Archive

Category Archives for "Networking"

Space-sourced power could beam electricity where needed

Capturing solar energy in space and then beaming it down to Earth could provide consistent electricity supplies in places that have never seen it before. Should the as-yet untested idea work and be scalable, it has applications in IoT-sensor deployments, wireless mobile network mast installs and remote edge data centers.The radical idea is that super-efficient solar cells collect the sun’s power in space, convert it to radio waves, and then squirt the energy down to Earth, where it is converted into usable power. The defense industry, which is championing the concept, wants to use the satellite-based tech to provide remote power for forward-operating bases that currently require difficult and sometimes dangerous-to-obtain, escorted fuel deliveries to power electricity generators.To read this article in full, please click here

How SD-Branch Enables Business Innovation

SD-branch can connect nearly any location, from a city office to a cabin in the woods. Here's how...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Introduction to Disaster Recovery

Businesses want to choose reliable equipments, components and technologies while designing a network. You may deploy most reliable equipments from your trusted vendor or deploy most mature technologies with carefully do not forget eventually every system fails!

Depends on where is your datacenter located, different disasters may happen. For U.S storm, tornado is not uncommon. I remember just couple years before because of major flooding, Vodafone couldn’t serve to their customer in Turkey for at least 1 day.

Thus, resiliency is an important aspect of the design plan.Resiliency means, how fast you can react to failure with the simplest explanation.

Disaster recovery is the response and remediation that a company follows after a planned or unplanned failure. Businesses often have a secondary datacenter used mostly for backup. If the company has multiple datacenter, they can be used as active/active though.

Secondary datacenter can take the responsibility in the case of a primary datacenter fails if it is used as backup.

Recovery time will depend on business requirements.For the mission critical applications, business may tolerate very short if not zero down time. Then the cost of the required equipments in primary and backup datacenters, skilled engineer who can Continue reading

4 people passed CCDE Lab with my CCDE training recently!

I realised just now that I didn’t share the names of the people who used my CCDE resources and got their CCDE numbers recently.

I know all of them, their capabilities, technical strength. I am happy to see that they are CCDE now.

Congrats to Ken Young , Jaroslaw Dobkowski , Malcolm Booden , Bryan Bartik.

Some of them used Self Paced CCDE Course , Some joined Instructor Led CCDE Training as well. I am honoured to hear good feedbacks from all and share their feedbacks in the related pages on the website.

In 2017, around 10 people passed the CCDE Lab exam with these people. And there was one cancelled exam on May 2017.

CCIE vs. CCDE

CCIE vs. CCDE is probably one of the most frequently asked questions by networking experts.

To get more information on CCDE contents and syllabus, you can check my Instructor Led CCDE or Self Paced CCDE course webpages.

How many times have you asked yourself or discussed this topic with your friends? Many times, right?

I have CCIE routing switching and/or service provider, should I continue to design certificates such as CCDE or should I study for another expert level certification, perhaps virtualization certification?

To illustrate my answer, let me give you an example.

Consider that you would build Greenfield network. (Usually, it is the same for Brownfield as well).

First, you need to understand the business, how many locations it has, where it is located, where is HQ or HQs, Datacenter, POP locations, and so on.

After that, you try to understand how the business can assist its consumers.

It can be retail, airport, stadium, or service provider network.

All these businesses have similar and different requirements,

For example, stadium architecture requires you to have ticketing systems, access control systems, and streaming the game, all of which are connected to the network. So, you need to understand the business requirements, Continue reading

VRF-Lite+GRE/dot1q or MPLS L3 VPN

I am going to create a new category on the blog which we will discuss together the different technologies,protocols, designs and architecture.

You can suggest a discussion topics and you all please welcome to join the discussions in the comment box of each topic.

I want to throw a first topic for the discussions !

Which Enterprise Architecture is more complex ? ( Did you read network complexity article in the blog ? )

MPLS VPN Technologies and Design are explained in detail in my Instructor Led CCDE and Self Paced CCDE course.

 

VRF-lite with GRE/dot1q or MPLS L3VPN ?

 

It is very subjective topic I think there is not absolute corrects thus please share your opinion.Collective of our answers will be creating a detail article and will provide a good resource for the people before they decide a particular technology,protocol,architecture.

UPDATE : Let me provide very brief overview for vrf-lite and MPLS VPNs.

How they can be carried through an overlay to provide data plane separation and how same tasks can be achieved with MPLS layer 3 VPNs.

