Archive

Category Archives for "Networking"

BrandPost: How a business-driven SD-WAN can deliver a multiplier effect on your cloud investments

I just left another CIO meeting with a Fortune 100 prospect who was wondering, “why Silver Peak versus the 800-pound gorilla in the networking space that offers several different ‘SD-WAN’ offerings?” The challenge she faced wasn’t about whether it was the best solution or not - Silver Peak cruised through the technical evaluation, easily winning the technical recommendation. What she really wanted to know is if she should trust the future of her next Wide Area Network (WAN) to a private company.This is a challenge we at Silver Peak face in seemingly every account we earn. The technical part isn’t the hard part, as we consistently win product evaluations and bakeoffs. What we have to prove is that it’s actually less risky to choose Silver Peak as the platform to build their next generation WAN on when compared to trying to stretch a Cisco router-centric model. To read this article in full, please click here

Cisco ACI – API Calls vs JSON POST

API Calls method The fancy way of configuring Cisco ACI Fabric is by using Python script for generating API calls. Those API calls are then used to configure Cisco ACI by pushing those calls to APIC controller using POSTMAN (or similar tool). Configuration changes done this way are those that you are doing often and without much chance of making mistakes. You write a Python script and that script will take your configuration variables and generate API call that will configure the system quickly and correctly every time. The thing is that you need to take the API call example

The post Cisco ACI – API Calls vs JSON POST appeared first on How Does Internet Work.

vlog. Episode 6. Closed-loop automation [LIVE]

Hello my friend,

This vlog episode I’m alone. Eh… But I have an opportunity to share with you the talk I’ve delivered an the NetLdn #6 event two weeks ago. Now you have an opportunity to watch this talk as well!

In this episode you will see the high-level description of the Data Centre Fabric Project I’ve been doing this year with the focus on the closed-loop automation using open-source tools. Additionally, you will see LIVE DEMO of the closed-loop automation as an extension to ZTP, where the full data centre fabric running Cumulus switches will be provisioned from zero to full operational state.

If you’ve recently read about Mellanox/Cumulus, the same approach perfectly fits this pair.

But it is not only about Cumulus. Any network supplier we’ve discussed (Arista, Nokia, Cisco and much more) can be provisioned in such a way, and you can find the sample templates in the GitHub repo.

Support us





Continue reading

On the Usability of OSI Layered Networking Model

Two weeks ago I replied to a battle-scar reaction to 7-layer OSI model, this time I’ll address a much more nuanced view from Russ White. Please read his article first (as always, it’s well worth reading) and when you come back we’ll focus on this claim:

The OSI Model does not accurately describe networks.

Like with any tool in your toolbox, you can view the 7-layer OSI model in a number of ways. In the case of OSI model, it can be used:

Read more ...

BrandPost: How HPE Metering Technology Delivers a Better Way to Consume IT

HPE GreenLake is a true pay-as-you-go, consumption-based approach to hybrid IT. It’s different from anything else on the market, so it’s not surprising that customers tend to have lots of questions. Here are some that I hear quite often:Do I have to purchase the infrastructure?No. HPE GreenLake is an “as-a-service” model, so we own and manage the equipment for you at your site, and we provide a buffer of capacity right-sized to your business. Then we measure how much you use, and we charge based on that usage.What if I run out of capacity?To read this article in full, please click here

BrandPost: Take the Intelligent Route with Consumption-Based Storage

Data is at the center of everything we do today. It’s a massive resource that you can use to fuel innovation, steer the business with greater insights, and rev up people to do their best work. But data overload, unpredictable workload demands, and growing maintenance and security requirements can stall important initiatives when storage systems lack the performance, scale, agility, and e­fficiency to keep up.But there’s good news. The agility and economics of HPE storage combined with HPE GreenLake let you run IT like a finely tuned engine: Improve economics with no up-front payment and 100% economic storage utilization Reduce risk of running out of capacity or wasting money by overprovisioning Accelerate value with on-demand storage solutions aligned to your workload needs Ensure control over performance, security, and compliance. Click here to view the complete infographic. To read this article in full, please click here

