Archive

Category Archives for "Networking"

BrandPost: Is Your IT Environment a Barrier to the Cloud?

The promise of cloud services as the means of delivering applications and services is quite attractive. However, in the rush to adopt cloud services, a few myths have been created that can lead to bad decisions and botched implementations. One myth that has created more problems than most is the belief that, by using the cloud, a company doesn’t have to worry about its on-premises IT infrastructure or the support systems for it.The assertion that cloud service providers “handle everything” is not really true. They provide access to the services as long as your equipment can get you to their data center. While this may reduce the load on your servers and potentially your storage hardware, in many instances using the cloud creates a need for new networking hardware to support much higher wide-area network (WAN) utilization both in terms of number of users and the amount of data traffic. When companies want to use multiple network carriers for cost, reliability, and performance issues, the result may be more network hardware than initially expected.To read this article in full, please click here

Space Invaders – Consumer Grade IoT in the Enterprise

I used to love the old Space Invaders arcade game – waves of enemy attackers came in faster and faster while you tried to defend your base. With experience you could learn their tactics and get pretty adept at stopping them. For today’s enterprise IT staff, consumer-grade IoT devices must certainly feel like those space invaders of old.

There’s good news and bad news about these new creatures in the enterprise. The good news is that they don’t start with mal-intent and can be profiled well enough to confine their activity. The bad news is that they’re coming in waves, often slipping under the radar, and the consequences can be much bigger than getting blasted and placing a few more quarters in the slot.

To help enterprise IT staff deal with this new wave we released “The Enterprise IoT Security Checklist: Best Practices for Securing Consumer-Grade IoT in the Enterprise” today, outlining best practices for securing consumer-grade IoT in the enterprise. The Checklist includes ten actions, based roughly in chronological order from purchase, through installation, to ongoing support, meant to raise awareness of the common vulnerabilities presented by these devices and how to address them.

Many of these Continue reading

How to do math on the Linux command line

Can you do math on the Linux command line? You sure can! In fact, there are quite a few commands that can make the process easy and some you might even find interesting. Let's look at some very useful commands and syntax for command line math.expr First and probably the most obvious and commonly used command for performing mathematical calculations on the command line is the expr (expression) command. It can manage addition, subtraction, division, and multiplication. It can also be used to compare numbers. Here are some examples:Incrementing a variable $ count=0 $ count=`expr $count + 1` $ echo $count 1 Performing a simple calculations $ expr 11 + 123 134 $ expr 134 / 11 12 $ expr 134 - 11 123 $ expr 11 * 123 expr: syntax error <== oops! $ expr 11 \* 123 1353 $ expr 20 % 3 2 Notice that you have to use a \ character in front of * to avoid the syntax error. The % operator is for modulo calculations.To read this article in full, please click here

BrandPost: Adaptive Network Webinar Series

Check out our webinar series – hear from industry analysts to learn about the Adaptive Network and gain insights on network transformation at the speed of business.Live Webinar: Harness the Power of Automation through Intent-Based Policy Date / Time: Tuesday, April 17, 2018, 11:00 a.m. New York/ 4:00 p.m. LondonOverview:Network providers are struggling to keep pace with escalating demand. Rapid traffic increases and the threat of network performance failures have put a premium on automation. But it's important for providers to maintain control of their networks as they automate. How can an automation platform help remove obstacles and still give the control providers need to accelerate the business?To read this article in full, please click here

New marketplace for FPGA custom apps launches

A French company called Accelize has launched AccelStore, an app store specifically around providing custom programmed applications for FPGA accelerators.FPGAs are dedicated processors known for doing two things: very fast processing, and being reprogrammable. CPUs have to be general-purpose processors that run an OS, but an FPGA has the luxury of doing a dedicated task, so the architecture is different.The problem is that while FPGAs are reprogrammable to do new, specific tasks, they aren’t that easy to program. In fact, it’s often pretty hard to do. That’s Accelize’s sales pitch. Rather than writing the code to reprogram the FPGAs in your servers, it has the templates for you.To read this article in full, please click here

New marketplace for FPGA custom apps launches

A French company called Accelize has launched AccelStore, an app store specifically around providing custom programmed applications for FPGA accelerators.FPGAs are dedicated processors known for doing two things: very fast processing, and being reprogrammable. CPUs have to be general-purpose processors that run an OS, but an FPGA has the luxury of doing a dedicated task, so the architecture is different.The problem is that while FPGAs are reprogrammable to do new, specific tasks, they aren’t that easy to program. In fact, it’s often pretty hard to do. That’s Accelize’s sales pitch. Rather than writing the code to reprogram the FPGAs in your servers, it has the templates for you.To read this article in full, please click here

VMware AppDefense Introduces Least Privilege Security for Containerized Applications

Summary: VMware AppDefense continues to advance with new capabilities, new partnerships, international expansion, and increasing customer adoption

 

As worldwide spending on IT security continues to climb, the odds of falling victim to a data breach have risen to 1 in 4. Despite a multitude of security products on the market and large budgets to purchase them, businesses are not significantly safer. The commoditization of cyber crime has made it possible for virtually anyone with a computer to launch a sophisticated attack against a company and new attacks are being developed every day. This means the continued focus on chasing threats remains relatively ineffective to stamping out the broader challenges facing IT security.

This is a scary prospect for CISOs who are faced with securing the applications and data living in increasingly dynamic, distributed IT environments. And as more businesses embrace modern, agile application development processes, the problem of implementing security at the speed of the business is exacerbated – security is often seen as an obstacle to progress.

We created VMware AppDefense to address these very issues, with a unique approach that leverages the virtualization layer to protect applications by “ensuring good” rather than “chasing bad”. AppDefense leverages VMware’s Continue reading

BrandPost: 3 ways Extreme Networks wins over other network vendors

Extreme Networks recently released a new report, “Quantifying the Value of the New Extreme Networks Solution” (an Enterprise Strategy Group Economic Value Validation report), to show the IT community how deploying our new solution can generate ROI and slash costs significantly, particularly in comparison with other network vendors.When we embarked on this journey, our goal was to make the resources of our organization part of the package. Customers should have access to a comprehensive network solution that goes beyond solving their immediate technology problems and extends into cost savings and economic benefit opportunities, period. This is why we engaged ESG to execute their Economic Value Audit process—to show you how you can realize unparalleled savings through Extreme.To read this article in full, please click here