Archive

Category Archives for "Networking"

Worth Reading: Understanding Scale Computing HC3 Edge Fabric

A long while ago someone told me about a "great" idea of using multi-port server NICs to build ad-hoc (or hypercube or whatever) server-only networks. It's pretty easy to prove that the approach doesn't make sense if you try to build generic any-to-any-connectivity infrastructure... but it makes perfect sense in a small environment.

One can only hope Scale Computing keeps their marketing closer to reality than some major vendors (that I will not name because I'm sick-and-tired of emails from their employees telling me how I'm unjustly picking on the stupidities their marketing is evangelizing) and will not start selling this approach as save-the-world panacea... but we can be pretty sure there will be people out there using it in way-too-large environments, and then blame everything else but their own ignorance or stubbornness when the whole thing explodes into their faces.

Industrial Internet Consortium teams up with blockchain-focused security group

The Industrial Internet Consortium and the Trusted IoT Alliance announced today that they would merge memberships, in an effort to drive more collaborative approaches to industrial IoT and help create more market-ready products.The Trusted IoT Alliance will now operate under the aegis of the IIC, a long-standing umbrella group for vendors operating in the IIoT market. The idea is to help create more standardized approaches to common use cases in IIoT, enabling companies to get solutions to market more quickly.[Get regularly scheduled insights by signing up for Network World newsletters.] “This consolidation will strengthen the ability of the IIC to provide guidance and advance best practices on the uses of distributed-ledger technology across industries, and boost the commercialization of these products and services,” said 451 Research senior blockchain and DLT analyst Csilla Zsigri in a statement.To read this article in full, please click here

Fourth Annual inSIG Boosts India’s Capacity to Shape the Internet’s Future

Earlier this month, the fourth India School on Internet Governance (inSIG2019) was held in Kolkata on 15-17 November, expanding its network of leaders and professionals active in shaping the Internet’s future.

With support from sponsors, 50 fellows from various academic, cultural, and regional backgrounds participated in inSIG2019. Through panel discussions, workshops, role plays, and group activities the three-day school covered a myriad of topics related to the Internet, boosting participants’ understanding of the complexity of Internet Governance and its importance in the future of the Internet.

The sessions covered fundamental topics like the history, principles, and status of the Internet. The hurdles around online safety, human rights, online radicalization, and cybersecurity were extensively examined and many perspectives were brought out which were thought-provoking and ingenious. Status and challenges of emerging technologies, content regulation, and the multilingual Internet were also discussed widely, and valuable feedback and inputs were provided by the participants.

The importance of the multistakeholder model of Internet Governance was stressed upon, and the Dutch approach to Internet Governance was presented in which Arnold van Rhijn spoke about how a collaborative consultation with multiple stakeholders reduces future friction in policymaking.

The event had global experts from Internet-related Continue reading

Inspur’s Edge Servers Boast Nvidia EGX, NGC-Ready Certification

Inspur's Nvidia EGX-based NE5260M5 edge server is already being deployed by the China Mobile...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Misses Network Virtualization Goal

“We aim to control 75% of our core network functions with software by the end of 2020 and, by...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BrandPost: Rethink Data Centers with Data @ the Center

Mention the data center and, to most, images of machine rooms filled to the brim with equipment and the sounds of IT whirring away are what come to mind. For decades, businesses have equipped data centers with silo upon silo of servers, applications, networking, and storage in their insatiable quest to deliver business insight to line-of-business (LOB) leaders, their management, and the C-suite. Even the name data center was given based on the theory that most business-critical data would be found there, centralized, and ready for the business to derive competitive insights to bolster its marketplace advantage.However, the data center, as we have traditionally known it, often falls short in its mission to deliver business advantage. The premise is sound, but the execution has been limited by the technology at hand. For many, the problem is the data center is not a centralized repository of data; rather it is a centralized collection of applications, each with its dedicated compute and storage resources (physical or virtual, it doesn’t matter), surrounded by edge computing facilities driven by LOB concerns.To read this article in full, please click here

Cisco issues critical security warnings its Data Center Network Manager

Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches.DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and real-time health details for fabric, devices, and network topology.To read this article in full, please click here

Cisco issues critical security warnings its Data Center Network Manager

Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches.DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and real-time health details for fabric, devices, and network topology.To read this article in full, please click here

Cisco issues critical security warnings its Data Center Network Manager

Cisco this week issued software to address multiple critical authentication exposures in its Data Center Network Manager (DCNM) software for its Nexus data center switches.DCNM is a central management dashboard for data-center fabrics based on Cisco Nexus switches and handles a number of core duties such as automation, configuration control, flow policy management and real-time health details for fabric, devices, and network topology.To read this article in full, please click here

Do containers need backup?

Containers are breaking backups around the world, but there are steps you can take to make sure that the most critical parts of your container infrastructure are protected against the worst things that can happen to your data center.At first glance it may seem that containers don’t need to be backed up, but on closer inspection, it does make sense in order to protect against catastrophic events and for other, less disastrous eventualities.[Get regularly scheduled insights by signing up for Network World newsletters.] Container basics Containers are another type of virtualization, and Docker is the most popular container platform. Containers are a specialized environment in which you can run a particular application. One way to think of them is like lightweight virtual machines. Where each VM in a hypervisor server contains an entire copy of an operating system, containers share the underlying operating system, and each of them contains only the required libraries needed by the application that will run in that container. As a result, many containers on a single node (a physical or virtual machine running an OS and the container runtime environment) take up far fewer resources than the same number of VMs.To Continue reading

Do containers need backup?

Containers are breaking backups around the world, but there are steps you can take to make sure that the most critical parts of your container infrastructure are protected against the worst things that can happen to your data center.At first glance it may seem that containers don’t need to be backed up, but on closer inspection, it does make sense in order to protect against catastrophic events and for other, less disastrous eventualities.[Get regularly scheduled insights by signing up for Network World newsletters.] Container basics Containers are another type of virtualization, and Docker is the most popular container platform. Containers are a specialized environment in which you can run a particular application. One way to think of them is like lightweight virtual machines. Where each VM in a hypervisor server contains an entire copy of an operating system, containers share the underlying operating system, and each of them contains only the required libraries needed by the application that will run in that container. As a result, many containers on a single node (a physical or virtual machine running an OS and the container runtime environment) take up far fewer resources than the same number of VMs.To Continue reading

2019 Year In Review

2019 turned out to be a pretty productive year. At the start of the year I set myself a few goals outlined in this post. How did I stack up? Read on to find out. 2019 Goals Loose 20kgs I started out the year at 89.9kgs and wanting to lose 20kgs. I finished the year at 71.9kgs a loss of...

Security is a Glaring, Moving Target for IoT

“Security is one of the biggest factors limiting IoT expansion,” said Bill Curtis, resident...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

How to Configure BurpSuite to use Tor as Proxy

BurpSuite is a manual toolkit for investigating web security. Burp Proxy allows manual testers to intercept all requests and responses between the browser and the target application, even when HTTPS is being used. The tutorial discusses configuration of Burp to use connection over Tor network. 1. BurpSuite Community Edition We can find BurpSuite Community Edition […]
Continue reading...

Amazon Claims FedRAMP Compliance for a Spate of Services

Amazon claims to have bolstered its FedRAMP compliance by nearly 18% since the beginning of...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.