Archive

Category Archives for "Networking"

Why Edward Snowden loves open source

Infamous government hacker Edward Snowden believes open source is a fundamentally better way to use technology compared to proprietary technology that he believes disempowers users.Snowden was interviewed at the open source cloud computing project OpenStack Summit in Boston via video from a non-descript location and spoke about his personal use of open source technology. In 2013 Snowden, then a government contractor, leaked classified information about government surveillance programs run by the National Security Agency, which brought him worldwide fame.+MORE AT NETWORK WORLD: Deep dive comparison of Amazon, Microsoft and Google cloud storage +To read this article in full or to leave a comment, please click here

Verizon taps into open source, white box fervor with new CPE offering

Verizon this week said it would begin offering x86-based servers with OpenStack software aimed at customers looking to support all manner of advanced cloud, software defined networking and network functions virtualization-based enterprises.+More on Network World: Extreme offers glimpse of integrated Avaya, Brocade technology future+According to Verizon, letting customers use a combination of off the shelf hardware over a distributed deployment of OpenStack will let them decouple hardware from software and frees them from proprietary hardware. OpenStack is developed by some 150 companies from AT&T to IBM and Red Hat to Cisco, Dell EMC and others. The open software controls large pools of compute, storage, and networking resources throughout a data center, managed typically through a single dashboard.To read this article in full or to leave a comment, please click here

Verizon taps into open source, white box fervor with new CPE offering

Verizon this week said it would begin offering x86-based servers with OpenStack software aimed at customers looking to support all manner of advanced cloud, software defined networking and network functions virtualization-based enterprises.+More on Network World: Extreme offers glimpse of integrated Avaya, Brocade technology future+According to Verizon, letting customers use a combination of off the shelf hardware over a distributed deployment of OpenStack will let them decouple hardware from software and frees them from proprietary hardware. OpenStack is developed by some 150 companies from AT&T to IBM and Red Hat to Cisco, Dell EMC and others. The open software controls large pools of compute, storage, and networking resources throughout a data center, managed typically through a single dashboard.To read this article in full or to leave a comment, please click here

3 Ways Organizations Use NSX for Application Continuity

Five example customers using NSX to enable application continuity for their business

No one looks forward to data center outages. Not the business leaders who fear revenue loss from applications being down, nor the heroic IT admin whose pager is going off at 3:00 AM. Therefore many critical data centers have a sister location and some form of a disaster recovery plan, should something go awry. At the same time, infrastructure teams are under pressure to be more agile and more responsive to the business, across the board, while still lowering costs and making the most out of what they already have. So what exactly happens in the case of a disaster?

The Ponemon Institute reports the average cost of a data center outage to be $740,357, but with massive variance – some known examples going up to $150 million. As businesses move to accelerate to keep up with changes in their industry, each minute lost to downtime can have an impact not only on company resources but also on brand reputation. This is why enabling business continuity or application continuity in a manner that doesn’t require new infrastructure is vital. VMware NSX can offer companies a competitive edge through networking and security Continue reading

Time to Overhaul Your Campus Network

Over the last few years cloud service providers have steadily adopted white-box Ethernet switches and modern, flexible Network Operating Systems into their ecosystems. Mega data center operators, such as Google, Amazon, and Microsoft, have replaced their proprietary gear with white boxes in their production environments. The major benefit of this paradigm shift is significantly reduced CapEx and OpEx, a more reliable environment, and customized traffic flows for efficiency.  According to IDC, the worldwide ODM direct Ethernet switch (white box) market was $677 million in 2016 and is expected to exceed $900 million in 2017. That’s a growth rate of 33%, and the trend is accelerating.

