Archive

Category Archives for "Networking"

Choosing Windows for your organization should get you fired

In the wake of yet another ransomware attack—this time named NotPetya—I have a special message specifically for those of you working in organizations that continue to run Microsoft Windows as the operating system on either your servers or your desktops: You are doing a terrible job and should probably be fired.  I know. That’s harsh. But it’s true. If you haven’t yet replaced Windows, across the board, you absolutely stink at your job. For years, we’ve had one trojan, worm and virus after another. And almost every single one is specifically targeting Microsoft Windows. Not MacOS. Not Linux. Not DOS. Not Unix. Windows. To read this article in full or to leave a comment, please click here

Choosing Windows for your organization should get you fired

In the wake of yet another ransomware attack—this time named NotPetya—I have a special message specifically for those of you working in organizations that continue to run Microsoft Windows as the operating system on either your servers or your desktops: You are doing a terrible job and should probably be fired.  I know. That’s harsh. But it’s true. If you haven’t yet replaced Windows, across the board, you absolutely stink at your job. For years, we’ve had one trojan, worm and virus after another. And almost every single one is specifically targeting Microsoft Windows. Not MacOS. Not Linux. Not DOS. Not Unix. Windows. To read this article in full or to leave a comment, please click here

Choosing Windows for your organization should get you fired

In the wake of yet another ransomware attack—this time named NotPetya—I have a special message specifically for those of you working in organizations that continue to run Microsoft Windows as the operating system on either your servers or your desktops: You are doing a terrible job and should probably be fired.  I know. That’s harsh. But it’s true. If you haven’t yet replaced Windows, across the board, you absolutely stink at your job. For years, we’ve had one trojan, worm and virus after another. And almost every single one is specifically targeting Microsoft Windows. Not MacOS. Not Linux. Not DOS. Not Unix. Windows. To read this article in full or to leave a comment, please click here

Choosing Windows for your organization should get you fired

In the wake of yet another ransomware attack—this time named NotPetya—I have a special message specifically for those of you working in organizations that continue to run Microsoft Windows as the operating system on either your servers or your desktops: You are doing a terrible job and should probably be fired.  I know. That’s harsh. But it’s true. If you haven’t yet replaced Windows, across the board, you absolutely stink at your job. For years, we’ve had one trojan, worm and virus after another. And almost every single one is specifically targeting Microsoft Windows. Not MacOS. Not Linux. Not DOS. Not Unix. Windows. To read this article in full or to leave a comment, please click here

DreamWorks: The animation studio’s powerful network

If you don’t know what DreamWorks is, you probably haven’t been to the movies for a couple decades. It’s a digital film studio that turns out critically acclaimed CGI animated movies like Shrek, Madagascar, and Kung Fu Panda, averaging about two a year since the turn of the century, and a major contributor to the cause of keeping kids occupied for a couple of hours.The creation of CGI movies is enormously demanding from a network standpoint. Animation and rendering require very low input latency and create huge files that have to be readily available, which poses technological challenges to the DreamWorks networking team.+ALSO ON NETWORK WORLD: What Cisco's new programmable switches mean for you + Trend: Colocation facilities provide tools to manage data center infrastructureTo read this article in full or to leave a comment, please click here

DreamWorks: The animation studio’s powerful network

If you don’t know what DreamWorks is, you probably haven’t been to the movies for a couple decades. It’s a digital film studio that turns out critically acclaimed CGI animated movies like Shrek, Madagascar, and Kung Fu Panda, averaging about two a year since the turn of the century, and a major contributor to the cause of keeping kids occupied for a couple of hours.The creation of CGI movies is enormously demanding from a network standpoint. Animation and rendering require very low input latency and create huge files that have to be readily available, which poses technological challenges to the DreamWorks networking team.+ALSO ON NETWORK WORLD: What Cisco's new programmable switches mean for you + Trend: Colocation facilities provide tools to manage data center infrastructureTo read this article in full or to leave a comment, please click here

DreamWorks: The animation studio’s powerful network

If you don’t know what DreamWorks is, you probably haven’t been to the movies for a couple decades. It’s a digital film studio that turns out critically acclaimed CGI animated movies like Shrek, Madagascar, and Kung Fu Panda, averaging about two a year since the turn of the century, and a major contributor to the cause of keeping kids occupied for a couple of hours.The creation of CGI movies is enormously demanding from a network standpoint. Animation and rendering require very low input latency and create huge files that have to be readily available, which poses technological challenges to the DreamWorks networking team.+ALSO ON NETWORK WORLD: What Cisco's new programmable switches mean for you + Trend: Colocation facilities provide tools to manage data center infrastructureTo read this article in full or to leave a comment, please click here

Reaction: The End of MPLS?

