In the Three Paths of Enterprise IT part of Business Aspects of Networking webinar I covered the traditional networking vendor landscape. Let’s try to do the same for SD-WAN.
It’s clear that we have two types of SD-WAN vendors:
Read more ...It is extremely easy to find articles regarding how serious relationships in college can interfere with your studies and keep you from fully experience all college life has to offer. While it is true that some serious relationships cause a lot of upheaval and may have a negative influence on the college experience for some people, this does not hold true for all college students.
In many situations, having serious relationships in college can actually help your career once you graduate. Here are just some ways that serious relationships in college can help your career later.
To make a relationship work, two people need to work as a team and both parties have to learn to compromise and communicate well. Teamwork, compromise, and communication are also important in any career you choose. Being in a relationship can help you learn these necessary skills that are as important to your professional life as they are to your personal life.
Being in a relationship, whether that relationship is good or bad, you tend to learn as much about yourself as Continue reading
SASE combines elements of SD-WAN and network security into a single cloud-managed package.
A few months ago Johannes Weber sent me a short email saying “hey, I plan to write a few NTP posts” and I replied “well, ping me when you have something ready”.
In the meantime he wrote a veritable NTP bible - a series of NTP-related blog posts covering everything from Why Should I Run My Own NTP Servers to authentication, security and monitoring - definitely a MUST READ if you care about knowing what time it is.
On today's sponsored Heavy Networking, we talk with Juniper Networks and Corero about how they've partnered on a unique solution to thwart DDoS attacks at the network edge using Juniper's MX routers and Corero's SmartWall Threat Defense Director (TDD). The solution can be used by service providers, enterprises, and in the cloud. Our guests are Ashley Stephenson, CEO of Corero; and Mark Denny, Product Manager, Senior Staff at Juniper Networks.
The post Heavy Networking 479: Scaling Up Your DDoS Protection With Juniper Networks And Corero (Sponsored) appeared first on Packet Pushers.
One of the items that often trips folks up with MPLS is the concept of label switched paths or LSPs. We’ve talked about them extensively before in many of the blog posts here and I’ve described them a couple of different ways. Many people look at an LSP as a sort of unidirectional tunnel. In fact, most network diagrams aiming to describe an LSP often show it just as that – a tunnel. It’s an easy thing to visualize especially when you start talking about nested tunnels or LSPs inside of LSPs, but I also think it can be rather confusing. This becomes even more confusing when people start talking about end to end LSPs or how a service label is the same end to end as traffic traverses an LSP. What does that mean? Where does an LSP start or stop? Is it really a tunnel? How far can an LSP reach? What if we run different label distribution protocols? In this post, and perhaps the next, I hope to address these questions as well as talk about how we can solve some of the common problems that are often encountered with LSPs.
So let’s dive right in and Continue reading
An IDC survey found 51% of organizations expect high application interdependencies in two years....
The system, which is based on an independent graphics processing unit, is designed to facilitate a...
That boost was felt in IBM’s Cloud and Cognitive Software business were most of Red Hat’s...
When you start evaluating a solution, you are going to get a laundry list of features and functionality that you are supposed to use as criteria for selection. Some are important, like the ones that give you the feature set you need to get your job done. Others are less important for the majority of use cases. One thing tends to stand out for me though.
Since the dawn of platforms, I believe the first piece of comparison marketing has been “avoids lock-in”. You know you’ve seen it too. For those that may not be completely familiar with the term, “lock-in” describes a platform where all the components need to come from the same manufacturer or group of manufacturers in order to work properly. An example would be if a networking solution required you to purchase routers, switches, access points, and firewalls from a single vendor in order to work properly.
Lock in is the greatest asset a platform company has. The more devices they can sell you the more money they can get from you at every turn. That’s what they want. So they’re going to do everything they can to keep you in their ecosystem. Continue reading
SDxCentral Weekly Wrap for Oct. 18, 2019: Many have questioned AWS' open source moves; Ericsson...
The post Usage-based billing with NetFlow and sFlow appeared first on Noction.
Listening to (some) industry evangelists you would believe that there’s no future in being a networking engineer. After all, all workloads will move into the cloud, and all clients will connect through a universal 5G network… but even if that utopia eventually comes true, you can’t get away from the laws of physics (and the need networking infrastructure).
TL&DR: our new online course will help you master the shiny new world. You can register right now or keep reading ;)
Read more ...Databricks takes aim at the swamp monsters lurking in data lakes, announcing Delta Lake will fly...