Archive

Category Archives for "Networking"

Microsoft Azure networking is speeding up, thanks to custom hardware

Networking among virtual machines in Microsoft Azure is going to get a whole lot faster thanks to some new hardware that Microsoft has rolled out across its fleet of data centers.The company announced Monday that it has deployed hundreds of thousands of FPGAs (Field-Programmable Gate Arrays) across servers in 15 countries and five different continents. The chips have been put to use in a variety of first-party Microsoft services, and they're now starting to accelerate networking on the company's Azure cloud platform.In addition to improving networking speeds, the FPGAs (which sit on custom, Microsoft-designed boards connected to Azure servers) can also be used to improve the speed of machine-learning tasks and other key cloud functionality. Microsoft hasn't said exactly what the contents of the boards include, other than revealing that they hold an FPGA, static RAM chips and hardened digital signal processors. To read this article in full or to leave a comment, please click here

Microsoft Azure networking is speeding up, thanks to custom hardware

Networking among virtual machines in Microsoft Azure is going to get a whole lot faster thanks to some new hardware that Microsoft has rolled out across its fleet of data centers.The company announced Monday that it has deployed hundreds of thousands of FPGAs (Field-Programmable Gate Arrays) across servers in 15 countries and five different continents. The chips have been put to use in a variety of first-party Microsoft services, and they're now starting to accelerate networking on the company's Azure cloud platform.In addition to improving networking speeds, the FPGAs (which sit on custom, Microsoft-designed boards connected to Azure servers) can also be used to improve the speed of machine-learning tasks and other key cloud functionality. Microsoft hasn't said exactly what the contents of the boards include, other than revealing that they hold an FPGA, static RAM chips and hardened digital signal processors. To read this article in full or to leave a comment, please click here

FAQ: What is 802.11ad wireless technology?

Here are the broad strokes about 802.11ad, the wireless technology that’s just starting to hit the market. 802.11ac, 802.11ac wave 2, 802.11omg! Could we maybe get some different names for this stuff? No! Next question! May the power of the IEEE smite you down for heresy! Fine, fine. So 802.11ad – what’s the deal here? Well, now that you’re being civil, I’ll tell you – 802.11ad is, yes, a new wireless standard that uses the 60GHz spectrum instead of the 5GHz and 2.4GHz used by most Wi-Fi connections today. It boasts a theoretical max speed of 7Gbps, vs 3.2Gbps for 802.11ac Wave 2. MORE: 802.11ad is the fastest Wi-Fi that you might not ever use | Is Wi-Fi finally ‘fast enough?’To read this article in full or to leave a comment, please click here

IDG Contributor Network: Use models to measure cloud performance

When I was young, I made three plastic models. One was of a car—a '57 Chevy.  Another was of a plane—a Spitfire. And a third was of the Darth Vader TIE Fighter. I was so proud of them. Each one was just like the real thing. The wheels turned on the car, and the plane’s propeller moved when you blew on it. And of course, the TIE Fighter had Darth Vader inside.When I went to work on the internet, I had to measure things. As I discussed in my last post, Measure cloud performance like a customer, when you measure on the internet you need to measure in ways that are representative of your customers’ experiences. This affects how you measure in two ways. The first is the perspective you take when measuring, which I talked about last time. The second way is the techniques you use to perform those measurements. And those techniques are, in effect, how you make a model of what you want to know. Those childhood plastic models turn out to offer some solid guidance after all.To read this article in full or to leave a comment, please click here

Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire business.+More on Network World: The IoT is uranium+The pair, whom he identifies as Itay Huri and Yarden Bidani, both 18, were arrested in Israel at the request of the FBI six days after Krebs posted his blog and are now under house arrest.To read this article in full or to leave a comment, please click here

Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire business.+More on Network World: The IoT is uranium+The pair, whom he identifies as Itay Huri and Yarden Bidani, both 18, were arrested in Israel at the request of the FBI six days after Krebs posted his blog and are now under house arrest.To read this article in full or to leave a comment, please click here

How to build a budget PC for less than $300

These days, practically every household needs a computer. Even if your job doesn’t require you to peddle presentations after hours, everything from shopping to budgeting to keeping in touch with friends is a vastly more convenient with a keyboard and mouse. And who can resist the occasional foray into the spectacular world of YouTube “fail” videos?PCs can be expensive, though. That’s why hundreds of millions of people rely on 5-year-old-plus computers. For many folks, PCs are appliances rather than toys—pricey tools that are replaced only when they break, and reluctantly even then.To read this article in full or to leave a comment, please click here

10 ways to secure a mobile workforce

Super mobile workerImage by ThinkstockWe are entering the age of “supermobility,” in which mobile devices will provide all of the tools and technology that employees need to be productive on the go. And while workplace flexibility and convenience are at an all-time high, super-mobile employees are actually putting enormous amounts of company data at risk.To read this article in full or to leave a comment, please click here

