Archive

Category Archives for "Networking"

What to do if your cloud provider stops offering its services

What would your organization do if your cloud provider were to go out of business? What happens if your cloud provider suddenly stops offering critical services that your organization requires for its business to function properly? Businesses need to start asking these important questions and develop plans to address these scenarios.The cloud is a new market that continues to grow, and there are more small players offering their services. According to Gartner, Cloud System Infrastructure Services (IaaS) are expected to grow from $45.8 billion in revenue in 2018 to $72.4 billion in 2020. As the market matures, it's only natural that some of these organizations will disappear or stop offering certain services. In 2013, Nirvanix stopped offering it cloud services and gave customers only two weeks’ notice to move their data off of their platform.To read this article in full, please click here

What to do if your cloud provider stops offering its services

What would your organization do if your cloud provider were to go out of business? What happens if your cloud provider suddenly stops offering critical services that your organization requires for its business to function properly? Businesses need to start asking these important questions and develop plans to address these scenarios.The cloud is a new market that continues to grow, and there are more small players offering their services. According to Gartner, Cloud System Infrastructure Services (IaaS) are expected to grow from $45.8 billion in revenue in 2018 to $72.4 billion in 2020. As the market matures, it's only natural that some of these organizations will disappear or stop offering certain services. In 2013, Nirvanix stopped offering it cloud services and gave customers only two weeks’ notice to move their data off of their platform.To read this article in full, please click here

When Redundancy Strikes

Networking and systems professionals preach the value of redundancy. When we tell people to buy something, we really mean “buy two”. And when we say to buy two, we really mean buy four of them. We try to create backup routes, redundant failover paths, and we keep things from being used in a way that creates a single point of disaster. But, what happens when something we’ve worked hard to set up causes us grief?

Built To Survive

The first problem I ran into was one I knew how to solve. I was installing a new Ubiquiti Security Gateway. I knew that as soon as I pulled my old edge router out that I was going to need to reset my cable modem in order to clear the ARP cache. That’s always a thing that needs to happen when you’re installing new equipment. Having done this many times, I knew the shortcut method was to unplug my cable modem for a minute and plug it back in.

What I didn’t know this time was that the little redundant gremlin living in my cable modem was going to give me fits. After fifteen minutes of not getting the system to come Continue reading

CEOs and Encryption: The Questions You Need to Ask Your Experts

Barely a week passes without something in the news that reminds us of the critical role encryption plays in securing our data. It is a technology that protects so much of what we rely on, as individuals protecting our privacy, as companies securing our business assets and transactions, and as governments responsible for critical national infrastructure. 

As a CEO, I needed to know what questions I should be asking my technical experts about encryption and its use, so I asked my staff to produce this paper. I found it to be so useful that I thought we should share it with other executives as they try to understand and manage this complex but indispensable technology.

We believe, at the Internet Society, that encryption is a MUST for protecting what is one of the most valuable assets we manage—data.  We hope this paper can be helpful to you.

— Kathy Brown, CEO, Internet Society

The request Kathy mentions came after the San Bernardino shootings in California (which reinvigorated the debate about third party access to encrypted information), and after a former Director of the UK’s Government Communications Headquarters (GCHQ) had set out his view in these terms:

“Encryption is overwhelmingly Continue reading

Another selling point of bare-metal cloud providers: local service

Several things make bare-metal cloud providers appealing compared with traditional cloud providers, which operate in a virtualized environment. Bare-metal providers give users more control, more access to hardware, more performance, and the ability to pick their own operating environment.There's another interesting angle, as articulated by Martin Blythe, a research fellow with Gartner. He maintains that bare-metal providers appeal to small and mid-sized businesses (SMBs) because those companies are often small, local players, and SMBs looking for something more economical than hosting their own data center often want to keep the data center nearby.To read this article in full, please click here

Another selling point of bare-metal cloud providers: local service

Several things make bare-metal cloud providers appealing compared with traditional cloud providers, which operate in a virtualized environment. Bare-metal providers give users more control, more access to hardware, more performance, and the ability to pick their own operating environment.There's another interesting angle, as articulated by Martin Blythe, a research fellow with Gartner. He maintains that bare-metal providers appeal to small and mid-sized businesses (SMBs) because those companies are often small, local players, and SMBs looking for something more economical than hosting their own data center often want to keep the data center nearby.To read this article in full, please click here

Hyperconverged infrastructure gets its own Gartner magic quadrant

Hyperconvergence is winning over enterprises that are drawn to its potential to ease management, streamline the deployment of new workloads, and optimize infrastructure costs.As much as 20 percent of business-critical applications currently deployed on three-tier IT infrastructure will transition to hyperconverged infrastructure by 2020, predicts Gartner, which recently gave the technology its own magic quadrant.[ Check out our What is hyperconvergence? and learn whether your network and team are up to hyperconverged storage. ] The magic quadrant is Gartner’s signature format for tech market analysis, and in prior years, the research firm tackled hyperconvergence as part of its integrated-systems research.To read this article in full, please click here

Hyperconverged infrastructure gets its own Gartner magic quadrant

Hyperconvergence is winning over enterprises that are drawn to its potential to ease management, streamline the deployment of new workloads, and optimize infrastructure costs.As much as 20 percent of business-critical applications currently deployed on three-tier IT infrastructure will transition to hyperconverged infrastructure by 2020, predicts Gartner, which recently gave the technology its own magic quadrant.[ Check out our What is hyperconvergence? and learn whether your network and team are up to hyperconverged storage. ] The magic quadrant is Gartner’s signature format for tech market analysis, and in prior years, the research firm tackled hyperconvergence as part of its integrated-systems research.To read this article in full, please click here

Video: Automated Data Center Fabric Deployment Demo

I was focused on network automation this week, starting with a 2-day workshop and continuing with an overview of real-life automation wins. Let’s end the week with another automation story: automated data center fabric deployment demonstrated by Dinesh Dutt during his part of Network Automation Use Cases webinar.

You’ll need at least free ipSpace.net subscription to watch the video.

ISOC’s Hot Topics at IETF 101

Tomorrow begins IETF 101 in London, United Kingdom, and it’s the third time that an IETF has been held in the country. Following on the heels of our Rough Guide to IETF 101 where we go in-depth about specific topics of interest, the ISOC Internet Technology Team is again highlighting the latest IPv6, DNSSEC, Securing BGP, TLS and IoT related developments as the week progresses.

Below are the sessions that we’ll be following in the coming week. Note this post was written in advance so please check the official IETF 101 agenda for any updates, room changes, or final details.

Monday, 18 March 2018

Tuesday, 19 March 2018