Take the Intelligent Route with Consumption-Based Storage

Data is at the center of everything we do today. It’s a massive resource that you can use to fuel innovation, steer the business with greater insights, and rev up people to do their best work. But data overload, unpredictable workload demands, and growing maintenance and security requirements can stall important initiatives when storage systems lack the performance, scale, agility, and e­fficiency to keep up.But there’s good news. The agility and economics of HPE storage combined with HPE GreenLake let you run IT like a finely tuned engine: Improve economics with no up-front payment and 100% economic storage utilization Reduce risk of running out of capacity or wasting money by overprovisioning Accelerate value with on-demand storage solutions aligned to your workload needs Ensure control over performance, security, and compliance. Click here to view the complete infographic. To read this article in full, please click here

How HPE Metering Technology Delivers a Better Way to Consume IT

HPE GreenLake is a true pay-as-you-go, consumption-based approach to hybrid IT. It’s different from anything else on the market, so it’s not surprising that customers tend to have lots of questions. Here are some that I hear quite often:Do I have to purchase the infrastructure?No. HPE GreenLake is an “as-a-service” model, so we own and manage the equipment for you at your site, and we provide a buffer of capacity right-sized to your business. Then we measure how much you use, and we charge based on that usage.What if I run out of capacity?To read this article in full, please click here

BrandPost: More Elbow-Room for Innovation: Reducing the Ops Load with HPE Adaptive Management Services

We’re hearing a lot these days about how CIOs are becoming more strategic partners with executive management – how IT is moving closer to the core of the business and earning a seat at the table in strategy discussions. I’m a bit skeptical that it’s happening on anything like a broad scale. It’s certainly true that there’s an awareness that IT is “mission critical,” that you absolutely cannot afford to have the network go down even for a second, or a security slip-up that results in losing hundreds of thousands of credit card records. Those are hugely important discussions, but they’re not seen as directly related to business outcomes.Many in the C-Suite still see at least a percentage of IT expenditures as almost like a tax on the business. When IT leaders get into investment conversations, their colleagues are often about as excited as the rest of us are when it’s time to pay our personal income tax bill.To read this article in full, please click here

BrandPost: Optimizing your Hybrid Cloud Environment: Key Considerations for Workload Placement, Cost Control, and Cloud Management

 This video is hosted by Owen Rogers of 451 Research and discusses key considerations for workload placement, cost control, and management of hybrid cloud environments. It is based on research conducted for HPE GreenLake Hybrid Cloud. Click here to watch the video. To read this article in full, please click here

The Week in Internet News: IoT Devices Could Put Privacy at Risk, Study Says

A real privacy headache: Internet of Things devices potentially expose consumer information to other parties, according to a recent study featured on Vice.com. Many IoT devices collect and share a wealth of information including the IP address, usage habits, and location data. That data is then often shared with “a laundry list” of third parties.

Encryption objections: ISP trade groups are objecting to a plan by Google to a new encryption regime for domain name lookups in its Chrome browser and Android operating system, Broadcasting and Cable reports. The plan would give Google too much power, the groups have told U.S. lawmakers.

Moving to the country: Microsoft and Nextlink Internet have unveiled a plan to bring broadband to millions of people living in the rural U.S., WindowsCenteral.com says. The Microsoft Airband Initiative’s goal is to extend broadband access to more than 3 million unserved U.S. residents by mid-2022, with more areas covered by 2024.

The FBI wants in: The U.S. FBI tried to get the operators of encrypted phone carrier Phantom Secure to create a backdoor, as a way to spy on the Sinaloa drug cartel, Vice.com reports. The company was accused Continue reading

IBM’s journey to tens of thousands of production Kubernetes clusters

IBM Cloud has made a massive shift to Kubernetes. From an initial plan for a hosted Kubernetes public cloud offering it has snowballed to tens of thousands of production Kubernetes clusters running across more than 60 data centers around the globe, hosting 90% of the PaaS and SaaS services offered by IBM Cloud.

