Archive

Category Archives for "Networking"

Cisco software fortifies industrial IoT security

Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco’s extensive IIoT networking portfolio. More about edge networkingTo read this article in full, please click here

Showing memory usage in Linux by process and user

There are a lot of tools for looking at memory usage on Linux systems. Some are commonly used commands like free and ps while others are tools like top that allow you to display system performance stats in various ways. In this post, we’ll look at some commands that can be most helpful in identifying the users and processes that are using the most memory.Here are some that address memory usage by process.Using top One of the best commands for looking at memory usage is top. One extremely easy way to see what processes are using the most memory is to start top and then press shift+m to switch the order of the processes shown to rank them by the percentage of memory each is using. Once you’ve entered shift+m, your top output should reorder the task entries to look something like this:To read this article in full, please click here

Daily Roundup: Cisco Joins On-Prem Kubernetes Party

Cisco joined the on-premises Kubernetes party; the U.K. banned Huawei from 5G core networks; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

VMware Loses $237M Patent Infringement Lawsuit

Densify, a startup that makes cloud and container resource management software, accused VMware of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nutanix and HPE Team Up Together to Deliver Cloud Simplicity On-Premises

Though the customer takes delivery of the HPE systems with Nutanix software on-site or at the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cloud, Software Revenues Prop Up Juniper’s Q4 Earnings

Cloud revenues continued to be a sweet spot for the networking vendor. The vertical saw strong...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

FCC Greenlights Shared Spectrum in CBRS Band

The effort, which eventually gathered buy-in from multiple federal agencies and 159 members of the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: 2020 Trends for the Evolving Data Center, Part 1

There’s no question that we will continue to experience massive data growth in 2020. The question for data center architects is how to manage this unprecedented influx of data and future-proof enterprise infrastructures for the next decade’s Zettabyte Age. From emerging architectures to adoption of composable disaggregated storage to greater TCO value, Western Digital executives weigh in on top data center trends for 2020 in this first of a 2-part series.To read this article in full, please click here

Huawei 5G Equipment Barred From UK Core Networks

The ban basically limits the use of Huawei equipment to the network RAN, and even then to just 35%...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Kernel of Truth: Season 3 Teaser

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

In this episode, we tease what’s coming up for Kernel of Truth’s season 3. Be sure to subscribe to this podcast if you haven’t already so you’re notified when the first episode for season 3 is posted or follow us on Facebook, Twitter and LinkedIn. For behind-the-scenes look of life at Cumulus Networks, follow us on Instagram too.

This Data Privacy Day It’s the Little Things That Count

Today we’re celebrating Data Privacy Day, which is all about empowering people and organizations to respect privacy, safeguard data, and enable trust.

Let’s face it, protecting your privacy can feel overwhelming. It can seem like we conduct our entire lives online and it’s hard not to notice headlines about our privacy being undermined, like law enforcement trying to gain access to encrypted data. But whether you know it or not, you’re making choices about what you share and how you share it each day. These seemingly-small actions can make a big impact.

You might already be doing some of these, but here are six actions you can take to protect your privacy:

  • Use end-to-end encrypted messaging apps. Switch to using messaging apps that offer end-to-end encryption, such as WhatsApp, Signal, Threema, and Telegram. Some are better than others, so make sure to read the reviews.
  • Turn on encryption on your devices or services. Some devices or services will offer encryption, but not set it as the default. Make sure to turn on encryption.
  • Use strong passwords. Do not just use a default password, a simple guessable password, or a password that uses personal information, such as your pet’s name. Continue reading

