Archive

Category Archives for "Networking"

BrandPost: The Time Is Now For An Application-Driven WAN Edge Powered By The Latest In Silver Peak SD-WAN Innovation

While much of the market is focused on the promise of an SD-WAN to lower connectivity costs, I believe SD-WAN, when done right, can offer significant incremental value beyond the favorable economics of broadband connectivity.A complete SD-WAN solution must assure consistent application performance and resiliency, make the WAN edge more application-driven, improve network security, and overall, dramatically simplify the WAN architecture for geographically distributed enterprises. It should also enable enterprises to create a thin branch where network functions such as routing, firewalls, WAN optimization along with SD-WAN are delivered as a single integrated solution.To read this article in full or to leave a comment, please click here

The emergence of software-defined application delivery technology – and what it can do for your network

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

The flexibility of the cloud has driven IT to look closely at opportunities to replicate that agility in their own infrastructure and operations. Automation initiatives have optimized many layers of the computing stack, but application delivery services remain a last-mile problem as network teams find themselves hamstrung by inflexible legacy architectures.

While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.

To read this article in full or to leave a comment, please click here

The emergence of software-defined application delivery technology – and what it can do for your network

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.The flexibility of the cloud has driven IT to look closely at opportunities to replicate that agility in their own infrastructure and operations. Automation initiatives have optimized many layers of the computing stack, but application delivery services remain a last-mile problem as network teams find themselves hamstrung by inflexible legacy architectures.While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.To read this article in full or to leave a comment, please click here

The emergence of software-defined application delivery technology – and what it can do for your network

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.The flexibility of the cloud has driven IT to look closely at opportunities to replicate that agility in their own infrastructure and operations. Automation initiatives have optimized many layers of the computing stack, but application delivery services remain a last-mile problem as network teams find themselves hamstrung by inflexible legacy architectures.While virtual appliances for load balancing, long thought of as the answer for software-driven infrastructure, have existed since the advent of virtualization, they inherit most of the architectural challenges of legacy solutions, including limited scalability, lack of central management and orchestration, and performance limitations. Instead, what is needed is an application delivery architecture based on software-defined principles that logically separates the control plane from the data plane delivering the application services.To read this article in full or to leave a comment, please click here

Avaya plan deploys network virtualization, segmentation to guard business jewels

Avaya has rolled out products it says will help enterprise customers more easily segment traffic between widely dispersed networked resources and effectively protect corporate data.The two central components of what the company calls its Data Center Everywhere plan include a new hardware-independent operating system for the company’s switches – the Virtual Service 8000 non-Avaya products such as x86, or ARM platforms – that lets customers deploy virtualized network functions anywhere in the network.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here

Avaya plan deploys network virtualization, segmentation to guard business jewels

Avaya has rolled out products it says will help enterprise customers more easily segment traffic between widely dispersed networked resources and effectively protect corporate data.The two central components of what the company calls its Data Center Everywhere plan include a new hardware-independent operating system for the company’s switches – the Virtual Service 8000 non-Avaya products such as x86, or ARM platforms – that lets customers deploy virtualized network functions anywhere in the network.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here

Avaya plan deploys network virtualization, segmentation to guard business jewels

Avaya has rolled out products it says will help enterprise customers more easily segment traffic between widely dispersed networked resources and effectively protect corporate data.The two central components of what the company calls its Data Center Everywhere plan include a new hardware-independent operating system for the company’s switches – the Virtual Service 8000 non-Avaya products such as x86, or ARM platforms – that lets customers deploy virtualized network functions anywhere in the network.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here

Unpatched vulnerability exposes Magento online shops to hacking

An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.The flaw was discovered by researchers from security consultancy DefenseCode and is located in a feature that retrieves preview images for videos hosted on Vimeo. Such videos can be added to product listings in Magento.The DefenseCode researchers determined that if the image URL points to a different file, for example a PHP script, Magento will download the file in order to validate it. If the file is not an image, the platform will return a "Disallowed file type" error, but won't actually remove it from the server.To read this article in full or to leave a comment, please click here

The AI revolution: Is the future finally now?

