Archive

Category Archives for "Networking"

Reaction: The Pace of Innovation

Dave Ward has an excellent article over at the Cisco blog on the three year journey since he started down the path of trying to work the standards landscape (called SDOs) to improve the many ways in which these organizations are broken. Specifically, he has been trying to connect the open source and open standards communities better—a path I heartily endorse, as I have been intentionally trying to work in both communities in parallel over the last several years, and find places where I can bring them together.

While the entire blog is worth reading, there are two lines I think need some further thought. The first of this is a bit of a scold, so be prepared to have your knuckles rapped.

My real bottom line here is that innovators can’t go faster than their customers and customers can’t go faster than their own understanding of the technology and integration, deployment and operational considerations.

Precisely. Maybe this is just an old man talking, but I sometimes want to scold the networking industry on this very point. We fuss about innovation, but innovation requires customers who understand the technology—and the networking world has largely become a broad set of meta-engineers, Continue reading

4 people passed CCDE Lab with my CCDE training recently

I realised just now that I didn’t share the names of the people who used my CCDE resources and got their CCDE numbers recently.   I know all of them, their capabilities, technical strength. I am happy to see that they are CCDE now.   Congrats to Ken Young , Jaroslaw Dobkowski , Malcolm Booden […]

The post 4 people passed CCDE Lab with my CCDE training recently appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

4 people passed CCDE Lab with my CCDE training recently

I realised just now that I didn’t share the names of the people who used my CCDE resources and got their CCDE numbers recently.   I know all of them, their capabilities, technical strength. I am happy to see that they are CCDE now.   Congrats to Ken Young , Jaroslaw Dobkowski , Malcolm Booden …

The post 4 people passed CCDE Lab with my CCDE training recently appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

4 people passed CCDE Lab with my CCDE training recently

I realised just now that I didn’t share the names of the people who used my CCDE resources and got their CCDE numbers recently.   I know all of them, their capabilities, technical strength. I am happy to see that they are CCDE now.   Congrats to Ken Young , Jaroslaw Dobkowski , Malcolm Booden …

The post 4 people passed CCDE Lab with my CCDE training recently appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Make before break and Break before make

Make before break and break before make. I shared many posts so far which was covering the terms used in different field of networking. This one is one of them. Also I will introduce, probably to many of you, a new terminology ‘ Break before make ‘    If you are from the IP/MPLS background […]

The post Make before break and Break before make appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Make before break and Break before make

Make before break and break before make. I shared many posts so far which was covering the terms used in different field of networking. This one is one of them. Also I will introduce, probably to many of you, a new terminology ‘ Break before make ‘    If you are from the IP/MPLS background …

The post Make before break and Break before make appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Make before break and Break before make

Make before break and break before make. I shared many posts so far which was covering the terms used in different field of networking. This one is one of them. Also I will introduce, probably to many of you, a new terminology ‘ Break before make ‘    If you are from the IP/MPLS background …

The post Make before break and Break before make appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Why hiring the ‘best’ people produces the least creative results — Quartz

The complexity of modern problems often precludes any one person from fully understanding them. Factors contributing to rising obesity levels, for example, include transportation systems and infrastructure, media, convenience foods, changing social norms, human biology and psychological factors. Designing an aircraft carrier, to take another example, requires knowledge of nuclear engineering, naval architecture, metallurgy, hydrodynamics, […]

Context-Aware Micro-segmentation – Remote Desktop Session Host Enhancements for VMware Horizon

In a previous post my colleague, Stijn, discussed the enhancements to how NSX for vSphere 6.4 handles Remote Desktop Session Host, RDSH, systems with the Identity-based Firewall and Context-Aware Micro-segmentation.

Remote Desktop Services is an underlying technology from Microsoft that many vendors take advantage of to provide overlay management and application deployment technologies for.  In this post, we’re going to discuss how NSX for vSphere 6.4 allows customers to run RDS hosts with granular security for VMware Horizon systems.

VMware Horizon can provide multiple users the ability to connect to a single system to access their applications using the RDSH technology.  These users can be of the same type, for example all HR users, or of multiple types, HR and Engineering users.  In previous versions of NSX, it was not possible to individually secure user sessions and create Distributed Firewall (DFW) rule sets according to the user session logged into an RDSH server.  This meant less flexibility in controlling what users could access data center application servers without isolating one set of users to one RDSH server.  This model created a very rigid architecture for Horizon customers to follow.