BrandPost: Scaling Secure SD-WAN Across Hundreds of Branch Offices

Digital Innovation at the Branch Requires SD-WAN Most organizations with multiple locations are in the process of implementing a distributed networking strategy that ensure that all branch offices and users are able to take advantage of ongoing digital innovation efforts. For true cross-organizational collaboration, productivity enhancement, and improved user experience, every user needs access to essential business applications. To achieve this, they need highly flexible and scalable access to cloud-based applications and resources, direct access to the internet, and on-demand connections to other users and devices.That’s simply not possible with traditional hub-and-spoke branch networking models built around WAN routers and a fixed MPLS connection. Business applications, especially those that deliver rich media or enable highly flexible collaboration between users and locations – such as unified communications, Office 365, and similar tools – require massive amounts of bandwidth. And in a traditional model, all of that traffic needs to be backhauled through the core network. Multiply that by scores of remote workers located in dozens of remote offices and you can quickly overwhelm internal servers, compute resources, and even security and inspection tools.To read this article in full, please click here

Cisco helps IT and DevOps troubleshoot hybrid-cloud apps

Cisco has taken the wraps off of new tools it says will boost on-premises or cloud application performance by helping IT and devops work together to automate and more quickly resolve software problems.The new tools include a package from Cisco AppDynamics that lets customers track the key components users interact with as they use enterprise applications. Cisco paid $3.7 billion for AppDynamics three years ago for its application-performance monitoring and problem-resolution automation technology.  The idea was to develop products and applications that would give customers better end-to-end visibility of the IT infrastructure, including cloud, devices, security, network, compute and applications.To read this article in full, please click here

Cisco helps IT and DevOps troubleshoot hybrid-cloud apps

Cisco has taken the wraps off of new tools it says will boost on-premises or cloud application performance by helping IT and devops work together to automate and more quickly resolve software problems.The new tools include a package from Cisco AppDynamics that lets customers track the key components users interact with as they use enterprise applications. Cisco paid $3.7 billion for AppDynamics three years ago for its application-performance monitoring and problem-resolution automation technology.  The idea was to develop products and applications that would give customers better end-to-end visibility of the IT infrastructure, including cloud, devices, security, network, compute and applications.To read this article in full, please click here

Cisco Attacks Apps, Containers Using HCI, AppDynamics

The new HyperFlex Application Platform is an integrated, managed Kubernetes service deployed on...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Empowering Your Privacy

Empowering Your Privacy
Empowering Your Privacy

Happy Data Privacy Day! At Cloudflare, our mission is to help build a better Internet, and we believe data privacy is core to that mission. But we know words are cheap — even data brokers who sell your personal information will tell you that “privacy is important” to them. So we wanted to take the opportunity on this Data Privacy Day to show you how our commitment to privacy crosses all levels of the work we do at Cloudflare to help make the Internet more private and secure — and therefore better — for everyone.

Privacy on the Internet means different things to different people. Maybe privacy means you get to control your personal data — who can collect it and how it can be used. Or that you have the right to access and delete your personal information. Or maybe it means your online life is protected from government surveillance or from ad trackers and targeted advertising. Maybe you think you should be able to be completely anonymous online. At Cloudflare, we think all these flavors of privacy are equally important, and as we describe in more detail below, we’ve taken steps to address each of these privacy priorities.

Continue reading

Master Infrastructure-as-Code and Immutable Infrastructure Principles

Doing the same thing and hoping for a different result is supposedly a definition of insanity… and managing public cloud deployments with an unrepeatable sequence of GUI clicks comes pretty close to it.

Engineers who mastered the art of public cloud deployments realized decades ago that the only way forward is to treat infrastructure in the same way as any other source code:

Read more ...

Hybrid cloud management requires new tools, skills

Hybrid cloud environments can deliver an array of benefits, but in many enterprises, they're becoming increasingly complex and difficult to manage. To cope, adopters typically turn to some type of management software. What soon becomes apparent, however, is that hybrid cloud management tools can be as complex and confounding as the environments they're designed to support.A hybrid cloud typically includes a mix of computing, storage and other services. The environment is formed by a combination of on-premises infrastructure resources, private cloud services, and one or more public cloud offerings, such as Amazon Web Services (AWS) or Microsoft Azure, as well as orchestration among the various platforms.To read this article in full, please click here