 Over the last several decades, the evolution of artificial intelligence has followed an uncertain path – reaching incredible highs and new levels of innovation, often followed by years of stagnation and disillusionment as the technology fails to deliver on its promises.Today we are once again experiencing growing interest in the future possibilities for AI. From voice powered personal assistants like Google Home and Alexa, to Netflix’s predictive recommendations, Nest learning thermostats and chatbots used by banks and retailers, there are countless examples of AI seeping into everyday life and the potential of future applications seem limitless . . . again.To read this article in full or to leave a comment, please click here

The AI revolution: Is the future finally now?

 Over the last several decades, the evolution of artificial intelligence has followed an uncertain path – reaching incredible highs and new levels of innovation, often followed by years of stagnation and disillusionment as the technology fails to deliver on its promises.

Today we are once again experiencing growing interest in the future possibilities for AI. From voice powered personal assistants like Google Home and Alexa, to Netflix’s predictive recommendations, Nest learning thermostats and chatbots used by banks and retailers, there are countless examples of AI seeping into everyday life and the potential of future applications seem limitless . . . again.

To read this article in full or to leave a comment, please click here

VMware cloud design decisions: LACP part 1

Recently I’ve been helping a customer who’s working on a VMware cloud design. As is often the case, there are a set of consulting SME’s helping with the various areas; an NSX/virtualization consultant, the client’s tech team and a network guy (lucky me).

One of the interesting challenges in such a case is understanding the background behind design decisions that the other teams have made and the flow-on effects they have on other components. In my case, I have a decent background in designing a VMware cloud and networking, so I was able to help bridge the gap a little.

My pet peeve in a lot of cases is the common answer of “because it’s ‘best-practice’ from vendor X” and a blank stare when asked: “sure, but why?”. In this particular case, I was lucky enough to have a pretty savvy customer, so a healthy debate ensued. This is that story.

Disclaimer: What I’m going to describe is based on network switches running Cumulus Linux and specifically some down-in-the-weeds details on this particular MLAG implementation. That said, most of the concepts apply to similar network technologies (VPC, other MLAG implementations, stacking, virtual-chassis, etc.) as they operate in very Continue reading

Cloudflare Rate Limiting – Insight, Control, and Mitigation against Layer 7 DDoS Attacks

Today, Cloudflare is extending its Rate Limiting service by allowing any of our customers to sign up. Our Enterprise customers have enjoyed the benefits of Cloudflare’s Rate Limiting offering for the past several months. As part of our mission to build a better internet, we believe that everyone should have the ability to sign up for the service to protect their websites and APIs.

CC-BY 2.0 image by Benjamin Child

Rate Limiting is one more feature in our arsenal of tools that help to protect our customers against denial-of-service attacks, brute-force password attempts, and other types of abusive behavior targeting the application layer. Application layer attacks are usually a barrage of HTTP/S requests which may look like they originate from real users, but are typically generated by machines (or bots). As a result, application layer attacks are often harder to detect and can more easily bring down a site, application, or API. Rate Limiting complements our existing DDoS protection services by providing control and insight into Layer 7 DDoS attacks.

Rate Limiting is now available to all customers across all plans as an optional paid feature. The first 10,000 qualifying requests are free, which allows customers to start using Continue reading

HP to ship its Omen X VR backpack PC in June

HP will make a major virtual reality push in June, when it will start shipping its Omen X VR backpack PC.The backpack PC has already been announced, but the company until now had not provided a shipping date. HP is accepting applications from gamers and commercial developers to test the product.There will be two types of Omen X backpack PCs, Ron Coughlin, president of the Personal Systems Business at HP, said in an interview. HP will release a VR backpack for gamers, and one for commercial customers, he said.Users will be able to carry the PC like a backpack and hook up a VR headset like HTC's Vive. Wearing the backpack PC allows users to move around freely.To read this article in full or to leave a comment, please click here

Security researcher blasts Tizen: “May be the worst code I’ve ever seen”

Samsung has had enough struggles with Tizen, the open source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming. Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here

Security researcher blasts Tizen: ‘May be the worst code I’ve ever seen’

Samsung has had enough struggles with Tizen, the open-source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming.Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here