Archive

Category Archives for "Networking"

BrandPost: The Silver Peak SD-WAN Edge Platform – It’s subtle but we enable people to build an SD-WAN, we don’t offer an SD-WAN

In my most recent blog post, I talked about the difficulty SD-WAN vendors have in finding their voice and clearly differentiating their value. My point was that if Wendy’s, Burger King, and McDonald’s could figure out how to differentiate their burgers and fries, we should be able articulate why customers choose our solutions over the 60+ vendors competing for their business. I started out talking about the business reasons why companies select Silver Peak. Now it’s time to talk about our differentiation at a product level.How is our SD-WAN edge platform, Unity EdgeConnect™, unique? I’ll frame the differentiation around what our customers are telling us. You’ll notice a significant emphasis on our ability to improve application performance for any type of application traversing any type of transport. We’re the only company that first tries to fix problems with the underlying network, allowing customers to fully leverage all of their circuits, even in instances of degraded performance. Unlike others, we don’t just re-route packets in the event of transport brownouts and blackouts.To read this article in full, please click here

Ciena Unveils Blue Planet-Enhanced 5G Router Haul

The optical giant says the routers will help network operators achieve the low-latency,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cohesity Goes ROBO on Data Management

Customers can manage hundreds of ROBO locations through Cohesity Helios similar to how they manage...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Fruit Drops and Packet Drops

Urban legends claim that Sir Isaac Newton started thinking about gravity when an apple dropped on his head. Regardless of its origins, his theory successfully predicted planetary motions and helped us get people to the moon… there was just this slight problem with Mercury’s precession.

Likewise, his laws of motion worked wonderfully until someone started crashing very small objects together at very high speeds, or decided to see what happens when you give electrons two slits to go through.

Then there was the tiny problem of light traveling at the same speed in all directions… even on objects moving in different directions.

Read more ...

Fruit Drops and Packet Drops

Urban legends claim that Sir Isaac Newton started thinking about gravity when an apple dropped on his head. Regardless of its origins, his theory successfully predicted planetary motions and helped us get people to the moon… there was just this slight problem with Mercury’s precession.

Likewise, his laws of motion worked wonderfully until someone started crashing very small objects together at very high speeds, or decided to see what happens when you give electrons two slits to go through.

Then there was the tiny problem of light traveling at the same speed in all directions… even on objects moving in different directions.

How to find what you’re looking for on Linux with find

There are a number of commands for finding files on Linux systems, but there are also a huge number of options that you can deploy when looking for them.For example, you can find files not just by their names, but by their owners and/or groups, their age, their size, the assigned permissions, the last time they were accessed, the associated inodes and even whether the files belong to an account or group that no longer exists on the system and so on.[Get regularly scheduled insights by signing up for Network World newsletters.] You can also specify where a search should start, how deeply into the file system the search should reach and how much the search result will tell you about the files it finds.To read this article in full, please click here

A $399 device that translates brain signals into digital commands

Scientists have long envisioned brain-sensing technology that can translate thoughts into digital commands, eliminating the need for computer-input devices like a keyboard and mouse. One company is preparing to ship its latest contribution to the effort: a $399 development package for a noninvasive, AI-based, brain-computer interface.The kit will let "users control anything in their digital world by using just their thoughts," NextMind, a commercial spinoff of a cognitive neuroscience lab claims in a press release.To read this article in full, please click here

Multicloud, security integration drive massive SD-WAN adoption

Increasing cloud adoption as well as improved network security, visibility and manageability are driving enterprise software-defined WAN (SD-WAN) deployments at a breakneck pace.According to research from IDC, software- and infrastructure-as-a-service (SaaS and IaaS) offerings in particular have been driving SD-WAN implementations in the past year, said Rohit Mehra, vice president, network infrastructure at  IDC. Read about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT For example, IDC says that its recent surveys of customers show that 95% will be using SD-WAN technology within two years, and that 42% have already deployed it. IDC also says the SD-WAN infrastructure market will hit $4.5 billion by 2022, growing at a more than 40% yearly clip between now and then.To read this article in full, please click here

Using AppleScript To Size A Window To 16×9 On MacOS

As part of an automation workflow I’m building around Elgato Stream Deck, I needed a way to size an application window to 16×9. This would be one component of a workflow that would allow me to launch an app, size the window, position it on the screen, and hide all the other windows with the push of a Stream Deck button.

