Archive

Category Archives for "Networking"

Vexata all-flash systems aim to reduce storage latency

Startup Vexata is tackling a vexing problem: how to eliminate input-output bottlenecks in storage fabrics without requiring customers to rearchitect their IT infrastructures.“If you look at the world today, all these IoT environments with [machine learning] and AI ecosystems, where the desire is mass volumes of data that need to be accessed with very high throughputs, at super low latencies and massive scale – how do you do this economically? How do you do it simplistically so that operationally those applications become a reality?” says Ashish Gupta, Vexata’s chief marketing officer. Vexata’s storage software platform “is designed to address this emerging application ecosystem problem.”To read this article in full, please click here

Upcoming ipSpace.net Events

2018 has barely started and we’re already crazily busy:

The last week of January is Cisco Live Europe week. I’ll be there as part of the Tech Field Day Extra event – drop by or send me an email if you’ll be in Barcelona during that week.

Read more ...

VMware NSX Micro-segmentation – Horizon 7

Organizations that embark on the journey of building our virtual desktop environments, are taking traditionally external endpoints and bringing them into the data center.  These endpoints are now closer and most times, reside on the same networking infrastructure as the backend application servers that they may access. These endpoints run Windows or even Linux desktop operating systems with multiple end-users that can access them. Malicious attacks that would traditionally take place outside the data center should an end-user find their desktop or laptop machine infected, could now take place on their virtual desktops inside the data center.  With physical equipment, it’s easy to isolate the physical desktop or laptop and remediate the attack.  Securing virtual desktop environments requires a different approach, but not one that’s unattainable.  Securing an end user computing deployments is one of the primary security use cases for VMware NSX and can help provide a layered approach to securing virtual desktop workloads in the data center.

The NSX platform covers several business cases for securing an end user computing deployment.  Each of these use cases, helps provide a multi-layered approach to ensure end user endpoints are as secure as possible in the Continue reading

IDG Contributor Network: Admin automation: the serverless low-hanging fruit

If we could go back in time and start using public cloud in 2009, we’d probably be better off today. The AWS beta started in 2006 and was entirely API-driven, without either a console or a command line interface to make interacting with the service easier than what we know so well now. Three years later, it was more mature. Early adopters started to solve real problems with it, padding their resumes and bringing value to their organizations in ways that seemed impossible before.Serverless computing in 2018 is about where cloud computing was in 2009. But what exactly does serverless mean, and what are some easy ways to get started with it?Function-as-a-Service: making serverless architectures possible As cool as the technology is, serverless computing is a terrible name because (spoiler alert) there are, in fact, servers under the hood. The name comes from the idea that developers don’t have to worry about the server, or even a container, as a unit of compute any more as public cloud services like AWS Lambda, IBM OpenWhisk, Google Cloud Functions and Azure Functions handle the details.To read this article in full, please click here

Breakthroughs in magnetism will change storage and computing

If you thought storage was trending towards solid-state mediums and that magnetic drives were edging out, you may want to pause a moment. A slew of scientific breakthroughs in magnetism as it relates to storage and computing were announced last year.The multiple Eureka moments could change how we compute and perform Internet of Things and might, in one case, introduce magnet-driven neural networks — which is computing that mimics how the brain processes things.3D magnets First on the list was last November's announcement of the invention of 3D nano-magnets that shift data transfers from traditional two dimensions to three dimensions. This kind of add-on could significantly increase storage and processing functions, say its inventors at the University of Cambridge in an article published by Sinc.To read this article in full, please click here

Breakthroughs in magnetism will change storage and computing

If you thought storage was trending towards solid-state mediums and that magnetic drives were edging out, you may want to pause a moment. A slew of scientific breakthroughs in magnetism as it relates to storage and computing were announced last year.The multiple Eureka moments could change how we compute and perform Internet of Things and might, in one case, introduce magnet-driven neural networks — which is computing that mimics how the brain processes things.3D magnets First on the list was last November's announcement of the invention of 3D nano-magnets that shift data transfers from traditional two dimensions to three dimensions. This kind of add-on could significantly increase storage and processing functions, say its inventors at the University of Cambridge in an article published by Sinc.To read this article in full, please click here

IDG Contributor Network: 5 things analytics could tell you about your network in 2018

1. Whether your users are happy (without having to talk to them) It’s not always cool to admit, but the ultimate goal of every networker is to have happy users. Like many other thankless jobs, we only hear about problems. When we do, we react. But that isn’t ideal. What we really want is to know about problems as they are developing, before users complain. They don't even have to know.  But we do.A Network Management System (NMS) has been the traditional go-to solution to sniff out these sorts of problems. But most were designed for just one view of a certain part of the network using antiquated technology that doesn't provide any sort of predictive problem solving based on what the user is actually experiencing. It's like trying to figure out San Francisco traffic based on the status of the traffic signals. Just because the signals are working properly doesn’t mean the drivers (users) are having a good experience.To read this article in full, please click here

IDG Contributor Network: 5 things analytics could tell you about your network in 2018

1. Whether your users are happy (without having to talk to them) It’s not always cool to admit, but the ultimate goal of every networker is to have happy users. Like many other thankless jobs, we only hear about problems. When we do, we react. But that isn’t ideal. What we really want is to know about problems as they are developing, before users complain. They don't even have to know.  But we do.A Network Management System (NMS) has been the traditional go-to solution to sniff out these sorts of problems. But most were designed for just one view of a certain part of the network using antiquated technology that doesn't provide any sort of predictive problem solving based on what the user is actually experiencing. It's like trying to figure out San Francisco traffic based on the status of the traffic signals. Just because the signals are working properly doesn’t mean the drivers (users) are having a good experience.To read this article in full, please click here

How Cisco’s newest security tool can detect malware in encrypted traffic

Cisco’s Encrypted Traffic Analytics (ETA), a software platform that monitors network packet metadata to detect malicious traffic, even if its encrypted, is now generally available.The company initially launched ETA in June, 2017 during the launch of its intent-based network strategy and it’s been in a private preview since then. Today Cisco rolled ETA out beyond just the enterprises switches it was originally designed for and made it available on current and previous generation data center network hardware too.+MORE AT NETWORK WORLD: What is intent based networking? | Why intent based networking could be a big deal +To read this article in full, please click here

How Cisco’s newest security tool can detect malware in encrypted traffic

Cisco’s Encrypted Traffic Analytics (ETA), a software platform that monitors network packet metadata to detect malicious traffic, even if its encrypted, is now generally available.The company initially launched ETA in June, 2017 during the launch of its intent-based network strategy and it’s been in a private preview since then. Today Cisco rolled ETA out beyond just the enterprises switches it was originally designed for and made it available on current and previous generation data center network hardware too.+MORE AT NETWORK WORLD: What is intent based networking? | Why intent based networking could be a big deal +To read this article in full, please click here