Archive

Category Archives for "Networking"

What is hybrid cloud really, and what’s the best strategy?

Ask a group of IT leaders to define what a hybrid cloud is, and their answers are likely to be as diverse as the companies they work for. Once a black-and-white definition describing organizations with a mix of apps that reside in both the public cloud and in enterprise data centers, a hybrid cloud has now become much more complicated as the number of apps used in the enterprise grows and their integration requirements mount.  The average company uses more than 1,400 cloud services, according to Skyhigh Networks, often because lines of business are being pressured to innovate, leaving little time to develop a strategy for the most efficient and cost-effective way to run them.To read this article in full, please click here

Understanding Virtual Private Networks [and why VPNs are important to SD-WAN]

Internet-based virtual private networks rose to popularity in the 1990s by providing cost-effective connections securely across an insecure internet, and along the way VPNs have provided the impetus for today’s SD-WAN technology.VPN definition The definition of a virtual private network (VPN) is creating a secure network over network transport that is less secure, such as the internet. [ Click here to find out more about SD-WAN and why you’ll use it one day and learn about WANs and where they’re headed. | Get regularly scheduled insights by signing up for Network World newsletters. ] VPNs are used to connect two or more nodes in a network and are most commonly used to connect individual users’ machines to sites or to connect sites to sites.  It’s possible to connect users to each other, but the use case for that is very limited so such deployments are rare. To read this article in full, please click here

What is hybrid cloud really, and what’s the best strategy?

Ask a group of IT leaders to define what a hybrid cloud is, and their answers are likely to be as diverse as the companies they work for. Once a black-and-white definition describing organizations with a mix of apps that reside in both the public cloud and in enterprise data centers, a hybrid cloud has now become much more complicated as the number of apps used in the enterprise grows and their integration requirements mount.  The average company uses more than 1,400 cloud services, according to Skyhigh Networks, often because lines of business are being pressured to innovate, leaving little time to develop a strategy for the most efficient and cost-effective way to run them.To read this article in full, please click here

Network World’s searchable glossary of wireless terms

This is a glossary of terminology frequently used in describing and discussing wireless technology – from amplifier to wireless network topology  that will come in handy when trying to understand articles about wireless devices and networks.It is designed to enable those familiar with networking but not necessarily with radio and wireless technologies to quickly cut through the clutter and understand the meaning of these terms.[ Check out our hands-on wireless-product reviews: 5 top hardware-based Wi-Fi test tools and Mojo wireless intrusion prevention system. ] The entries are arranged in alphabetical order except for this initial entry, radio, which is meant to set the stage for all the rest.To read this article in full, please click here

Understanding Virtual Private Networks [and why VPNs are important to SD-WAN]

Internet-based virtual private networks rose to popularity in the 1990s by providing cost-effective connections securely across an insecure internet, and along the way VPNs have provided the impetus for today’s SD-WAN technology.VPN definition The definition of a virtual private network (VPN) is creating a secure network over network transport that is less secure, such as the internet. [ Click here to find out more about SD-WAN and why you’ll use it one day and learn about WANs and where they’re headed. | Get regularly scheduled insights by signing up for Network World newsletters. ] VPNs are used to connect two or more nodes in a network and are most commonly used to connect individual users’ machines to sites or to connect sites to sites.  It’s possible to connect users to each other, but the use case for that is very limited so such deployments are rare. To read this article in full, please click here

Network World’s searchable glossary of wireless terms

This is a glossary of terminology frequently used in describing and discussing wireless technology – from amplifier to wireless network topology  that will come in handy when trying to understand articles about wireless devices and networks.It is designed to enable those familiar with networking but not necessarily with radio and wireless technologies to quickly cut through the clutter and understand the meaning of these terms.[ Check out our hands-on wireless-product reviews: 5 top hardware-based Wi-Fi test tools and Mojo wireless intrusion prevention system. ] The entries are arranged in alphabetical order except for this initial entry, radio, which is meant to set the stage for all the rest.To read this article in full, please click here

Video: Automatic Diagramming with PowerNSX

Here's a trick question: how often do your Visio diagrams match what's really implemented in your network?