Jason Wells, over on LinkedIn, has an article up about the end of MPLS; to wit—

MPLS, according to Akkiraju, is old-hat and inefficient – why should a branch office backhaul to get their cloud data, when Internet connections might be faster – and 100X cheaper? Cisco, in acquiring Viptela, has brought Akkiraju, his company, and his perspective back into the fold, perhaps heralding the beginning of the end of Cisco’s MPLS-based offerings (or at least the beginning of the end of the mindset that they should still have an MPLS-based offering).

To being—I actually work with Aryaka on occasion, and within the larger SD-WAN world more often (I am a member of the TAB over at Velocloud, for instance). This is decidedly not a post about the usefulness or future of SD-WAN solutions (though I do have opinions there, as you might have guessed). Rather, what I want to point out is that we, in the networking industry, tend to be rather sloppy about our language in ways that are not helpful.

To understand, it is useful to back up a few years and consider other technologies where our terms have become confused, and how it has impacted our Continue reading

Life as an IT contractor

The upside of life as an IT contractor is alluring. You get to be your own boss, accept only the jobs you want, and work flexible hours. With each assignment comes the opportunity to learn new skills and gain exposure to different environments.But there are obvious sacrifices – job security and paid vacations, for starters. As an IT contractor, you’re also often responsible for your own benefits (healthcare, retirement), paying taxes, and marketing yourself for the next gig.Tech pros who successfully balance the pros and cons of contracting play an important role in the IT world. They provide manpower when workloads spike and can bring key expertise or niche skills to a team. In recent years, companies have increasingly relied on a contingent workforce to augment their full-time staff. According to new survey data from IT staffing and services firm TEKsystems, 26% of IT hiring managers expect to increase headcount for contingent workers in the second half of 2017 (another 46% report that headcount will remain the same for temporary workers, and 13% say it will decrease).To read this article in full or to leave a comment, please click here

VMware Evolve Transform Security is Coming to A City Near You!

Modern IT professionals face significant security challenges. As digital transformation continues to connect applications, users, and data in the cloud, perimeter security models that once offered businesses protection are no longer sufficient. Critical visibility into users and endpoints is missing, enforcing policies is difficult, and, in the meantime, cyberattacks are more sophisticated and costly than ever.

What do IT teams need to defend today’s applications, users, and data from potentially brand-damaging attacks?

That’s the question VMware experts will be tackling during our VMware EVOLVE Transform Security events, coming to a city near you. During these half-day, in-person events, you will learn how a ubiquitous software layer can help support the security challenges of the modern business. 

VMware experts will guide you through how to:

  • Secure application infrastructure and better align security controls to apps
  • Secure identity and endpoints to control access and enforce data loss prevention
  • Streamline governance, risk management and compliance to limit cyber-attack vectors

Reserve your spot at an upcoming Transform Security-focused VMware EVOLVE event in your city:

The post VMware Evolve Transform Security is Coming to A City Near You! appeared first on Network Virtualization.

Creating a wireless smart infrastructure: 4 expert recommendations

The mobile internet was a simpler infrastructure to design than the one that will be needed for the smart city, smart grid, smart health and smart transportation. Smartphones are homogeneous with relatively powerful processors and batteries driving transmission and reception. Designed to bring the internet to smartphones, 3G and 4G networks could be simpler. But IoT devices will span a range of heteroneous designs.The range of heterogeneity of the IoT is defined today by autonomous vehicles, which have thousands of sensors powered by high-capacity batteries that frequently communicate at high speed and low latency to simple sensors. Those sensors are powered by ambient power sources, sending a few infrequent bytes to communicate state (on/off, temperature, vibration amplitude and phase, etc.).To read this article in full or to leave a comment, please click here

Let’s Think Differently to Shape ‪Tomorrow

In 2015 the world made one of the biggest promises to itself in the form of 17 Global Goals set out by the United Nations. These goals – the Sustainable Development Goals (SDGs) – are aimed at achieving extraordinary things in the next 15 years. They are dedicated to fighting injustice and inequalities, ending climate change, beating discrimination, bringing in sustainable energy, and making sure no one goes hungry. 

Ms. Kathryn Brown