Archive

Category Archives for "Networking"

How cloud providers’ performance differs

Not all public cloud service providers are the same when it comes to network performance.Each one’s connectivity approach varies, which causes geographical discrepancies in network performance and predictability. As businesses consider moving to the cloud, especially software-defined wide-area networks (SD-WAN) and multi-cloud, it’s important to understand what each public cloud service provider brings to the table and how they compare.To read this article in full, please click here

AWS: 5G Is ‘Not the Holy Grail of IoT’

“5G is an important element but it’s not the Holy Grail of IoT," said AWS IoT VP Dirk...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Prevent lateral compromise with microsegmentation

It’s an unfortunate reality of information security: Eventually, everyone gets compromised. Manufacturers, banks, tech support companies, retail giants, power plants, municipal governments … these are just some of the sectors that have been affected by high-profile data breaches in recent months. Everyone gets hacked. You will, too.

This isn’t cause for despair. It simply means that effective security has to focus on more than just intrusion prevention. Hackers will eventually get into any network, if they’re willing to spend enough time and money doing so. But whether or not they get anything useful once they’ve gained entry—that’s another story.

Good network design can minimize the damage incurred during an attack. There are more ways to approach this than will fit in a single article, so this blog will only focus on network segmentation, and its smaller sibling, microsegmentation.

What is network segmentation?

Network segmentation is the practice of dividing a network into one or more subsections. Each subsection usually contains different kinds of resources and has different policies about who has access to that segment. There are a variety of ways to accomplish the division.

Network segmentation runs along a spectrum from the purely physical to the purely logical. The Continue reading

IDG Contributor Network: SASE: Redefining the network and security architecture

In a cloud-centric world, users and devices require access to services everywhere. The focal point has changed. Now it is the identity of the user and device as opposed to the traditional model that focused solely on the data center. As a result, these environmental changes have created a new landscape that we need to protect and connect.This new landscape is challenged by many common problems. The enterprises are loaded with complexity and overhead due to deployed appliances for different technology stacks. The legacy network and security designs increase latency. In addition, the world is encrypted; this dimension needs to be inspected carefully, without degrading the application performance.To read this article in full, please click here

Amazon Challenges Pentagon’s $10B JEDI Award

While the basis of the suit isn’t clear at this time, court files indicate the case may center...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Dell Tech’s 2030 Goals Show Social Impact Makes Business Sense

Hiring women and people of color, and cutting your company’s carbon footprint are no longer just...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored)

SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.

Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored)

SolarWinds stops by the Tech Bytes podcast to talk about its Application Performance Management suite, which includes Web app and user experience monitoring, log management and analysis, and app infrastructure monitoring. We look at how they work together to help IT teams get to the bottom of application issues. Our guest is Denny LeCompte, senior vice president and general manager of application management at SolarWinds.

The post Tech Bytes: SolarWinds’ APM Tools Work Together To Help IT Solve Application Problems (Sponsored) appeared first on Packet Pushers.

5G NR Demand Skyrockets RAN Market, Dell’Oro Says

In a separate report, Ericsson says the global number of 5G subscriptions will top 2.6 billion by...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T, Juniper Claim 400GbE ‘Firsts’

A recent Dell’Oro Group report forecast that the adoption of 400GbE connections is not likely to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

FCC Bans Huawei, ZTE From USF-Funded Projects

The new FCC order only singles out Huawei and ZTE, but the agency has also established a process to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BIB 084 Keysight Ixia Visibility and Testing

Keysight took a different approach to this Tech Field Day briefing and spent a lot of time talking about the current state of networking threats and the events that you are protecting against. If you aren’t aware from what your network security is doing, its an good presentation for that.     Keysight has many […]

The post BIB 084 Keysight Ixia Visibility and Testing appeared first on Packet Pushers.

Network Break 262: Extreme Announces Fabric Automation And New Switches; Google Rolls Out Smarter Cloud Networking

Today's Network Break episode discusses new data center software and switches from Extreme, new networking cloud tools from Google, Microsoft's support for DoH, an internal re-organization at Cisco and more tech news.

The post Network Break 262: Extreme Announces Fabric Automation And New Switches; Google Rolls Out Smarter Cloud Networking appeared first on Packet Pushers.

The Week in Internet News: Balloon-Based Internet Comes to the Amazon

Internet from the skies: Loon, Google’s sister company, is teaming up with Internet provider Telefonica to provide Internet access to remote areas of the Amazon rainforest in Peru, TechCrunch reports. Loon, the high-altitude balloon company, plans to have the service available in 2020. The area of Peru targeted by the service has about 200,000 residents.

Internet from the highway: Meanwhile, Osceola County Schools in Florida has equipped an unused bus with computer equipment in an effort to bring Internet access to homeless students living in motels, WSBTV.com reports. The school district, south of Orlando, has about 500 students living in motels, some with limited Internet access.

Investigating encryption: A top official at the U.S. Department of Justice has hinted that end-to-end encryption services could be part of a sweeping investigation into some big tech companies, the New York Times reports. The DOJ and law enforcement agencies from other countries have been pushing large tech companies like Facebook to drop their end-to-end encryption services, to the chagrin of many security experts.

Iran shuts it down: The Iranian government shut down Internet access for citizens for several days in response to protests about huge hikes in fuel prices, CNN.com reports. Continue reading

Best Analysis Finalist – Cisco IT Blog Awards for 2019

This blog was selected as a finalist in Cisco BLOG Awards in the Best Analysis category, the category for resources that provide insightful discussions and help for networking architects around the world. Fancy right? Do you agree? Go and vote, it’s the second one on the list ? https://www.ciscofeedback.vovici.com/se/705E3ECD18791A68

The post Best Analysis Finalist – Cisco IT Blog Awards for 2019 appeared first on How Does Internet Work.

Upcoming Workshops: NSX, ACI, VXLAN, EVPN, DCI and More

I’m running two workshops in Zurich in the next 10 days:

I published the slide deck for the NSX versus ACI workshop a few days ago (and you can already download it if you have a paid ipSpace.net subscription) and it’s full of new goodness like ACI vPod, multi-pod ACI, multi-site ACI, ACI-on-AWS, and multi-site NSX-V and NSX-T.

The many faces of awk

If you only use awk when you need to select specific fields from lines of text, you might be missing out on a lot of other services that the command can provide. In this post, we'll look at this simple use along with many other things that awk can do for you with enough examples to show you that the command is a lot more flexible than you might have imagined.Plucking out columns of data The easiest and most commonly used service that awk provides is selecting specific fields from files or from data that is piped to it. With the default of using white space as a field separator, this is very simple:To read this article in full, please click here

8 ways to prepare your data center for AI’s power draw

As artificial intelligence takes off in enterprise settings, so will data center power usage. AI is many things, but power efficient is not one of them.For data centers running typical enterprise applications, the average power consumption for a rack is around 7 kW. Yet it’s common for AI applications to use more than 30 kW per rack, according to data center organization AFCOM. That’s because AI requires much higher processor utilization, and the processors – especially GPUs – are power hungry. Nvidia GPUs, for example, may run several orders of magnitude faster than a CPU, but they also consume twice as much power per chip. Complicating the issue is that many data centers are already power constrained.To read this article in full, please click here