Archive

Category Archives for "Networking"

An SD-WAN service that gets around the Great Firewall of China legally

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here

Intel unveils new Xeon E-2200 line for entry level servers

Intel is relaunching the Xeon E-2200 line, which it first introduced in May for workstations, as a low-end server processor for simpler tasks. The new chips are socket-compatible with the older E-2100 line so existing servers can be upgraded.Intel makes no bones about it, the Xeon E-2200 processors are for entry-level servers, coming in 4-core and 6-core designs as well as a new 8-core product capable of hitting 5.0 GHz with Intel’s Turbo Boost Technology 2.0.[Get regularly scheduled insights by signing up for Network World newsletters.] The Xeon E-2288G and E-2278G CPUs are the new high-end models with eight cores and 16 threads, a boost over the six-core count of the E-2100. The E-2200 is meant for single-socket systems with a maximum memory capacity of 128GB.To read this article in full, please click here

DNS Wars

The 77th NANOG meeting was held in Austin, Texas at the end of October and they invited Farsight’s Paul Vixie to deliver a keynote presentation. These are my thoughts in response to his presentation, and they are my interpretation of Paul’s talk and more than a few of my opinions thrown in for good measure!

Intel unveils new Xeon E-2200 line for entry level servers

Intel is relaunching the Xeon E-2200 line, which it first introduced in May for workstations, as a low-end server processor for simpler tasks. The new chips are socket-compatible with the older E-2100 line so existing servers can be upgraded.Intel makes no bones about it, the Xeon E-2200 processors are for entry-level servers, coming in 4-core and 6-core designs as well as a new 8-core product capable of hitting 5.0 GHz with Intel’s Turbo Boost Technology 2.0.[Get regularly scheduled insights by signing up for Network World newsletters.] The Xeon E-2288G and E-2278G CPUs are the new high-end models with eight cores and 16 threads, a boost over the six-core count of the E-2100. The E-2200 is meant for single-socket systems with a maximum memory capacity of 128GB.To read this article in full, please click here

A VPN service that gets around the Great Firewall of China legally

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here

An SD-WAN service that gets around the Great Firewall of China legally

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here

Tigera Joins the Fortinet Fabric-Ready Program and Partners with Fortinet to Secure Kubernetes Environments

We are proud to partner with Fortinet and join their Fabric-Ready Technology Alliance Partner program. With this partnership, Fortinet customers will be able to extend their network security architecture to their Kubernetes environments.

Our partnership was driven from interest from Fortinet’s customers to protect their Kubernetes based infrastructure. Kubernetes adoption is growing like wildfire and nearly every enterprise on the planet is at some stage of their Kubernetes journey.

The Tigera and Fortinet joint solution will support all cloud-based and on-premises Kubernetes environments. With this architecture, Tigera Secure will map security policies from FortiManager into each Kubernetes cluster in the cloud or on-premises. The joint solution will enable Fortinet customers to enforce network security policies for traffic into and out of the Kubernetes cluster (North/South traffic) as well as traffic between pods within the cluster (East/West traffic).

Tigera Secure will also integrate with threat feeds from FortiGuard to detect and block any malicious activity inside the clusters. Tigera will monitor the cluster traffic and send these events to FortiSIEM, enabling the security operations team to quickly diagnose the situation.

If you are attending Microsoft Ignite join us at our respective booths to learn more about our solution (Fortinet Booth #519 Continue reading

Chinese Operators Activate World’s Largest 5G Network

5G services are now live in 50 cities across the country, including Beijing, Shanghai, Guangzhou,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Performance Lies at the Heart of all Business Innovation

