Archive

Category Archives for "Networking"

VMware and Google Showcase Hybrid Cloud Deployment for Application Platform and Development Teams

VMware and Google have been collaborating on a hybrid cloud for application platform and development teams. Both Google and VMware’s platforms are built on community-driven open-source technologies – namely Kubernetes, Envoy, and Istio. Having a common hybrid cloud foundation allows teams to run their applications on the optimal infrastructure and gives them more choice when modernizing existing applications or developing new cloud-native applications.

Digital transformation is rapidly changing the IT and application landscape. We are seeing a confluence of transformations that are happening simultaneously. These include hybrid clouds, microservice architectures, containerized applications, and service meshes – to name a few.

In this blog post, I will walk you through the architecture and specific use cases to illustrate the value a hybrid cloud deployment can deliver to application platform and development teams. We’ll do this by showing how a retail company can leverage many of these technology trends to help transform its business.

 

A Large Global Retailer Pursing Digital Transformation

Our retailer has a digital business transformation initiative. Its main goals are to become more agile and leapfrog its competitors. It operates a global network of stores. The retailer has data centers and branch offices across multiple countries. These data Continue reading

Internet Society and UNESCO Offer a Capacity Building Program for Judges

Trust is vital to the future of the Internet. The best way to build it is to let a diverse group of people and interested organizations contribute their experience and knowledge. For this reason, the Internet Society and the UNESCO Regional Office has developed a capacity-building program for judges, prosecutors, public defenders, and other judicial operators in Latin America and the Caribbean.

This program shares our vision for an open, globally-connected, trustworthy, and secure Internet for everyone. We allied with UNESCO to incorporate a plan related to freedom of expression, privacy, encryption, and access to public information. In this way the program responds to the needs of judicial operators facing real cases related to the use of the Internet.

For Raquel Gatto, Senior Policy Advisor of the Internet Society, the program represents an unprecedented opportunity: “The technical foundations of the Internet show us that collaboration is a fundamental factor for the functioning of the network. The Internet is a network of networks that trust each other, allowing interconnection. The Internet can not exist without such collaboration”.

Guilherme Canela, Regional Councilor for Communication and Information of UNESCO, says, “For 5 years, UNESCO, in cooperation with the Special Rapporteur for Freedom of Continue reading

The real challenge to achieving 5G: the networks

Everyone seems focused on whether major device makers can ship 5G-ready phones. And indeed they are coming forward with devices (e.g., Samsung, Huawei) based on chip designs from major manufacturers (e.g., Qualcomm, Huawei, Intel).But while many are focused on the device challenges (such as will Apple’s iPhones use Qualcomm or Intel modems, or design their own?) and the potentially billions of connected “things” expected in the next few years, the devices are just the tip of the iceberg when it comes to 5G. The real “below the water line” challenges, the more than 80% of the challenges in making 5G real, are in updating and creating networks that can truly provide all of the variety of services and capabilities that we expect.To read this article in full, please click here

Heavy Networking 440: A Wireless Deployment Crash Course

Today's Heavy Networking is a crash course in executing a new wireless deployment for engineers who are wired, not wireless, experts. We explore how and why to gather user and technical requirements, understanding the RF environment, channel management, and more. Our guest is Robert Boardman.

The post Heavy Networking 440: A Wireless Deployment Crash Course appeared first on Packet Pushers.

Juniper opens SD-WAN service for the cloud

Juniper has taken the wraps off a cloud-based SD-WAN service it says will ease the management and bolster the security of wired and wireless-connected branch office networks.The Contrail SD-WAN cloud offering expands on the company’s existing on-premise (SRX-based) and virtual (NFX-based) SD-WAN offerings to include greater expansion possibilities – up to 10,000 spoke-attached sites and support for more variants of passive redundant hybrid WAN links – and topologies such as hub and spoke, partial, and dynamic full mesh, Juniper stated. To read this article in full, please click here

Working with variables on Linux

A lot of important values are stored on Linux systems in what we call “variables,” but there are actually several types of variables and some interesting commands that can help you work with them. In a previous post, we looked at environment variables and where they are defined. In this post, we're going to look at variables that are used on the command line and within scripts.User variables While it's quite easy to set up a variable on the command line, there are a few interesting tricks. To set up a variable, all you need to do is something like this:To read this article in full, please click here

BrandPost: AI Ops: Let the data talk

Marie Fiala, Director of Portfolio Marketing for Blue Planet at Ciena The catalysts and ROI of AI-powered network analytics for automated operations were the focus of discussion for service providers at the recent FutureNet conference in London. Blue Planet’s Marie Fiala details the conversation.Do we need perfect data? Or is ‘good enough’ data good enough? Certainly, there is a need to find a pragmatic approach or else one could get stalled in analysis-paralysis. Is closed-loop automation the end goal? Or is human-guided open loop automation desired? If the quality of data defines the quality of the process, then for closed-loop automation of critical business processes, one needs near-perfect data. Is that achievable?To read this article in full, please click here

The Microsoft/BMW IoT Open Manufacturing Platform might not be so open

Last week at Hannover Messe, Microsoft and German carmaker BMW announced a partnership to build a hardware and software technology framework and reference architecture for the industrial internet of things (IoT), and foster a community to spread these smart-factory solutions across the automotive and manufacturing industries.The stated goal of the Open Manufacturing Platform (OMP)? According to the press release, it's “to drive open industrial IoT development and help grow a community to build future Industry 4.0 solutions.” To make that a reality, the companies said that by the end of 2019, they plan to attract four to six partners — including manufacturers and suppliers from both inside and outside the automotive industry — and to have rolled out at least 15 use cases operating in actual production environments.To read this article in full, please click here

Guest Introspection Re-introduction for NSX-T 2.4

(Re-)Introduction to Guest Introspection

The Guest Introspection platform has been included in NSX Data Center for vSphere for several years, mostly as a replacement for the VMware vShield Endpoint product and providing customers the ability to plug in their VMware certified partner solutions to allow agent-less anti-virus and anti-malware protections for a variety of data center workloads.

 

The Benefit of the Guest Introspection Platform

The Guest Introspection platform provides customers several outcomes.

Simplified AV management – Manual installation of agents into the guest operating system requires massive operational overhead just getting the agents deployed out on every virtual workload, managing the agent life-cycle post deployment, and for troubleshooting issues with the in-guest agents in day 2 operations.

Guest Introspection provides a centralized management interface for deploying the agentless components to the vSphere hosts, including the security policies, all while using vSphere objects and grouping of those objects to associate the endpoint policy.  This provides granular policy creation and association in the workload environments.

Improved endpoint performance – When several or all of the virtual workloads kick off a scheduled AV scan, this can produce a massive resource drain from host resources where workloads might suffer performance concerns during Continue reading

Recovering from Network Automation Failures

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

One of my readers sent me this question:

Would you write about methods for reverting from expected new state to old state in the case automation went wrong due to (un)predictable events that left a node or network in a limbo state betwixt and between.

Like always, there’s the easy and the really hard part.

Read more ...

BrandPost: SD-WAN and Multi-Cloud Digital Transformation, Part 1: Enterprise Reality Check

This is the first in a 3-part blog series that will detail how deploying a business-driven SD-WAN edge platform can help enterprises successfully accelerate multi-cloud digital transformation initiatives.For a growing number of enterprises, a migration to the cloud is not a simple matter of deploying an application or two onto Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure or some other hosted service. It’s now a multi-cloud strategy that’s a key part of a digital transformation initiative aimed at modernizing business processes. Using multiple cloud computing services such as infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) in a single unified cloud strategy offers the ability to reduce dependence on any single vendor.To read this article in full, please click here