Archive

Category Archives for "Networking"

Weekly Wrap: AT&T CEO Donovan Departs After Paving SDN Foundation

Weekly Wrap for Aug. 30, 2019: AT&T CEO John Donovan gives his notice; VMware bets the farm on...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Every business is a technology business

Success for an NFL franchise involves the cultivation of a variety of core competencies both on and off the field. Recently I had the opportunity to spend time with the Seattle Seahawks organization and I was surprised by the extent to which the team utilizes data and digital tools to drive continuous improvements within their core competencies.But then why should I be surprised? Let’s face it, today, every business is a technology business. The Seahawks are no different. They are, like many other companies, investing in digital technologies to improve the product on the field and the fan experience in the stands.Data literacy is a core competency the Seahawks have added to their business. I won’t give away any trade secrets, but let’s take a high-level look at three ways this core competency creates competitive advantage.To read this article in full, please click here

CDNetworks Drives Kubernetes to the Edge

The CDN's Edge Computing Platform Service is built on Kubernetes and Docker using a container...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Broadcom Releases PCIe Switches for Data Centers

Broadcom claims its PEX88000 family of switches are "ideal for high-throughput and low-latency...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Patches Critical Bug in REST API Container

Cisco issued a patch for a critical bug in its IOS XE operating system that could allow a remote...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Positioning Policy Properly

Who owns the network policy for your organization? How about the security policy?Identity policy? Sound like easy questions, don’t they? The first two are pretty standard. The last generally comes down to one or two different teams depending upon how much Active Directory you have deployed. But have you ever really thought about why?

During Future:NET this week, those poll questions were asked to an audience of advanced networking community members. The answers pretty much fell in line with what I was expecting to see. But then I started to wonder about the reasons behind those decisions. And I realized that in a world full of cloud and DevOps/SecOps/OpsOps people, we need to get away from teams owning policy and have policy owned by a separate team.

Specters of the Past

Where does the networking policy live? Most people will jump right in with a list of networking gear. Port profiles live on switches. Routing tables live on routers. Networking policy is executed in hardware. Even if the policy is programmed somewhere else.

What about security policy? Firewalls are probably the first thing that come to mind. More advanced organizations have a ton of software that scans for security Continue reading

Beyond the Palm Trees: Local Action Key to Fast, Affordable and Reliable Internet Solutions in Rural Hawai’i

To many North Americans, Hawai’i is a place of beaches, resorts, surfing, rainforests, and volcanoes — it’s a vacation destination.

But despite its tourism infrastructure and economy, Native Hawaiian communities in the far-flung chain of more than 130 islands face many of the same Internet connectivity challenges as Indigenous communities in Canada and the continental United States. And for a variety of economic, policy and geographic reasons, it is often excluded from efforts to improve access for Indigenous, rural and remote communities.

The Internet Society believes the Internet is for everyone and works with underserved communities to find and create local access solutions in some of the hardest-to-reach places on earth. What’s exciting is that despite the different geographic landscapes, the same community-led solution underway to improve Internet access in the high Arctic could also help Native Hawaiians carve their own path to better connectivity.

That’s why, in 2019, the Internet Society is holding its third annual Indigenous Connectivity Summit (ICS) in Hawai’i.

Including Indigenous voices in the planning and solutions that shape the Internet is a vital part of closing the digital divide. Previous summits in Santa Fe, New Mexico, in 2017, and Inuvik, Northwest Territories, Canada, Continue reading

Unix as a Second Language: The touch command

The Linux touch command allows users to create an empty file or update a file’s data and time settings.You might want to do this if you need to be sure that a file exists before a script or process begins. The command can also be used to set the date and time to match those of another file.Watch this Two-minute Linux Tip video by Sandra Henry-Stocker to learn more. To read this article in full, please click here

Lessons Learned – Nick Russo – Leadership

There’s always something to learn from other people’s stories so we’re making it a point to spend time talking about past experiences and lessons learned. In this first foray into this format, Nick Russo joins us to talk about a formative leadership experience that happened early in his career and changed his perspective on what leadership and failure looked like.

Nick Russo
Guest
Jordan Martin
Host

The post Lessons Learned – Nick Russo – Leadership appeared first on Network Collective.

Intel’s new 10nm Agilex FPGA will help customers develop IoT, 5G solutions

Intel announced this week it has begun shipping its 10nm Agilex FPGAs to early-access customers, including Microsoft, featuring the Compute Express Link (CXL), a cache and memory coherent CPUs-to-anything interconnect that has an industry consortium of more than 60 members. The company first announced the chips in April.The Agilex FPGA is the product of the Altera group, which Intel bought in 2015 for $16.7 billion. It sold FPGAs under the Stratix brand name, but this line is the first to come out under Intel ownership. CXL replaces OmniPath Connect, a fabric Intel developed but no one else supported. The company ended support for OmniPath earlier this month in favor of CXL, which has wide industry support.To read this article in full, please click here