The Universal Quest for Speed Business innovation has always been key to the success of organizations, especially for those willing to adopt new solutions. From the first abacus and the invention of double entry bookkeeping to the introduction of the ticker tape to copy machine, technology has one thing in common – it has always enabled business to function faster and more efficiently, saving money and increasing productivity.Today’s digital innovation is no different. Applications and device functionality continue to accelerate business. And underlying those functions is the need for performance. Organizations literally spend trillions of dollars upgrading their networks and devices to generate more computing capacity to accommodate evolving business solutions. As a result, a single end user device today has more processing power, generates more data, and requires access to more digital resources than existed in the entire world just a handful of decades ago.To read this article in full, please click here

AWS to Open Cloud Data Centers in Spain

This will be AWS’s seventh region in Europe and brings its total to 22 worldwide.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Weekly Wrap: Cisco Trends Report Says Intent-Based Networking Is Coming

SDxCentral Weekly Wrap for Nov. 1, 2019: Cisco Warns IBN Is Coming; HPE Takes On VMware; Verizon,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

In Defense of Support

We’re all in IT. We’ve done our time in the trenches. We’ve…seen things, as Roy Batty might say. Things you wouldn’t believe. But in the end we all know the pain of trying to get support for something that we’re working on. And we know how painful that whole process can be. Yet, how is it that support is universally “bad” in our eyes?

One Of Us

Before we launch into this discussion, I’ll give you a bit of background on me. I did inbound tech support for Gateway Computers for about six months at the start of my career. So I wasn’t supporting enterprises to start with but I’ve been about as far down in the trenches as you can go. And that taught me a lot about the landscape of support.

The first thing you have to realize is that most Tier 1 support people are, in fact, not IT nerds. They don’t have a degree in troubleshooting OSPF or are signatories to the fibre channel standards. They are generally regular people. They get a week or two of training and off they go. In general the people on the other end of the support phone number are Continue reading

Micron finally delivers its answer to Optane

Micron Technology partnered with Intel back in 2015 to develop 3D XPoint, a new type of memory that has the storage capability of NAND flash but speed almost equal to DRAM. However, the two companies parted ways in 2018 before either of them could bring a product to market. They had completed the first generation, agreed to work on the second generation together, and decided to part after that and do their own thing for the third generation.Intel released its product under the Optane brand name. Now Micron is hitting the market with its own product under the QuantX brand. At its Insight 2019 show in San Francisco, Micron unveiled the X100, a new solid-state drive the company claims is the fastest in the world.To read this article in full, please click here

Learn how to earn a CompTIA IT certification with this $69 training bundle

There’s no shortage of IT jobs out there, especially since new tech-companies launch each year. That means that a career in IT can be stable and even lucrative. However, you’ll need to earn an IT certification before you can enter the field, and vendor-neutral CompTIA certifications are some of the most sought-after because they’re so versatile. If a career in IT sounds interesting to you, you can prepare for the CompTIA certification exams with this $69 training bundle.To read this article in full, please click here

Fortinet Fortifies Firewall, SD-WAN Capabilities

At the heart of the new firewall is the company's fourth-gen security processor, which it claims...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Going Keyless Everywhere

Going Keyless Everywhere
Going Keyless Everywhere

Time flies. The Heartbleed vulnerability was discovered just over five and a half years ago. Heartbleed became a household name not only because it was one of the first bugs with its own web page and logo, but because of what it revealed about the fragility of the Internet as a whole. With Heartbleed, one tiny bug in a cryptography library exposed the personal data of the users of almost every website online.

Heartbleed is an example of an underappreciated class of bugs: remote memory disclosure vulnerabilities. High profile examples other than Heartbleed include Cloudbleed and most recently NetSpectre. These vulnerabilities allow attackers to extract secrets from servers by simply sending them specially-crafted packets. Cloudflare recently completed a multi-year project to make our platform more resilient against this category of bug.

For the last five years, the industry has been dealing with the consequences of the design that led to Heartbleed being so impactful. In this blog post we’ll dig into memory safety, and how we re-designed Cloudflare’s main product to protect private keys from the next Heartbleed.

Memory Disclosure

Perfect security is not possible for businesses with an online component. History has shown us that no matter how Continue reading