Archive

Category Archives for "Networking"

Getting More Bang for Your VXLAN Bucks

A little while ago I explained why you can’t use more than 4K VXLAN segments on a ToR switch (at least with most ASICs out there). Does that mean that you’re limited to a total of 4K virtual ethernet segments?

Of course not.

You could implement overlay virtual networks in software (on hypervisors or container hosts), although even there the enterprise products rarely give you more than a few thousand logical switches (to use NSX terminology)… but that’s a product, not technology limitation. Large public cloud providers use the same (or similar) technology to run gazillions of tenant segments.

Want to know more? Watch our NSX, AWS and Azure networking webinars.
Read more ...

VMware Acquires AIOps Vendor Nyansa to Bolster SD-WAN

The software giant says Nyansa's technology will enable improved network visibility, monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Setting up passwordless Linux logins using public/private keys

Setting up an account on a Linux system that allows you to log in or run commands remotely without a password isn’t all that hard, but there are some tedious details that you need to get right if you want it to work. In this post, we’re going to run through the process and then show a script that can help manage the details.Once set up, passwordless access is especially useful if you want to run ssh commands within a script, especially one that you might want to schedule to run automatically.It’s important to note that you do not have to be using the same user account on both systems. In fact, you can use your public key for a number of accounts on a system or for different accounts on multiple systems.To read this article in full, please click here

Daily Roundup: Cisco Advances Intent-Based Networking

Cisco advanced intent-based networking; SK boasted standalone 5G first; and Citrix swatted ADC,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco adds proactive problem solving to data-center software

Proactively fixing a network problem before it becomes a full-blown nightmare is the goal of new software Cisco has added to its Data Center Network Assurance and Insights suite.Cisco Assurance is a key component of the company’s intent-based networking initiative that maintains a continuous validation and verification that the network is doing what the customer expects.  [Get regularly scheduled insights by signing up for Network World newsletters.] Network Insights is software Cisco customers use to monitor and record hardware and software telemetry data over time to identify anomalies in the fabric and help automate troubleshooting, root-cause analysis, capacity planning and remediation, according to Cisco. For example, Network Insights can watch over network component usage patterns and audit logs, events, and faults as well as latency conditions from Cisco Application Centric Infrastructure or Data Center Network Manager (DCNM) network fabrics.To read this article in full, please click here

Cisco adds proactive problem solving to data-center software

Proactively fixing a network problem before it becomes a full-blown nightmare is the goal of new software Cisco has added to its Data Center Network Assurance and Insights suite.Cisco Assurance is a key component of the company’s intent-based networking initiative that maintains a continuous validation and verification that the network is doing what the customer expects.  [Get regularly scheduled insights by signing up for Network World newsletters.] Network Insights is software Cisco customers use to monitor and record hardware and software telemetry data over time to identify anomalies in the fabric and help automate troubleshooting, root-cause analysis, capacity planning and remediation, according to Cisco. For example, Network Insights can watch over network component usage patterns and audit logs, events, and faults as well as latency conditions from Cisco Application Centric Infrastructure or Data Center Network Manager (DCNM) network fabrics.To read this article in full, please click here

Kontron’s Antoine Sirois: 5G Edge Hinges on Hardware as the Foundation for Success

Antoine Sirois of Kontron sat down to share his thoughts on mobile edge, CDN, and the future of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Full Stack Journey 038: Exploring Kubernetes And The Contour Project With Steve Sloka

Today's Full Stack Journey episode explores Contour, an an Envoy-based Kubernetes Ingress controller. My guest is Steve Sloka. In addition to Contour, we also talk about Steve's journey into Docker, containers, and Kubernetes as a developer, and their impact on his career.

The post Full Stack Journey 038: Exploring Kubernetes And The Contour Project With Steve Sloka appeared first on Packet Pushers.

BrandPost: SASE: What It Is, What It Isn’t, and Why Should You Even Care

For years, enterprise networking and security leaders have had to weather the complaints and consternation of IT and business executives. IT costs too high? Blame that MPLS network.  Web taking too long to load? It’s that darn VPN client again. Now a new product category, Secure Access Service Edge (SASE), is supposed to put networking and security teams firmly ahead of the game. So impactful is this new sector that Gartner’s termed it “transformational,” a lofty status that not even SD-WAN, with all of its market impact, ever achieved. Within four years, Gartner expects 40% of enterprises will have strategies to adopt SASE.To read this article in full, please click here

Snyk Secures $150M, Snags $1B Valuation

The open source security startup reported over 400% revenue growth in 2019 and says its customers...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Telefónica Scores SD-WAN, Security Deal With Arlanxeo

The five-year contract will span more than 20 production sites in 11 countries across four...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Deep Dive: Scoring ISPs and Hosts on Privacy and Security

In April 2019 the Internet Society’s Online Trust Alliance (OTA) released its 10th Annual Online Trust Audit & Honor Roll. The Audit looks at the security and privacy practices of over 1,000 of the top sites on the Internet from retailers to governments. In this post we will take a deeper dive into the ISP/Hosts sector of the Audit. This sector is comprised of the top ISPs and other hosting organizations in the U.S. It includes everything from organizations that provide network access to organizations that host email services.

