Archive

Category Archives for "Networking"

BrandPost: How HPE Metering Technology Delivers a Better Way to Consume IT

HPE GreenLake is a true pay-as-you-go, consumption-based approach to hybrid IT. It’s different from anything else on the market, so it’s not surprising that customers tend to have lots of questions. Here are some that I hear quite often:Do I have to purchase the infrastructure?No. HPE GreenLake is an “as-a-service” model, so we own and manage the equipment for you at your site, and we provide a buffer of capacity right-sized to your business. Then we measure how much you use, and we charge based on that usage.What if I run out of capacity?To read this article in full, please click here

BrandPost: Take the Intelligent Route with Consumption-Based Storage

Data is at the center of everything we do today. It’s a massive resource that you can use to fuel innovation, steer the business with greater insights, and rev up people to do their best work. But data overload, unpredictable workload demands, and growing maintenance and security requirements can stall important initiatives when storage systems lack the performance, scale, agility, and e­fficiency to keep up.But there’s good news. The agility and economics of HPE storage combined with HPE GreenLake let you run IT like a finely tuned engine: Improve economics with no up-front payment and 100% economic storage utilization Reduce risk of running out of capacity or wasting money by overprovisioning Accelerate value with on-demand storage solutions aligned to your workload needs Ensure control over performance, security, and compliance. Click here to view the complete infographic. To read this article in full, please click here

Take the Intelligent Route with Consumption-Based Storage

Data is at the center of everything we do today. It’s a massive resource that you can use to fuel innovation, steer the business with greater insights, and rev up people to do their best work. But data overload, unpredictable workload demands, and growing maintenance and security requirements can stall important initiatives when storage systems lack the performance, scale, agility, and e­fficiency to keep up.But there’s good news. The agility and economics of HPE storage combined with HPE GreenLake let you run IT like a finely tuned engine: Improve economics with no up-front payment and 100% economic storage utilization Reduce risk of running out of capacity or wasting money by overprovisioning Accelerate value with on-demand storage solutions aligned to your workload needs Ensure control over performance, security, and compliance. Click here to view the complete infographic. To read this article in full, please click here

How HPE Metering Technology Delivers a Better Way to Consume IT

HPE GreenLake is a true pay-as-you-go, consumption-based approach to hybrid IT. It’s different from anything else on the market, so it’s not surprising that customers tend to have lots of questions. Here are some that I hear quite often:Do I have to purchase the infrastructure?No. HPE GreenLake is an “as-a-service” model, so we own and manage the equipment for you at your site, and we provide a buffer of capacity right-sized to your business. Then we measure how much you use, and we charge based on that usage.What if I run out of capacity?To read this article in full, please click here

BrandPost: More Elbow-Room for Innovation: Reducing the Ops Load with HPE Adaptive Management Services

We’re hearing a lot these days about how CIOs are becoming more strategic partners with executive management – how IT is moving closer to the core of the business and earning a seat at the table in strategy discussions. I’m a bit skeptical that it’s happening on anything like a broad scale. It’s certainly true that there’s an awareness that IT is “mission critical,” that you absolutely cannot afford to have the network go down even for a second, or a security slip-up that results in losing hundreds of thousands of credit card records. Those are hugely important discussions, but they’re not seen as directly related to business outcomes.Many in the C-Suite still see at least a percentage of IT expenditures as almost like a tax on the business. When IT leaders get into investment conversations, their colleagues are often about as excited as the rest of us are when it’s time to pay our personal income tax bill.To read this article in full, please click here

BrandPost: Optimizing your Hybrid Cloud Environment: Key Considerations for Workload Placement, Cost Control, and Cloud Management

 This video is hosted by Owen Rogers of 451 Research and discusses key considerations for workload placement, cost control, and management of hybrid cloud environments. It is based on research conducted for HPE GreenLake Hybrid Cloud. Click here to watch the video. To read this article in full, please click here

The Week in Internet News: IoT Devices Could Put Privacy at Risk, Study Says

A real privacy headache: Internet of Things devices potentially expose consumer information to other parties, according to a recent study featured on Vice.com. Many IoT devices collect and share a wealth of information including the IP address, usage habits, and location data. That data is then often shared with “a laundry list” of third parties.