Intel’s new 10nm Agilex FPGA will help customers develop IoT, 5G solutions

Intel announced this week it has begun shipping its 10nm Agilex FPGAs to early-access customers, including Microsoft, featuring the Compute Express Link (CXL), a cache and memory coherent CPUs-to-anything interconnect that has an industry consortium of more than 60 members. The company first announced the chips in April.The Agilex FPGA is the product of the Altera group, which Intel bought in 2015 for $16.7 billion. It sold FPGAs under the Stratix brand name, but this line is the first to come out under Intel ownership. CXL replaces OmniPath Connect, a fabric Intel developed but no one else supported. The company ended support for OmniPath earlier this month in favor of CXL, which has wide industry support.To read this article in full, please click here

Bluetooth finds a role in the industrial internet of things

Like most people, I think of Bluetooth as a useful but consumer-oriented technology that lets me make easy wireless connections from my smartphone to various headsets, portable speakers, automobile, and other devices. And, of course, billions of people rely on Bluetooth for exactly those capabilities. But according to Chuck Sabin, senior director of market development for the Bluetooth SIG, the technology is growing into a key role in the industrial internet of things (IIoT).To read this article in full, please click here

Announcing the General Availability of API Tokens

Announcing the General Availability of API Tokens

APIs at Cloudflare

Announcing the General Availability of API Tokens

Today we are announcing the general availability of API Tokens - a scalable and more secure way to interact with the Cloudflare API. As part of making a better internet, Cloudflare strives to simplify manageability of a customer’s presence at the edge. Part of the way we do this is by ensuring that all of our products and services are configurable by API. Customers ranging from partners to enterprises to developers want to automate management of Cloudflare. Sometimes that is done via our API directly, and other times it is done via open source software we help maintain like our Terraform provider or Cloudflare-Go library. It is critical that customers who are automating management of Cloudflare can keep their Cloudflare services as secure as possible.

Least Privilege and Why it Matters

Securing software systems is hard. Limiting what a piece of software can do is a good defense to prevent mistakes or malicious actions from having greater impact than they could. The principle of least privilege helps guide how much access a given system should have to perform actions. Originally formulated by Jerome Saltzer, “Every program and every privileged user of the system should operate using Continue reading

Video: Introducing Transmission Technologies

After discussing the challenges one encounters even in the simplest networking scenario connecting two computers with a cable we took a short diversion into an interesting complication: what if the two computers are far apart and we can’t pull a cable between them?

Trying to answer that question we entered the wondrous world of transmission technologies. It’s a topic one can spent a whole life exploring and mastering, so we were not able to do more than cover the fundamentals of modulations and multiplexing technologies.

You need free ipSpace.net subscription to watch the video, or a paid ipSpace.net subscriptions to watch the rest of the webinar.

IBM, Orange Top UK’s SDN Market, Says ISG Report

IBM and Orange Business Services top the list of U.K. SDN vendors, according to an ISG report that...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Rating IoT devices to gauge their impact on your network

One difficulty designing IoT implementations is the large number of moving parts. Most IoT setups are built out of components from many different manufacturers – one company’s sensors here, another’s there, someone else handling the networking and someone else again making the backend.To help you get a ballpark sense of what any given implementation will demand from your network, we’ve come up with a basic taxonomy for rating IoT endpoints. It’s got three main axes: delay tolerance, data throughput and processing power. Here is an explainer for each. (Terminology note: We’ll use “IoT setup” or “IoT implementation” to refer to the entirety of the IoT infrastructure being used by a given organization.)To read this article in full, please click here

Quest Levels Up, Announces Foglight Evolve Platform

Quest Software unveiled Foglight Evolve, which features three new product lines: Foglight Evolve...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Data center-specific AI completes tasks twice as fast

Data centers running artificial intelligence (AI) will be significantly more efficient than those operating with hand-edited algorithm schedules, say experts at MIT. The researchers there say they have developed an automated scheduler that speeds cluster jobs by up to 20 or 30 percent, and even faster (2x) in peak periods.The school’s AI job scheduler works on a type of AI called “reinforcement learning” (RL). That’s a trial-and-error-based machine-learning method that modifies scheduling decisions depending on actual workloads in a specific cluster. AI, when done right, could supersede the current state-of-the-art method, which is algorithms. They often must be fine-tuned by humans, introducing inefficiency.To read this article in full, please click here

Data center-specific AI completes tasks twice as fast

Data centers running artificial intelligence (AI) will be significantly more efficient than those operating with hand-edited algorithm schedules, say experts at MIT. The researchers there say they have developed an automated scheduler that speeds cluster jobs by up to 20 or 30 percent, and even faster (2x) in peak periods.The school’s AI job scheduler works on a type of AI called “reinforcement learning” (RL). That’s a trial-and-error-based machine-learning method that modifies scheduling decisions depending on actual workloads in a specific cluster. AI, when done right, could supersede the current state-of-the-art method, which is algorithms. They often must be fine-tuned by humans, introducing inefficiency.To read this article in full, please click here