10 ways to secure a mobile workforce

Super mobile workerImage by ThinkstockWe are entering the age of “supermobility,” in which mobile devices will provide all of the tools and technology that employees need to be productive on the go. And while workplace flexibility and convenience are at an all-time high, super-mobile employees are actually putting enormous amounts of company data at risk.To read this article in full or to leave a comment, please click here

How to mitigate hackers who farm their victims

Nation-states and savvy criminal hackers don’t pull uninformed, spur-of-the-moment smash-and-grab jobs on data networks. They reconnoiter and position themselves to slowly implement precise surgical maneuvers to exfiltrate your information treasures. Most of these attackers are capable of ensuring you remain unaware of their movements until it is to their benefit for you to know.High-profile attacks that leveraged extended dwell time inside the networks of large retail chains such as Target are examples of how hackers farm or manage victim organizations in this manner.Hackers farm their targets by maintaining a veiled presence in sensitive places in and around government and enterprise networks, revealing their position in a calculated way at an optimal time to achieve some strategic goal, says Danny Rogers, CEO at Terbium Labs.To read this article in full or to leave a comment, please click here

How to mitigate hackers who farm their victims

Nation-states and savvy criminal hackers don’t pull uninformed, spur-of-the-moment smash-and-grab jobs on data networks. They reconnoiter and position themselves to slowly implement precise surgical maneuvers to exfiltrate your information treasures. Most of these attackers are capable of ensuring you remain unaware of their movements until it is to their benefit for you to know.High-profile attacks that leveraged extended dwell time inside the networks of large retail chains such as Target are examples of how hackers farm or manage victim organizations in this manner.Hackers farm their targets by maintaining a veiled presence in sensitive places in and around government and enterprise networks, revealing their position in a calculated way at an optimal time to achieve some strategic goal, says Danny Rogers, CEO at Terbium Labs.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Always be prepared: Monitor, analyze and test your security

This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity.We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussed how to build malware defenses. We also explored how to create a data recovery plan, how to protect your data, and the importance of monitoring and training employees.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Always be prepared: Monitor, analyze and test your security

This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity.We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussed how to build malware defenses. We also explored how to create a data recovery plan, how to protect your data, and the importance of monitoring and training employees.To read this article in full or to leave a comment, please click here

Nutanix CEO skewers box-based hyperconvergence rivals

Nutanix founder and CEO Dheeraj Pandey doesn’t want you to get too excited by today’s hyperconverged infrastructure offerings because they’re just ‘a pit stop’ on the way to making all infrastructure invisible. Pandey, whose company is preparing for an initial public offering, talked with IDG Chief Content Officer John Gallant about the competitive landscape in hyperconvergence today and he pulled no punches in assessing rivals like Simplivity and VCE. In Pandey’s view, only VMware is on the same path of building, essentially, the operating system for hybrid cloud but Nutanix is starting from a clean slate. Pandey also discussed Nutanix’s partnership with Dell Technologies and explained why Cisco has no love for his company these days.To read this article in full or to leave a comment, please click here(Insider Story)

Nutanix CEO skewers box-based hyperconvergence rivals

Nutanix founder and CEO Dheeraj Pandey doesn’t want you to get too excited by today’s hyperconverged infrastructure offerings because they’re just ‘a pit stop’ on the way to making all infrastructure invisible. Pandey, whose company is preparing for an initial public offering, talked with IDG Chief Content Officer John Gallant about the competitive landscape in hyperconvergence today and he pulled no punches in assessing rivals like Simplivity and VCE. In Pandey’s view, only VMware is on the same path of building, essentially, the operating system for hybrid cloud but Nutanix is starting from a clean slate. Pandey also discussed Nutanix’s partnership with Dell Technologies and explained why Cisco has no love for his company these days.To read this article in full or to leave a comment, please click here(Insider Story)

How Do I Get a Grasp of SDN and NFV?

One of my readers had problems getting the NFV big picture (and how it relates to SDN):

I find the topic area of SDN and NFV a bit overwhelming in terms of information, particularly the NFV bit.

NFV is a really simple concept (network services packaged in VM format), what makes it complex is all the infrastructure you need around it.

Read more ...

IBM promises a one-stop analytics shop with AI-powered big data platform

Big data is in many ways still a wild frontier, requiring wily smarts and road-tested persistence on the part of those hoping to find insight in all the petabytes. On Tuesday, IBM announced a new platform it hopes will make things easier.Dubbed Project DataWorks, the new cloud-based platform is the first to integrate all types of data and bring AI to the table for analytics, IBM said.Project DataWorks is available on IBM's Bluemix cloud platform and aims to foster collaboration among the many types of people who need to work with data. Tapping technologies including Apache Spark, IBM Watson Analytics and the IBM Data Science Experience launched in June, the new offering is designed to give users self-service access to data and models while ensuring governance and rapid-iteration capabilities.To read this article in full or to leave a comment, please click here