In the previous video in the Switching, Routing and Bridging section of How Networks Really Work webinar we compared transparent bridging with IP routing. Not surprisingly (given my well-known bias toward stable solutions) I recommended using IP routing as much as possible, but there are still people out there pushing large-scale transparent bridging solutions.
In today’s video we’ll look at some of the supposed use cases and stable solutions you could use instead of stretching a virtual thick yellow cable halfway across a continent.
A new CEO invariably means a reorganization around his/her vision of things and an attempt to address perceived problems in the company’s organizational structure. In hindsight, that’s another clue that Bob Swan wasn’t long for the CEO’s job at Intel, since he never did a reorg.
Pat Gelsinger, who has been Intel’s CEO for just over four months, on the other hand, completely flipped the table with a major reorganization that creates two new business units, promoted several senior technologists to leadership roles, and saw the departure of a major Intel veteran.
The two new units: one for software and the other on high performance computing and graphics. Greg Lavender will serve as Intel’s chief technology officer and lead the new Software and Advanced Technology Group. As CTO, he will head up research programs, including Intel Labs. Lavender comes to Intel from VMware, where he was also CTO, and has held positions Citigroup, Cisco, and Sun Microsystems.
In earlier blogs in this series, we covered data center architecture trends, network virtualization and overlays, traditional network automation, advanced...
The post Enterprise Use Case: Active-Active Data Centers for Private Cloud appeared first on Pluribus Networks.
Bluecat, in cooperation with an outside research consultant, jut finished a survey and study on the lack of communication and divisions between the cloud and networking teams in deployments to support business operations. Dana Iskoldski joins Tom Ammon and Russ White to discuss the findings of their study, and make some suggestions about how we can improve communication between the two teams.
Please find a copy of the study at http://bluecatnetworks.com/hedge.
Contributors: Stefano Ortolani (NSBU TAU)
MISP (originally Malware Information Sharing Platform) is a platform to share, store, and correlate Indicators of Compromise (IOCs) from targeted attacks, threat intelligence, or even financial fraud information. One of the reasons underlying MISP’s success is its extensibility via third-party modules. However, as the number of contributors increases, coordination and distribution can quickly become a challenge. To solve this issue, MISP’s authors created a satellite project called MISP modules.
Before joining the NSX family, we at Lastline contributed three different modules to the MISP project in order to better integrate MISP with the sandbox that is now part of the NSX Advanced Threat Analyzer (ATA) product offering. The main idea was to enrich the file indicators referencing an artifact with behavioral information extracted by detonating the artifact in the sandbox, or by retrieving the analysis result of previous detonations. We accomplished this by relying on three different modules:
Starting today, we’re excited to share that you can now shift another traditional client-driven use case to a browser. Teams can now provide their users with a Virtual Network Computing (VNC) client fully rendered in the browser with built-in Zero Trust controls.
Like the SSH flow, this allows users to connect from any browser on any device, with no client software needed. The feature runs in every one of our data centers in over 200 cities around the world, bringing the experience closer to your end users. We also built the experience using Cloudflare Workers, to offer nearly instant start times. In the future we will support full auditability of user actions in their VNC and SSH sessions.
VNC is a desktop sharing platform built on top of the Remote Frame Buffer protocol that allows for a GUI on any server. It is built to be platform-independent and provides an easy way for administrators to make interfaces available to users that are less comfortable with a command-line to work with a remote machine. Or to complete work better suited for a visual interface.
In my case, the most frequent reason I use VNC is Continue reading
One of ipSpace.net subscribers sent me this interesting question:
I am the network administrator of a small data center network that spans 2 buildings. The main building has a pair of L2/L3 10G core switches. The second building has a stack of access switches connected to the main building with 10G uplinks. This secondary datacenter has got some ESX hosts and NAS for remote backup and some VM for development and testing, but all the Internet connection, firewall and server are in the main building.
There is no routing in the secondary building and most of the VLANs are stretched. Do you think I must change that (bringing routing to the secondary datacenter), or keep it simple like it is now?
As always, it depends, this time on what problem are you trying to solve?
We are pleased to announce the introduction of VMware NSX Advanced Firewall for VMware Cloud on AWS, which takes the network security capabilities of VMware Cloud on AWS SDDC to a new level. Adding NSX Advanced Firewall features allows organizations to define security policies at Layer 7 while enabling deep packet inspection across all vNICS within the software-defined data center (SDDC).
NSX Advanced Firewall capabilities help you secure your applications against a never-expanding set of threats on the internet. Specifically, it includes a robust set of networking and security capabilities that enable customers to run production applications in the cloud.
This capability allows you to:
Get the full summary on the VMware Cloud Blog or directly access the product page.
The post Introducing VMware NSX Advanced Firewall for VMware Cloud on AWS appeared first on Network and Security Virtualization.
Big day today! We are releasing the new IRP Lite v 3.11.1. Most of the features first introduced in the regular IRP
The post Introducing IRP Lite 3.11.1 – mighty, feature-rich, 100% free! appeared first on Noction.
On today's Day Two Cloud podcast we talk storage with sponsor Scality about its ARTESCA platform, cloud-native object storage for modern workloads. It integrates with Kubernetes, serves as storage for your public cloud, and more. We dive into the product architecture, use cases, and hardware options via Scality's partnership with HPE.
The post Day Two Cloud 103: Scality ARTESCA Is More Than An Object Store (Sponsored) appeared first on Packet Pushers.