Wouldn't it be great to be able to create or modify them on-the-fly based on what's really configured in the network? That's exactly what Anthony Burke demonstrated in the PowerNSX part of PowerShell for Networking Engineers webinar (source code).

You’ll need at least free ipSpace.net subscription to watch the video.

NetDevOpEd: Open source principles give the workplace soul

If you’ve been tuning into Cumulus content lately, you probably know all about our initiative to bring S.O.U.L (Simple, Open, Untethered Linux) into networking — and for the uninitiated, feel free to check out our S.O.U.L page to learn all about the movement! It’s clear that our company and technology have S.O.U.L, but what does that look like in the office? Anyone who’s spent time at our office, in our bootcamps, with our people, etc. can feel that Cumulus Networks has “soul,” and this time we’re not talking about the acronym. We’ve got a passion, substance, life and feeling that pulses throughout our space like a funky bass line.

How do I know this? Well, I work at Cumulus, but it’s more than that. My former employers (before I started working at Cumulus Networks) are pretty varied, ranging from a restaurant to a university, but all of those jobs had one thing in common — they had no soul. To these Pink Floyd-ian businesses, employees were just cogs in the machine meant to forfeit passion for profit. Each day I dragged myself out of bed, drudged Continue reading

Successful First Event in the Canadian Multistakeholder Process – Enhancing IoT Security Series

On April 4, 2018, over 80 individuals met in Ottawa and virtually via livestream for the first event in the Canadian Multistakeholder Process – Enhancing IoT Security series. Participants represented a wide-range of stakeholder groups, including government, academia, public interest, and industry representatives. Two Internet Society Organization Members, the Canadian Internet Registration Authority and CANARIE, as well as Innovation, Science and Economic Development Canada and the Canadian Internet Policy and Public Interest Clinic were partners for this event. IoT security is a complex issue that requires all stakeholders to cooperate and participate in the development of solutions, and we were pleased to have such truly multistakeholder representation.

The event kicked off with an interactive presentation from Larry Strickling, Executive Director of the Collaborative Governance Project. Strickling provided an overview of the multistakeholder process and facilitated a discussion among participants to determine ground rules and define what constitutes consensus. Participants, both those remote and in person, outlined over a dozen rules and three key metrics for determining consensus, which will be used throughout the entirety of the project.

In the morning, participants heard from a series of speakers who presented on IoT security and risk, the balance between IoT’s technological Continue reading

Too Big To Fail is More Likely to Fail ?

People think that big companies are too big to fail and thats why you should buy from big companies.  Except that this is no longer true. To whit: HPE just divested all of its software assets. While HPE maintains a substantial interest in the new owner, I’m confident that HPE will walk away from those […]

BrandPost: BUILDING A BEST-OF-BREED MULTICLOUD STRATEGY

Best-of-breed strategies have long since fallen out of favor in the enterprise, because the work required to stitch together the components proved to be too difficult. But best of breed is back with cloud. Companies today are hell-bent on buying the ideal SaaS, PaaS, and IaaS cloud services for the job, and while APIs make the integration work easier, the resultant cloud silos create a new challenge: How do you assure service performance in this multi-cloud world?The short answer: By maintaining global knowledge of what is happening (and where) across IT infrastructure, applications, and services. But we’ll get back to that.Companies use eight cloud providers on average, according to IHS Markit Ltd., a research firm in London. IHS’ survey of 155 companies in a range of industries shows that number swelling to 11 within two years. When you include any and all SaaS services, the average number of cloud applications that companies use explodes to almost 1,500, by some counts. To read this article in full, please click here

BrandPost: SERVICE INTELLIGENCE: CLOUD MIGRATION’S SECRET WEAPON

By now, it's pretty clear that cloud migration can yield big benefits. In fact, a recent survey from research firm ESG found that nearly 40% of respondents said migrating reduced data center build-out costs. It also increases resource elasticity and speeds up service provisioning.Reaping those benefits is by no means a sure thing, however.  To attain cloud migration nirvana, companies must successfully navigate a host of challenges, including retaining visibility and control over service quality and performance.To read this article in full, please click here