In the Audit, privacy statements are scored across 30 variables. ISP/Hosts were a decidedly mixed bag compared to other sectors, which tended to do either relatively well or poorly across the board in their statements. (Though to clear, the vast majority of organizations in the Audit had poor privacy statements, it was the most common reason for failure across privacy and security scoring.)

ISP/Hosts fell somewhat short in the presentation of their statements. OTA advocates several best practices that deal with how the privacy statement is displayed to make it as easy as possible for users to understand.

The simplest practice OTA advocates is a link to the privacy Continue reading

SK Telecom Boasts Standalone 5G ‘First,’ Readies Launch

The carrier added New Radio software to its existing non-standalone 5G base stations and achieved...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Citrix Swats ADC, Gateway Bugs, SD-WAN Fix in the Wings

“We urge customers to immediately install these fixes,” noted Citrix Chief Information Security...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Why Your SD-WAN Deployment is Failing

I’m going to say something you may not want to hear, or you may already know: implementing SD-WAN is hard. Among the promise and hype of automation, dynamic path selection, zero-touch provisioning and a cloud-ready WAN, lies a trail of failed SD-WAN projects, with many others struggling on life support. For many, the WAN of the future has failed to manifest into anything more than another hard-to-manage, costly IT project that has failed to deliver on its promises (or, has failed to live up to your expectations), but why?The problems SD-WAN solutions address are not incremental change or gradual evolution, they are the result of industry megatrends that have upended the way we consume applications and connect our users, all in a very short period of time. These megatrends, such as Digital Transformation and the move to SaaS, IaaS and Cloud have placed new demands on network infrastructure, IT staff and application owners; requiring a complete rethink of how they are connecting locations, delivering applications and services and securing their networks. The sheer gravity of these changes, and scope of what needs to be done to support them, cannot be undertaken in an additive approach. Rather, they must be Continue reading

It’s a fact: choosing your own hardware means lower TCO

An essential part of open networking is the ability to choose your own hardware. This allows for customization of your network to suit business needs, and it can also dramatically reduce your Total Cost of Ownership (TCO). On average, open networking with Cumulus helps customers reduce their capital expenditures (CapEx) by about 45% and operational expenditures (OpEx) in the range of approximately 50% to 75%.

Choosing the right hardware is a big part of these savings. If you compare bare-metal networking equipment with a similar product from a proprietary networking vendor, you’ll quickly find that bare-metal hardware is much less expensive. One reason for this is competition between hardware vendors in the open networking space.

Open networking is a multi-vendor ecosystem. More than 100 switches are certified to work with Cumulus Linux; they’re manufactured by vendors such as Dell, HPE, Mellanox, Supermicro, and others. Unlike with proprietary switches, there’s no vendor lock-in creating a monopoly situation. In the open networking space, vendors compete for sales, and this keeps costs down.

Another factor in lowering costs is the degree of customization available when you have many products to choose from. Choosing your own hardware means buying what you need—and only Continue reading

Exclusive: Cisco Adds Network Insights to IBN

Cisco VP Thomas Scheibe spoke exclusively to SDxCentral about the new Day 2 network operations...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: The Zettabyte Era is Coming – Are you Ready?

It’s no secret that data growth is at an all-time high. IDC expects 103 zettabytes of data to be generated worldwide by 20231. Yes, zettabytes. With the proliferation of IoT devices, 5G-enabled technologies, and the massive growth of video, we’re just scratching the surface of how companies will store and extract value from data.Machine data will play a leading role, as it is expected to outpace commercial/consumer data. By 2023, more than 90% of data will be generated by machines2 (i.e. smart cities, IoT, endpoints, autonomous cars, etc.). In addition, video, surveillance footage, and large AI/ML data sets – this “natural streaming” or sequential data – will be everywhere. To read this article in full, please click here

Beyond Moore’s Law: Neuromorphic computing?

With the conceivable exhaustion of Moore’s Law – that the number of transistors on a microchip doubles every two years – the search is on for new paths that lead to reliable incremental processing gains over time.One possibility is that machines inspired by how the brain works could take over, fundamentally shifting computing to a revolutionary new tier, according to an explainer study released this month by Applied Physics Reviews.[Get regularly scheduled insights by signing up for Network World newsletters.] “Today’s state-of-the-art computers process roughly as many instructions per second as an insect brain,” say the paper’s authors Jack Kendall, of Rain Neuromorphics, and Suhas Kumar, of Hewlett Packard Labs. The two write that processor architecture must now be completely re-thought if Moore’s law is to be perpetuated, and that replicating the “natural processing system of a [human] brain” is the way forward.To read this article in full, please click here