Vrf-lite provides a control and data plane separation without requiring an MPLS as control or data plane. You don’t need an MPLS Continue reading

Red Hat Responds to Zombieload v2

Three Common Vulnerabilities and Exposures (CVEs) opened yesterday track three flaws in certain Intel processors, which, if exploited, can put sensitive data at risk.Of the flaws reported, the newly discovered Intel processor flaw is a variant of the Zombieload attack discovered earlier this year and is only known to affect Intel’s Cascade Lake chips.[Get regularly scheduled insights by signing up for Network World newsletters.] Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.To read this article in full, please click here

Red Hat Responds to Zombieload v2

Three Common Vulnerabilities and Exposures (CVEs) opened yesterday track three flaws in certain Intel processors, which, if exploited, can put sensitive data at risk.Of the flaws reported, the newly discovered Intel processor flaw is a variant of the Zombieload attack discovered earlier this year and is only known to affect Intel’s Cascade Lake chips.[Get regularly scheduled insights by signing up for Network World newsletters.] Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.To read this article in full, please click here

Intel Reveals AI ASICs, Claims $3.5B in AI Revenue in 2019

Intel estimates that the AI community’s demand for compute will increase 64 times during the next...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Day Two Cloud 023: Optimizing Multi-Cloud Connectivity With VeloCloud (Sponsored)

As more workloads get spread across private and public clouds, how do you operationalize and optimize connectivity, traffic design, and more? Can you stitch together services that reside in different clouds? What about the edge? On today's Day Two Cloud, sponsor VeloCloud, a VMware company, brings some answers. Our guest is Marco Murgia, Senior Director of Product Engineering.

The post Day Two Cloud 023: Optimizing Multi-Cloud Connectivity With VeloCloud (Sponsored) appeared first on Packet Pushers.

Day Two Cloud 023: Optimizing Multi-Cloud Connectivity With VeloCloud (Sponsored)

As more workloads get spread across private and public clouds, how do you operationalize and optimize connectivity, traffic design, and more? Can you stitch together services that reside in different clouds? What about the edge? On today's Day Two Cloud, sponsor VeloCloud, a VMware company, brings some answers. Our guest is Marco Murgia, Senior Director of Product Engineering.

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

AWS, Genesys, Salesforce Purvey New Open Data Model

Amazon Web Services, Genesys, and Salesforce joined forces with the Linux Foundation’s Joint...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Truebill can help you manage your finances—and it’s free to download

Learning how to manage your money correctly is a necessary step towards financial freedom. However, we always seem to forget about online subscription services that go unused. Perhaps you haven’t watched Netflix or forgot to cancel a one-month free trial; if you have these services set to autopay, you’ll end up wasting money on them each month. Let’s be honest, though. Who has the time to hunt down every payment or fee that gets charged to them monthly? This is hassle enough for a single bank account, but it’s nearly impossible to do if you manage multiple accounts manually. If you want a refined way to track and manage your finances, you can download Truebill for free and start lowering your monthly payments today.To read this article in full, please click here

BrandPost: SD-WAN Enables Optimal Microsoft Office 365 User Experience

It is widely known that enterprises are rapidly migrating many of their back-office business applications and end-user collaboration tools from server-based, private data center hosted services to cloud-hosted services. Commercial software-as-a-service (SaaS) application suites like Office 365, are already some of the most widely deployed SaaS applications, and adoption by enterprises of all sizes continues to grow around the world. In a cloud-first enterprise, end users frequently need to access cloud-hosted applications like Office 365 from any location. Regardless of when and where users access cloud applications, they expect a consistent, high quality of experience.To read this article in full, please click here

Docker Unloads Enterprise Biz to Mirantis

The company also scored $35 million in new funding as part of a corporate restructuring.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft Bakes Marvell ThunderX2 Into Azure

The servers are the result of a collaboration that began in March 2017 between Marvell, Microsoft,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Internet Society & Public Interest Registry: A New Era of Opportunity

Today marks the beginning of an exciting new chapter for the .ORG Community.  Earlier today, the Internet Society and Public Interest Registry (PIR) announced that they have reached an agreement with Ethos Capital, an investment firm that helps transform and grow companies in today’s rapidly evolving digital economy, under which Ethos Capital will acquire PIR and all of its assets from the Internet Society.  

As brief background – in 2002, the Internet Society won a competitive bidding process for the .ORG registry and established PIR to manage and operate the .ORG domain.  Since that time, the Internet Society and PIR have worked to grow .ORG into the largest purpose-driven domain – used today by millions of organizations and others to achieve their online goals – and PIR’s contributions to the Internet Society have helped make the Internet more available, accessible and secure for people around the world.

This transaction aligns PIR with a strong, new strategic partner, Ethos Capital, that not only possesses a deep understanding of the intricacies of the domain industry, but also has the ideal mix of expertise, experience and shared values to further advance the goals of .ORG into the future.  Continue reading

Google Injects Network Intelligence Center Into GCP

The cloud giant's Network Intelligence Center packs four tools aimed at helping customers monitor,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.