The easy part was the Stream Deck configuration. The hard part was the AppleScript–I had never written one.

The Script

This AppleScript is crude, but it’s a start. I explain what the script is doing using inline comments, which in AppleScript are noted by the leading double-hyphens, although pound signs and (* *) delimiters for multi-line comments are also supported.

----------------------------------------------------------
-- SET VARIABLES
----------------------------------------------------------
-- theApp = name of the app MacOS will act upon
set theApp to "ApplicationName"

-- appWidth = how many pixels wide we'd like the window
-- appHeight is calculated as a 16:9 ratio of "appWidth"
-- Note that "as integer" means decimal portions of a 
-- calculation are truncated.
set appWidth to 1600
set appHeight to appWidth / 16 * 9 as integer

-- screenWidth = display pixel width
-- screenHeight =  Continue reading

Fortinet Firewall Update Tames 5G, IoT ‘Elephant Flows’

The company claims the appliance is capable of simultaneously juggling millions of connections per...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

3 Ways to Learn More About Intrinsic Security at RSAC 2020

Last year, we introduced powerful new innovations that make networking more secure and intrinsic to your infrastructure. These innovations included our Service-defined Firewall and introduction of optional distributed intrusion detection and prevention (IDS/IPS).

At RSAC 2020, VMware is making it easy to learn how intrinsic security can benefit your business with opportunities to engage us in 1:1 conversations, view demos and more.

Here are 3 ways that you can learn more about intrinsic security at RSAC 2020.

1.) Join Tom Gillis’ Breakout session:  Unshackle Legacy Security Restrictions for 2020 and Beyond

Tom Gillis, SVP/GM of Networking and Security at VMware, will be speaking at the RSA Conference in a breakout session. His session covers data center and branch security approaches and will feature demos across the VMware security portfolio including NSX Data Center, VMware NSX Advanced Load Balancer, and VMware SD-WAN.

Be sure to reserve a seat for his session!

2.) Meet with VMware Security Executives

Schedule an exclusive conversation with a security executive to discuss how intrinsic security for your network and workloads can enable proactive security that’s easy to operationalize.

Meeting time slots are limited so request a meeting now.

3.) Visit the Continue reading

Daily Roundup: Dell Sells RSA, Bags $2B

Dell bagged $2B with the sale of RSA; AT&T shared threat intelligence; and Orange teamed up...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

ExtraHop Extends Network Detection and Response to IoT

It becomes increasingly important as operators rollout 5G networks and enterprises connect billions...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: What You Need to Know about NVMe-oF™

The era of NVMe-over-Fabrics (NVMe-oF™) is quickly approaching. By 2025, most data centers will likely have adopted NVMe-oF for some part of their architecture1. Accessing data from a shared storage system will be essentially as fast and as low latency as accessing data from direct attached storage (DAS). The year 2025 seems like a lifetime from now but the reality is it will be here before you know it.Here are some of the top questions we hear from customers about this emerging technology. In this blog, our data center experts offer their responses, and point you to additional resources for understanding both the NVMe™ protocol and the fabric that stitches it together.To read this article in full, please click here

BrandPost: Stumbles, Fumbles, and Pratfalls: Steps to Avoid When Future-Proofing Your WAN

When SD-WAN was introduced, it was widely seen as an MPLS alternative. Today just about any credible, Internet-based SD-WAN solution can be used to replace a regional MPLS network. The bigger question is what happens the day after you networked your regional offices.How will your SD-WAN deliver predictable application experience overseas or where Internet routing is unpredictable? How will your SD-WAN adapt to the cloud and mobile users, the new tenants of the modern enterprise? In short, understanding how your SD-WAN will accommodate the unpredictable is essential if you hope to future-proof your WAN.To read this article in full, please click here

Dell Sells RSA Security Biz for $2.075 Billion

The companies announced the deal a week before the annual RSA mega-cybersecurity conference kicks...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Network Break 271: Global Espionage Agita Kicks Up A Notch; Forescout Gets Bought For $1.9 Billion

Take a Network Break! Global espionage tensions ratchet up between the United States and China, the CIA is revealed to have owned a company that sold doctored cryptography systems to allies and adversaries, VMware adjusts its licensing, and more tech news. Guest analysts Keith Townsend and Ned Bellavance step in for a vacationing co-host.

The post Network Break 271: Global Espionage Agita Kicks Up A Notch; Forescout Gets Bought For $1.9 Billion appeared first on Packet Pushers.