I spoke with Dan Berg, IBM Distinguished Engineer, to find out more about their journey, what triggered such a significant shift, and what they learned along the way.

So take me back to the beginning – how did this thing get started?

It must have been 3 years ago.  At that time, IBM had been building customer-facing services in the cloud for several years implemented as traditional VM or Cloud Foundry workloads. One of the services we offered was a container as a service (CaaS) platform that was built under the covers using Docker and OpenStack.  With this platform, we were the first in the industry to provide a true CaaS experience, but in some ways it was ahead of its time, and people weren’t ready to embrace a pure container as a service platform.

To this day we are still seeing double digit Continue reading

Stateless’ Software-Defined Interconnect Battles NFV, SD-WAN

The startup says “five of the top five” cloud and colocation service providers are testing its...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Next-Generation Reference Design Guide for NSX-T

The NSX-T 2.5 release marks a cornerstone in NSX-T as announced at VMworld 2019 by SVP Umesh Mahajan. 2019 has been a year of phenomenal growth for VMware’s NSX-T with its wide adoption by enterprises across several verticals.  In 2019, we introduced two ground-breaking releases NSX-T 2.4 and NSX-T 2.5. With these two releases, we are fully embarking on enterprise ready system becoming the de-facto enterprise software-defined networking (SDN) platform of choice.  

To support our customers in their network and security virtualization journey, we introduced the NSX-T design guide on the NSX-T 2.0 release and provided design guidance on how customers should design their data centers with NSX-T. 

Today, we are excited to announce the next version of the NSX-T design guide based on generally available NSX-T release 2.5. It is the foundation overhaul to design guidance and leading best practices. There have been numerous L2-L7 features additions and platform enhancements since NSX-T release 2.0. This design guide covers functional aspects of these enhancements and provides design guidance for them.  

What readers can expect in the new NSX-T Design Guide:

NeoPhotonics Points Lasers, AWG Multiplexers at Data Centers

The new lasers and the line of arrayed waveguide grating multiplexers are designed to bolster...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Ericsson Expands US Manufacturing With New Factory in Texas

The 300,000-square-foot factory will begin commercial operations early next year in Lewisville,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

CNTT’s Initial NFVi Release Targets OpenStack

The group is working with service providers to define and create VNF reference architectures for...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware NSX Achieves FIPS 140-2 Validation

Co-authored with Rajiv Prithvi, Product Manager Networking and Security Business Unit at VMware

During VMworld US 2019, we announced several new transformative capabilities in VMware NSX-T 2.5 release which is now shipping! The release strengthens the NSX platform’s intrinsic security, multi-cloud, container, and operational capabilities.

We also announced the successful FIPS 140-2 validation of NSX-T 2.5. FIPS compliance is mandatory for US federal agencies and has also been widely adopted in non-governmental sectors (e.g. financial services, utilities, healthcare). FIPS-140-2 establishes the integrity of cryptographic modules in use through validation testing done by NIST and CSE. With this validation, we further deliver on our confidentiality, integrity and availability objectives and provide our customers with a robust networking and security virtualization platform.

Compliance-Based Configuration with NSX-T 2.5

NSX-T 2.5 is configured to operate in FIPS mode by default. Any exceptions or deviations from established compliance norms are identified in a compliance report which can be used to review and configure your NSX-T Data Center environment to meet your IT policies and industry standards. Any exceptions to FIPS compliance including configuration errors can be retrieved from the compliance report using NSX Manager UI or APIs.

A sample FIPS Continue reading

Network Break 253: Arista CloudVision Ingests Configs From Third-Party Gear; Cisco Adds Azure To Cloud ACI

Today's Network Break discusses upgrades to Arista's CloudVision management software, a new ACI partnership between Cisco and Microsoft Azure, a Google pledge to invest in new European data centers, Amazon's pledge to be carbon-neutral by 2040, and more tech news.

The post Network Break 253: Arista CloudVision Ingests Configs From Third-Party Gear; Cisco Adds Azure To Cloud ACI appeared first on Packet Pushers.