cloud wherever they want physically, it can help with data sovereignty requirements, such as rules in Europe that restrict data inside national borders.To read this article in full, please click here