Archive

Category Archives for "Networking"

IDG Contributor Network: What the storage industry’s inevitable transition to the cloud means for your business

Just a few weeks ago, Microsoft made a relatively unheralded acquisition of a company named Avere Systems. Avere’s raison d’etre is enterprise storage. In their own words, “Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources.” Ostensibly, Microsoft purchased this firm to add cloud-based storage capabilities to its ever-expanding portfolio.To read this article in full, please click here

IDG Contributor Network: 6 steps to engage and manage a vendor who isn’t meeting your standards

During the sales process, every vendor sounds great. They have case studies, they have great-looking material, they talk like experts and everything is good. But nothing is as simple as it looks in the beginning.There are always additional challenges. The true test of a service provider, or any vendor, is how they respond to those changes and challenges. Do they put you, the customer, first or do they get slow and unresponsive? If you have a vendor who isn’t meeting your needs, but you’re locked into a contract that makes it cost-prohibitive to leave, these steps will help you reduce some of the friction in the relationship, while providing a better outcome for your company.To read this article in full, please click here

IDG Contributor Network: 6 steps to engage and manage a vendor who isn’t meeting your standards

During the sales process, every vendor sounds great. They have case studies, they have great-looking material, they talk like experts and everything is good. But nothing is as simple as it looks in the beginning.There are always additional challenges. The true test of a service provider, or any vendor, is how they respond to those changes and challenges. Do they put you, the customer, first or do they get slow and unresponsive? If you have a vendor who isn’t meeting your needs, but you’re locked into a contract that makes it cost-prohibitive to leave, these steps will help you reduce some of the friction in the relationship, while providing a better outcome for your company.To read this article in full, please click here

AT&T’s Rupesh Chokshi on NFV/SDN-enabled Business Networking

Rupesh Chokshi AT&T has been aggressively transforming its core network with software-defined networking (SDN) and network function virtualization (NFV), gaining the ability to offer on-site infrastructure to enterprises in an innovative, simplified, and easy to consume model. The resulting platform, AT&T FlexWareSM, provides best-in-class, virtualized network functions to businesses across the entire spectrum of the market. From... Read more →

MP on Vertitech IT’s “Best IT Blogs 2018”

This is a quick post to say thanks to the folks at Vertitech IT for listing movingpackets.net among their Best IT Blogs for 2018 (“Must-Read Resources for CIOs, IT & Security Pros”). MP was on the Best IP Blogs of 2017 as well, and it’s an honor to be on the list for a second year.

Vertitech IT Best Blogs of 2018

Vertitech explain the creation of this list thus:

Information Technology.  Sometimes we get so focused on the bits and bytes side of the equation we forget about the information part.  When it comes right down to it, IT is all about using technology to inform, to communicate, to make the business of doing business easier and more understandable.

That’s why we compiled this list. Originally created last year with 50 top IT blogs, we’ve expanded this year’s update to include 70 leading resources for IT professionals, including blogs, discussion forums, niche industry publications, and the best resources for CIOs and CTOs.  VertitechIT’s top 70 IT blogs, forums, and resources were selected because they are among the most current, frequently updated, credible, and informative sources of information related to IT on the web today. From musings of industry leaders, to the Continue reading

Configuration errors in Intel workstations being labeled a security hole

Security researchers at an antivirus company have documented another potentially serious security hole in an Intel product, this time in the mechanism for performing system updates. The good news, however, is that it is limited to desktops, is a configuration error, and does not appear to impact servers.Last June, researchers at F-Secure found a flaw in Intel’s Active Management Technology (AMT), a feature used to perform remote updates to advanced desktops using Intel vPro or workstation platforms using Core desktop chips and certain Xeon CPUs. Xeon is primarily a server processor but there are some low-end chips used in high-performance workstations, such as those used in a CAD environment.To read this article in full, please click here

Configuration errors in Intel workstations being labeled a security hole

Security researchers at an antivirus company have documented another potentially serious security hole in an Intel product, this time in the mechanism for performing system updates. The good news, however, is that it is limited to desktops, is a configuration error, and does not appear to impact servers.Last June, researchers at F-Secure found a flaw in Intel’s Active Management Technology (AMT), a feature used to perform remote updates to advanced desktops using Intel vPro or workstation platforms using Core desktop chips and certain Xeon CPUs. Xeon is primarily a server processor but there are some low-end chips used in high-performance workstations, such as those used in a CAD environment.To read this article in full, please click here

Event-Driven Automation on Building Network Automation Solutions Online Course

Most engineers talking about network automation focus on configuration management: keeping track of configuration changes, generating device configurations from data models and templates, and deploying configuration changes.

There’s another extremely important aspect of network automation that’s oft forgotten: automatic response to internal or external events. You could wait for self-driving networks to see it implemented, or learn how to do it yourself.

On March 20th live session of Building Network Automation Solutions online course David Gee will dive deeper into event-driven network automation. As he explains the challenge:

When it comes to running infrastructure and infrastructure services, a lot of the decision making is human based. Someone reads a ticket, someone decides what to do. Someone gets alerted to an event and that someone does something about it. This involvement causes friction in the smooth-running nature of automated processes. Fear not! Something can be done about it.

We all know the stories of ITIL and rigid process management and David will show you how event-driven automation could be made reality even with strict and rigid controls, resulting in an environment that reacts automatically to stimuli from your services and infrastructure. We will discuss what events are, when they're important, how Continue reading