Archive

Category Archives for "Networking"

What is disaster recovery?

Disasters come in all shapes and sizes. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, but also incidents such as cyber-attacks, equipment failures and even terrorism that can be classified as disasters.Companies and organizations prepare by creating disaster recovery plans that detail actions to take and processes to follow to resume mission-critical functions quickly and without major losses in revenues or business. BE SURE NOT TO MISS: REVIEW: 4 top disaster-recovery platforms compared Go-to storage and disaster recovery products Video: Questions to ask your recovery vendor before you buy What is disaster recovery? In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.To read this article in full, please click here

What is disaster recovery? How to ensure business continuity

Disasters come in all shapes and sizes. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, but also incidents such as cyber-attacks, equipment failures and even terrorism that can be classified as disasters.Companies and organizations prepare by creating disaster recovery plans that detail actions to take and processes to follow to resume mission-critical functions quickly and without major losses in revenues or business. BE SURE NOT TO MISS: REVIEW: 4 top disaster-recovery platforms compared Go-to storage and disaster recovery products Video: Questions to ask your recovery vendor before you buy What is disaster recovery? In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.To read this article in full, please click here

What is disaster recovery?

Disasters come in all shapes and sizes. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, but also incidents such as cyber-attacks, equipment failures and even terrorism that can be classified as disasters.Companies and organizations prepare by creating disaster recovery plans that detail actions to take and processes to follow to resume mission-critical functions quickly and without major losses in revenues or business. BE SURE NOT TO MISS: REVIEW: 4 top disaster-recovery platforms compared Go-to storage and disaster recovery products Video: Questions to ask your recovery vendor before you buy What is disaster recovery? In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.To read this article in full, please click here

Get ready to use Linux containers

One of the most exciting things to happen in the Linux world in the past few years is the emergence of containers — self-contained Linux environments that live inside another OS and provide a way to package and isolate applications.They're not quite virtual systems, since they rely on the host OS to operate, nor are they simply applications. Dan Walsh from Red Hat has said that on Linux, "everything is a container," reminding me of the days when people claimed that everything on Unix was a file. But the vision has less to do with the guts of the OS and more to do with explaining how containers work and how they are different than virtual systems in some very interesting and important ways.To read this article in full, please click here

Responding to Readers: Automated Design?

Deepak responded to my video on network commodization with a question:

What’s your thoughts on how Network Design itself can be Automated and validated. Also from Intent based Networking at some stage Network should re-look into itself and adjust to meet design goals or best practices or alternatively suggest the design itself in green field situation for example. APSTRA seems to be moving into this direction.

The answer to this question, as always, is—how many balloons fit in a bag? ? I think it depends on what you mean when you use the term design. If we are talking about the overlay, or traffic engineering, or even quality of service, I think we will see a rising trend towards using machine learning in network environments to help solve those problems. I am not convinced machine learning can solve these problems, in the sense of leaving humans out of the loop, but humans could set the parameters up, let the neural network learn the flows, and then let the machine adjust things over time. I tend to think this kind of work will be pretty narrow for a long time to come.

There will be stumbling blocks here that need to be Continue reading

Amazon Is Offering a $40-Off Deal On Its Echo Spot Devices

Amazon's Echo Spot brings you all the features of its Echo, with a screen for displaying weather forecasts, news updates, sports scores, song lyrics and much more. All you need to do is ask Alexa. It fits comfortably on a nightstand and works well as an alarm clock and bedside calendar as well. Watch videos, call your friends, control your smarthome -- new features are added all the time. Right now, if you buy two, Amazon will activate a $40 discount in your cart. See this deal now on Amazon.To read this article in full, please click here

BrandPost: An essential guide to managed SD-WAN services

Over the last two years, SD-WANs have been the hottest topic in networking. In that timeframe, SD-WAN solutions have evolved dramatically with many vendors recently implementing new, highly robust architectures and adding functionality such as routing and more sophisticated security.But it is not just the technology that has changed. The way that SD-WANs are planned, owned and operated has also matured significantly. The goals of this blog include discussing the large interest that organizations have relative to consuming SD-WAN as a managed service; the evolution of what is meant by a managed SD-WAN service; and the evolution of how managed SD-WAN services are built and operated.To read this article in full, please click here

Get 2 USB-C to USB 6-foot Cables For $9.49 Right Now On Amazon

When you find a good cable for a cheap price, it never hurts to grab it. Anker's USB-C to USB cables feature a double-braided nylon exterior, toughened aramid fiber core and laser-welded connectors, which Anker says makes them more reliable and longer lasting.  With this deal, you'll get two 6-foot cables for $9.49, which is a healthy discount from its average list price. See Anker's discounted cables now on Amazon, where they currently average 4.5 out of 5 stars from over 300 customers.To read this article in full, please click here