Encryption objections: ISP trade groups are objecting to a plan by Google to a new encryption regime for domain name lookups in its Chrome browser and Android operating system, Broadcasting and Cable reports. The plan would give Google too much power, the groups have told U.S. lawmakers.

Moving to the country: Microsoft and Nextlink Internet have unveiled a plan to bring broadband to millions of people living in the rural U.S., WindowsCenteral.com says. The Microsoft Airband Initiative’s goal is to extend broadband access to more than 3 million unserved U.S. residents by mid-2022, with more areas covered by 2024.

The FBI wants in: The U.S. FBI tried to get the operators of encrypted phone carrier Phantom Secure to create a backdoor, as a way to spy on the Sinaloa drug cartel, Vice.com reports. The company was accused Continue reading

IBM’s journey to tens of thousands of production Kubernetes clusters

IBM Cloud has made a massive shift to Kubernetes. From an initial plan for a hosted Kubernetes public cloud offering it has snowballed to tens of thousands of production Kubernetes clusters running across more than 60 data centers around the globe, hosting 90% of the PaaS and SaaS services offered by IBM Cloud.

I spoke with Dan Berg, IBM Distinguished Engineer, to find out more about their journey, what triggered such a significant shift, and what they learned along the way.

So take me back to the beginning – how did this thing get started?

It must have been 3 years ago.  At that time, IBM had been building customer-facing services in the cloud for several years implemented as traditional VM or Cloud Foundry workloads. One of the services we offered was a container as a service (CaaS) platform that was built under the covers using Docker and OpenStack.  With this platform, we were the first in the industry to provide a true CaaS experience, but in some ways it was ahead of its time, and people weren’t ready to embrace a pure container as a service platform.

To this day we are still seeing double digit Continue reading

Stateless’ Software-Defined Interconnect Battles NFV, SD-WAN

The startup says “five of the top five” cloud and colocation service providers are testing its...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Next-Generation Reference Design Guide for NSX-T

The NSX-T 2.5 release marks a cornerstone in NSX-T as announced at VMworld 2019 by SVP Umesh Mahajan. 2019 has been a year of phenomenal growth for VMware’s NSX-T with its wide adoption by enterprises across several verticals.  In 2019, we introduced two ground-breaking releases NSX-T 2.4 and NSX-T 2.5. With these two releases, we are fully embarking on enterprise ready system becoming the de-facto enterprise software-defined networking (SDN) platform of choice.  

To support our customers in their network and security virtualization journey, we introduced the NSX-T design guide on the NSX-T 2.0 release and provided design guidance on how customers should design their data centers with NSX-T. 

Today, we are excited to announce the next version of the NSX-T design guide based on generally available NSX-T release 2.5. It is the foundation overhaul to design guidance and leading best practices. There have been numerous L2-L7 features additions and platform enhancements since NSX-T release 2.0. This design guide covers functional aspects of these enhancements and provides design guidance for them.  

What readers can expect in the new NSX-T Design Guide:

NeoPhotonics Points Lasers, AWG Multiplexers at Data Centers

The new lasers and the line of arrayed waveguide grating multiplexers are designed to bolster...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Ericsson Expands US Manufacturing With New Factory in Texas

The 300,000-square-foot factory will begin commercial operations early next year in Lewisville,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

CNTT’s Initial NFVi Release Targets OpenStack

The group is working with service providers to define and create VNF reference architectures for...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware NSX Achieves FIPS 140-2 Validation

Co-authored with Rajiv Prithvi, Product Manager Networking and Security Business Unit at VMware

During VMworld US 2019, we announced several new transformative capabilities in VMware NSX-T 2.5 release which is now shipping! The release strengthens the NSX platform’s intrinsic security, multi-cloud, container, and operational capabilities.