The shift in white-box adoption started as early as 2012, but has been limited to data centers for many reasons. Even though Enterprise IT executives are motivated to adopt white-boxes, the migration has been slow and challenging. Essentially, the Enterprise network is distinctly different from data center network in many ways.

overhaul_campus_network

  • The data center network is usually homogeneous, while the Enterprise network is heterogeneous. Typically, Enterprises require a variety of speeds ranging from 100Mbps to 100Gbps, and run over different cables, including various types of copper and fiber. The increasingly deployed Power over Ethernet (PoE) Continue reading

JNCIE-DC : The Awesome story of Joao

Hello, I'm very proud to post the story of Joao. He passed recently JNCIE-DC and became one of the firsts JNCIE x4. Joao is a "Juniper Fan" like me. I'm currently preparing JNCIE-DC as well, so I was so happy to read his experience. Enjoy Reading. David...

JNCIE-DC : The Awesome story of Joao

Hello, I'm very proud to post the story of Joao. He passed recently JNCIE-DC and became one of the firsts JNCIE x4. Joao is a "Juniper Fan" like me. I'm currently preparing JNCIE-DC as well, so I was so happy to read his experience. Enjoy Reading. David...

Troubleshooting: Models

How well can you know each of these four systems? Can you actually know them in fine detail, down to the last packet transmitted and the last bit in each packet? Can you know the flow of every packet through the network, and every piece of information any particular application pushes into a packet, or the complete set of ever changing business requirements?

Obviously the answer to these questions is no. As these four components of the network combine, they create a system that suffers from combinatorial explosion. There are far too many combinations, and far too many possible states, for any one person to actually know all of them.

How can you reduce the amount of information to some amount a reasonable human can keep in their minds? The answer—as it is with most problems related to having too much information—is abstraction. In turn, what does abstraction really mean? It really means you build a model of the system, interacting with the system through the model, rather than trying to keep all the information about every subsystem, and how the subsystems interact, in your head. So for each subsystem of the entire system, you have a model you are Continue reading

Get $100 Back If You Order Two Newly Announced Amazon Echo Show Devices Right Now – Deal Alert

The newly-announced Echo Show is available for pre-order in black or white and will start shipping on Wednesday, June 28. Right now if you buy two of them and enter the code SHOW2PACK at checkout, you'll activate a special $100 discount. So you'll get two new Echo Shows for the price of two standard Echos. Go in on this deal with a friend, or buy a few for yourself (they work very well in multiple rooms). Echo Show brings you everything you love about Alexa, and now she can show you things. Watch video flash briefings and YouTube, talk with family and friends (if they have Echos as well), see music lyrics, security cameras, photos, weather forecasts, to-do and shopping lists, and more. All hands-free—just ask. Select two-day shipping when you check out, and Amazon says you'll have it the very day it's released. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.To read this article in full or to leave a comment, please click here(Insider Story)

What it takes to be a security architect

Security architects are the people responsible for maintaining the security of their organizations’ computer systems, and as such they must be able to think as hackers do in order to anticipate the tactics attackers can use to gain unauthorized access to those systems, according to the InfoSec Institute.Anyone in this position can expect to have to work odd hours on occasion, and needs to be constantly up to date on the latest security threats and available tools.Sometimes people who ultimately take on the role of security architect, like Jerod Brennen, could not have predicted such a career direction when they were younger. When Brennen began attending Capital University, a small liberal arts college in Ohio, in the 1990s, he intended to pursue a career in the film industry as a composer.To read this article in full or to leave a comment, please click here(Insider Story)

Mobile is the new desktop, and that’s good for enterprise apps

Android surpassed Microsoft's Windows in March to become the most popular operating system on the internet, according to figures compiled by GlobalStats, the research arm of web analytics company StatCounter.GlobalStats found that, worldwide, Android had a 37.93 percent internet usage market share, just ahead of Windows at 37.91 percent. "This is a milestone in technology history and the end of an era," said Aodhan Cullen, StatCounter's CEO.  "It marks the end of Microsoft’s leadership worldwide of the OS market which it has held since the 1980s. It also represents a breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago."To read this article in full or to leave a comment, please click here

Why smart contracts can’t be fully automated

Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here

Why smart contracts can’t be fully automated

Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here