Horizon allows customers Continue reading

IDG Contributor Network: The top 4 industrial enterprise requirements of IoT application enablement platforms (AEP)

With over 400 self-proclaimed IoT platforms in the market, it doesn’t surprise me that industrial enterprises are hindered trying to identify, test and select a high quality IoT platform. Platform vendors’ marketing materials contain the same messages, their RFX responses always affirm “full compliance” with all requested capabilities and they have partnerships with the same cloud vendors. With over 400 self-proclaimed IoT platforms in the market, the only way to truly know each platform is to use it.What makes a great IoT AEP? An Application Enablement Platform (AEP) is a technology-centric offering optimized to deliver a best-of-breed, industry-agnostic, extensible middleware core for building a set of interconnected or independent IoT solutions for customers. An AEP links IoT devices and applications, delivering data to allow industrial enterprises to implement predictive maintenance, machine learning, factory automation, asset logistics, surveillance and many other applications. With IoT platform revenue slated to grow to USD 63.4 billion by 2026, IoT application enablement is one of the most highly demanded enterprise IoT platforms.To read this article in full, please click here

The internet will miss John Perry Barlow

John Perry Barlow, who died in San Francisco last week at age 70, was an important pioneer for internet freedom. But he was much, much more than that. He was the kind of Renaissance Man that today’s internet moguls can’t even dream of emulating. And that is a huge loss for the world of technology — and the world at large.Barlow’s wide-ranging influence You may not have heard of Barlow, but you’ve probably been influenced by him in a wide variety of surprising ways. For one thing, he was a co-founder — and at his passing, vice chairman — of the Electronic Frontier Foundation, which is considered “the leading nonprofit organization defending civil liberties in the digital world.” Back in 1990, when the EFF was formed, Barlow helped popularize the term “cyberspace.” He was a director of the WELL (Whole Earth ’Lectronic Link), the seminal online community, and he was an influential early voice at Wired magazine.To read this article in full, please click here

IDG Contributor Network: Cloud strategy: hybrid and multi cloud are not the same

IDC tells us that most companies are using more than one cloud and that cloud usage isn’t just about cost savings. Three out of every four companies are using cloud to chase additional revenue in the form of new customers, risk mitigation, IoT enablement or time to market gains. Most are using multiple external cloud services.However, especially as microservices become the dominant approach to new application development because of the iteration speed improvements that it provides, it has become important to distinguish the different ways that more than one cloud can be utilized. Specifically, the differences lie in where you sit in an organization and what you are trying to optimize from that seat. Although historically we’ve used the terms interchangeably, hybrid and multi cloud are not the same.To read this article in full, please click here

IDG Contributor Network: Cloud strategy: hybrid and multi cloud are not the same

IDC tells us that most companies are using more than one cloud and that cloud usage isn’t just about cost savings. Three out of every four companies are using cloud to chase additional revenue in the form of new customers, risk mitigation, IoT enablement or time to market gains. Most are using multiple external cloud services.However, especially as microservices become the dominant approach to new application development because of the iteration speed improvements that it provides, it has become important to distinguish the different ways that more than one cloud can be utilized. Specifically, the differences lie in where you sit in an organization and what you are trying to optimize from that seat. Although historically we’ve used the terms interchangeably, hybrid and multi cloud are not the same.To read this article in full, please click here

IDG Contributor Network: Why the edge has moved to the forefront

Remember just a few years ago, when everyone was talking about cloud computing? While cloud was consuming all the air in the room, few people were paying attention to another technology trend—one with the potential to transform industrial enterprises. I’m talking about edge computing.The idea of placing computing resources at the network’s edge—at or near where production processes are occurring—is not a completely new idea. Industrial control has relied on distributed computers to control manufacturing machines and processes for decades. But as manufacturers come under increasing competitive pressure, the need to optimize their efficiency, productivity and quality has become a matter of survival. This imperative requirement is driving companies across the industrial spectrum to look at how pushing intelligence out to the edge can help them gain a competitive advantage.To read this article in full, please click here

IDG Contributor Network: Why the edge has moved to the forefront

Remember just a few years ago, when everyone was talking about cloud computing? While cloud was consuming all the air in the room, few people were paying attention to another technology trend—one with the potential to transform industrial enterprises. I’m talking about edge computing.The idea of placing computing resources at the network’s edge—at or near where production processes are occurring—is not a completely new idea. Industrial control has relied on distributed computers to control manufacturing machines and processes for decades. But as manufacturers come under increasing competitive pressure, the need to optimize their efficiency, productivity and quality has become a matter of survival. This imperative requirement is driving companies across the industrial spectrum to look at how pushing intelligence out to the edge can help them gain a competitive advantage.To read this article in full, please click here