For a long while now I've been brainstorming how I could leverage the API that's present in the Cisco Spark collaboration platform to create a bot. There are lots of goofy and fun examples of bots (ie, Gifbot) that I might be able to draw inspiration from, but I wanted to create something that would provide high value to myself and anyone else that choose to download and use it. The idea finally hit me after I started using Zabbix for system monitoring. Since Zabbix also has a feature-rich API, all the pieces were in place to create a bot that would act as a bit of middle-ware between Zabbix and Spark. I call the bot: Zpark.
New WPA3 capabilities include encryption on open WiFi networks.
The software enables secure HD video streaming from IoT devices.
I am honored and humbled to announce my new book “Building NSX Powered Clouds and Data Centers for Small and Medium Businesses”.
This is a concise book that provides step by step information to design and deploy NSX in Small and Medium size data centers. My aim for writing this book is to give architects and engineers the necessary tools and techniques to transform their data center from legacy architecture to software defined (SDN) architecture. The SDN architecture is the foundation to build the private cloud.
The book has about 90 pages covering following topics:
Many technology vendors tend to focus efforts in the large data center space, the fact remains that the small/medium business (SMB) space represents a substantial part of the IT marketplace.
The book is available to purchase from NSX Store.
Electronic version of the book can be downloaded from here.
The post “Building NSX Powered Clouds and Data Centers for SMBs” is available now appeared first on Network Virtualization.
The CLEC says SD-WAN is just a subset of its WAN business.
MEC and CORD are seen as key pillars of next-gen network architectures.
Last week the news of two significant computer bugs was announced. They've been dubbed Meltdown and Spectre. These bugs take advantage of very technical systems that modern CPUs have implemented to make computers extremely fast. Even highly technical people can find it difficult to wrap their heads around how these bugs work. But, using some analogies, it's possible to understand exactly what's going on with these bugs. If you've found yourself puzzled by exactly what's going on with these bugs, read on — this blog is for you.
“When you come to a fork in the road, take it.” — Yogi Berra
Late one afternoon walking through a forest near your home and navigating with the GPS you come to a fork in the path which you’ve taken many times before. Unfortunately, for some mysterious reason your GPS is not working and being a methodical person you like to follow it very carefully.
Cooling your heels waiting for GPS to start working again is annoying because you are losing time when you could be getting home. Instead of waiting, you decide to make an intelligent guess about which path is most likely based on past experience and set Continue reading
Last week the news of two significant computer bugs was announced. They've been dubbed Meltdown and Spectre. These bugs take advantage of very technical systems that modern CPUs have implemented to make computers extremely fast. Even highly technical people can find it difficult to wrap their heads around how these bugs work. But, using some analogies, it's possible to understand exactly what's going on with these bugs. If you've found yourself puzzled by exactly what's going on with these bugs, read on — this blog is for you.
“When you come to a fork in the road, take it.” — Yogi Berra
Late one afternoon walking through a forest near your home and navigating with the GPS you come to a fork in the path which you’ve taken many times before. Unfortunately, for some mysterious reason your GPS is not working and being a methodical person you like to follow it very carefully.
Cooling your heels waiting for GPS to start working again is annoying because you are losing time when you could be getting home. Instead of waiting, you decide to make an intelligent guess about which path is most likely based on past experience and set Continue reading
SDxCentral's recent report highlights how big data, analytics, and convergence are impacting network and application monitoring.
“Culture, any culture… depends on the quality of its record of knowledge.” — Don Waters, “‘Preserving Digital Information”
Our culture and society has been enriched by the creation and proliferation of the Internet. Information has become increasingly more accessible and has enabled so many of us to become active creators rather than passive consumers of content. With that, we’re experiencing an explosive growth of digital data, with 2.5 quintillion bytes of data created every day and that data needs a place to live.
Not only does our data need a place to live, but it needs a place to survive into the future. What happens if years from now, we are no longer able to access our photos, documents, music — essentially all the records of our lives? We will not only be forgotten, but we’ll be thrusting the future into a “digital dark age,” as Vint Cerf calls it.
In short: “More and more of our lives are bound to the ones and zeroes of bits residing on a cloud server, or mobile device. Those bits in turn are mediated by the software and hardware implements we use every day. The bitstreams are unintelligible, however, without Continue reading
Global professional services company GHD recently merged with Conestoga-Rovers and Associates (CRA), adding more than 3,000 employees in 100 offices, including 50 small sites. With this sudden growth, GHD needed a simple, cost-effective solution to add those new sites onto the company’s network. The answer was Riverbed SteelConnect, which has fueled stronger collaboration between its... Read more →