We also announced the successful FIPS 140-2 validation of NSX-T 2.5. FIPS compliance is mandatory for US federal agencies and has also been widely adopted in non-governmental sectors (e.g. financial services, utilities, healthcare). FIPS-140-2 establishes the integrity of cryptographic modules in use through validation testing done by NIST and CSE. With this validation, we further deliver on our confidentiality, integrity and availability objectives and provide our customers with a robust networking and security virtualization platform.

Compliance-Based Configuration with NSX-T 2.5

NSX-T 2.5 is configured to operate in FIPS mode by default. Any exceptions or deviations from established compliance norms are identified in a compliance report which can be used to review and configure your NSX-T Data Center environment to meet your IT policies and industry standards. Any exceptions to FIPS compliance including configuration errors can be retrieved from the compliance report using NSX Manager UI or APIs.

A sample FIPS Continue reading

Network Break 253: Arista CloudVision Ingests Configs From Third-Party Gear; Cisco Adds Azure To Cloud ACI

Today's Network Break discusses upgrades to Arista's CloudVision management software, a new ACI partnership between Cisco and Microsoft Azure, a Google pledge to invest in new European data centers, Amazon's pledge to be carbon-neutral by 2040, and more tech news.

The post Network Break 253: Arista CloudVision Ingests Configs From Third-Party Gear; Cisco Adds Azure To Cloud ACI appeared first on Packet Pushers.

APAC Policy Survey 2019: Consolidation in the Internet Economy

The Internet is changing. Consolidation in the Internet economy, the topic of the Global Internet Report 2019, might be the source of ongoing shifts in its underlying infrastructure and the way users engage, among many other things.

Clearly, the growing presence of big Internet platforms can benefit the user by offering seamless Internet experiences, but it could also harm innovation, competition, and the Internet’s broader architecture, says the report, which marks the start of the Internet Society’s efforts to examine this issue.

The Internet in Asia-Pacific is no exception. A few corporations – including Facebook and Tencent in social networking, Google and Baidu in search, and Amazon and Alibaba in online shopping – dominate large parts of the Internet, benefitting people while raising similar questions about what it means for the Internet’s fundamental properties.

This year’s Survey on Policy Issues in Asia-Pacific, released today, helps deepen our understanding of the role that corporations play in shaping Internet use and user experience in the region and how they may impact future innovation on the Internet.

More than 1,300 people from 39 economies in the region took our online survey when we opened it to the public in July.

The Continue reading

Cleaning up bad bots (and the climate)

Cleaning up bad bots (and the climate)

From the very beginning Cloudflare has been stopping malicious bots from scraping websites, or misusing APIs. Over time we’ve improved our bot detection methods and deployed large machine learning models that are able to distinguish real traffic (be it from humans or apps) from malicious bots. We’ve also built a large catalog of good bots to detect things like helpful indexing by search engines.

But it’s not enough. Malicious bots continue to be a problem on the Internet and we’ve decided to fight back. From today customers have the option of enabling “bot fight mode” in their Cloudflare Dashboard.

Cleaning up bad bots (and the climate)

Once enabled, when we detect a bad bot, we will do three things: (1) we’re going to disincentivize the bot maker economically by tarpitting them, including requiring them to solve a computationally intensive challenge that will require more of their bot’s CPU; (2) for Bandwidth Alliance partners, we’re going to hand the IP of the bot to the partner and get the bot kicked offline; and (3) we’re going to plant trees to make up for the bot’s carbon cost.

Cleaning up bad bots (and the climate)

Malicious bots harm legitimate web publishers and applications, hurt hosting providers by misusing resources, and they doubly hurt the planet Continue reading

Cisco ACI – Configuring by POSTing JSON

If you are configuring Cisco ACI datacenter fabric it will sooner or later get to the point that you need to configure multiple objects inside the GUI which will, by using the click-n-click method, take a huge amount of time. While using POSTMAN to create multiple objects of the same type is the preferred method that everybody is speaking about (because you can generate REST API calls using Python or something similar), the quickest way to do it is using POST of JSON configuration file directly through the GUI. POSTing JSON config example As described above, the POST of JSON

The post Cisco ACI – Configuring by POSTing JSON appeared first on How Does Internet Work.