Archive

Category Archives for "Networking"

Semiconductor startup Cerebras Systems launches massive AI chip

There are a host of different AI-related solutions for the data center, ranging from add-in cards to dedicated servers, like the Nvidia DGX-2. But a startup called Cerebras Systems has its own server offering that relies on a single massive processor rather than a slew of small ones working in parallel.Cerebras has taken the wraps off its Wafer Scale Engine (WSE), an AI chip that measures 8.46x8.46 inches, making it almost the size of an iPad and more than 50 times larger than a CPU or GPU. A typical CPU or GPU is about the size of a postage stamp.Now see how AI can boost data-center availability and efficiency. Cerebras won’t sell the chips to ODMs due to the challenges of building and cooling such a massive chip. Instead, it will come as part of a complete server to be installed in data centers, which it says will start shipping in October.To read this article in full, please click here

VMware spends $4.2B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.2 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black.VMware said during its quarterly financial call this week it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology, and about $2.1 billion for the security technology of Carbon Black, which includes its Predictive Security Cloud and other endpoint-security software.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] VMware has deep relationships with both companies. Carbon Black technology is part of VMware’s AppDefense endpoint security. Pivotal has a deeper relationship in that VMware and Dell, VMware’s parent company, spun out Pivotal in 2013.To read this article in full, please click here

VMware spends $4.2B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.2 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black.VMware said during its quarterly financial call this week it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology, and about $2.1 billion for the security technology of Carbon Black, which includes its Predictive Security Cloud and other endpoint-security software.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] VMware has deep relationships with both companies. Carbon Black technology is part of VMware’s AppDefense endpoint security. Pivotal has a deeper relationship in that VMware and Dell, VMware’s parent company, spun out Pivotal in 2013.To read this article in full, please click here

VMware Buys Carbon Black for $2.1B and Pivotal for $2.7B

VMware said it will buy Pivotal in a deal valued at $2.7 billion and security company Carbon Black...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Texas ransomware attacks: to pay or not to pay? | TECH(feed)

Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet discusses the pattern of ransomware attacks on local governments, how municipalities have responded and how to prevent a ransomware attack in the first place.

AfPIF Day Three: A Record Number of Women

It’s been a record-breaking year: 97 women attended AfPIF 2019, the highest ever, showing the fruits of diversity efforts from organizers and sponsors.

In the last three years, there have been fellowships targeting women in engineering, supported by organizations like Workonline, Google, LINX, and Akamai. There’s also been a working lunch, where participants discuss the best way AfPIF can be more inclusive to women.

As the curtains fell on the tenth edition of AfPIF, it was clear that the future is looking bright, with 367 men and women attending, representing 59 countries: 202 from Africa, 36 from Europe, 16 from America, and 13 from Asia.

The first panel of the day was dedicated to looking back at the challenges in the last ten years, identifying the opportunities going forward, and what we all must do in order to guarantee business growth and better connectivity for the region.

One of the key points was that the traditional telco model is changing, and companies will have to adapt in order to stay relevant. Seacom, for instance is exploring other business opportunities as the demand for traditional infrastructure falls and local content grows, leading to formation of ISPs that can survive largely Continue reading

Edge Internet Economy Will Hit $4.1 Trillion by 2030, Study Says

The edge internet economy will surpass $4.1 trillion by 2030, according to a study by Chetan Sharma...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Polishes Its Hybrid Cloud Strategy

AT&T polished its hybrid cloud strategy following a 30-day stretch that included major new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

InfoBlox Pushes DDI to Branch Offices

The company claims the service will help enterprises fully realize the benefits of SD-WAN, simplify...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Don’t worry about shadow IT. Shadow IoT is much worse.

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface.That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation. That’s why users are often so eager to circumvent what they see as slow and conservative IT departments by adopting increasingly powerful and affordable consumer and cloud-based alternatives, with or without the blessing of the powers that be. Just as important, there’s plenty of evidence of that enlightened IT departments should work to leverage those new approaches to serve their internal customers in a more agile manner.To read this article in full, please click here

Don’t worry about shadow IT. Shadow IoT is much worse.

For years, IT departments have been railing about the dangers of shadow IT and bring-your-own-device. The worry is that these unauthorized practices bring risks to corporate systems, introducing new vulnerabilities and increasing the attack surface.That may be true, but it’s not the whole story. As I’ve long argued, shadow IT may increase risks, but it can also cut costs, boost productivity and speed innovation. That’s why users are often so eager to circumvent what they see as slow and conservative IT departments by adopting increasingly powerful and affordable consumer and cloud-based alternatives, with or without the blessing of the powers that be. Just as important, there’s plenty of evidence of that enlightened IT departments should work to leverage those new approaches to serve their internal customers in a more agile manner.To read this article in full, please click here

Day Two Cloud 016: Checking Up On Azure Kubernetes Service

On today's Day Two Cloud podcast, host Ned Bellavance checks in on Azure Kubernetes Service (AKS), which launched to the public in June of 2018. Ned and guest Justin Luk discuss why Microsoft rolled out AKS when it already had existing container services, business drivers for AKS, customer adoption, lessons learned, and more.

The post Day Two Cloud 016: Checking Up On Azure Kubernetes Service appeared first on Packet Pushers.

BrandPost: Back to School: Your SD-WAN Reading List

Summer is about to end. Time to head back to work, understand next year’s projects and plans, and set your IT infrastructure objectives accordingly. SD-WAN and MPLS transformation are huge trends that cannot be overlooked. How will it impact your existing IT?MPLS transformations can send chills down any IT pro’s spine but these suggested readings will help calm the nerves. They’re a series of clear, concise, and practical manuals divided into lessons on how to migrate from the prehistoric world of MPLS into the light of SD-WAN.  Finish all of them and you’ll have an A+ in WAN Transformation 101.To read this article in full, please click here

Red Hat’s OpenShift Service Mesh Nears Prime Time

The OpenShift Service Mesh handles service-to-service communication of Kubernetes-orchestrated...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Supercharging Firewall Events for Self-Serve

Supercharging Firewall Events for Self-Serve

Today, I’m very pleased to announce the release of a completely overhauled version of our Firewall Event log to our Free, Pro and Business customers. This new Firewall Events log is now available in your Dashboard, and you are not required to do anything to receive this new capability.

Supercharging Firewall Events for Self-Serve

No more modals!

We have done away with those pesky modals, providing a much smoother user experience. To review more detailed information about an event, you simply click anywhere on the event list row.

Supercharging Firewall Events for Self-Serve

In the expanded view, you are provided with all the information you may need to identify or diagnose issues with your Firewall or find more details about a potential threat to your application.

Additional matches per event

Cloudflare has several Firewall features to give customers granular control of their security. With this control comes some complexity when debugging why a request was stopped by the Firewall. To help clarify what happened, we have provided an “Additional matches” count at the bottom for events triggered by multiple services or rules for the same request. Clicking the number expands a list showing each rule and service along with the corresponding action.

Supercharging Firewall Events for Self-Serve

Search for any field within a Firewall Event

Continue reading

Must Read: When Redundancy Actually Helps

Stumbled upon an excellent redundancy-focused blog post (HT: High Scalability). Here are just a few important points:

  • Don’t make things too complex;
  • Don’t add more risk than you take away;
  • You’ve got to fail over in the right direction;
  • You must be able to return to fully-redundant mode.

I’m guessing that people promoting stretched VLANs, vSphere and/or NSX clusters running across multiple sites, weird combination of EVPN and OTV, and a dozen similar shenanigans never considered any one of these points.