Master the Alternate "Public Cloud Networking" Universe

You probably heard me say “networking engineer encountering a public cloud feels like Alice in Wonderland” - packet forwarding works in a different way in every public cloud, subnets are a mix between routed interfaces and VRFs, you cannot change IP addresses without involving the orchestration system…

We covered the networking aspects of Amazon Web Services and Azure in our cloud webinars, but you might need a bigger picture:

Read more ...

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies

ORLANDO –  Forecasting long-range IT technology trends is a little herding cats – things can get a little crazy.But Gartner analysts have specialized in looking forwardth, boasting an 80 percent  accuracy rate over the years, Daryl Plummer, distinguished vice president and Gartner Fellow told the IT crowd at this year’s IT Symposium/XPO.  Some of those successful prediction have included the rise of automation, robotics, AI technology  and other ongoing trends.Now see how AI can boost data-center availability and efficiency Like some of the other predictions Gartner has made at this event, this year’s package of predictions for 2020 and beyond is heavily weighted toward the human side of technology rather than technology itself. To read this article in full, please click here

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies

ORLANDO –  Forecasting long-range IT technology trends is a little herding cats – things can get a little crazy.But Gartner analysts have specialized in looking forwardth, boasting an 80 percent  accuracy rate over the years, Daryl Plummer, distinguished vice president and Gartner Fellow told the IT crowd at this year’s IT Symposium/XPO.  Some of those successful prediction have included the rise of automation, robotics, AI technology  and other ongoing trends.Now see how AI can boost data-center availability and efficiency Like some of the other predictions Gartner has made at this event, this year’s package of predictions for 2020 and beyond is heavily weighted toward the human side of technology rather than technology itself. To read this article in full, please click here

How IT pros deal with SD-WAN security concerns

SD-WAN technology is becoming increasingly popular because it's less expensive, more flexible and easier to deploy than MPLS, it provides centralized visibility and management, and it boosts the overall performance of WAN links, which makes employees more productive. But enabling end users in branch offices to connect directly to the public internet and to cloud services raises serious security concerns, which adds another level of complexity and risk to an SD-WAN rollout. To read this article in full, please click here(Insider Story)

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies

ORLANDO –  Forecasting long-range IT technology trends is a little herding cats – things can get a little crazy.But Gartner analysts have specialized in looking forwardth, boasting an 80 percent  accuracy rate over the years, Daryl Plummer, distinguished vice president and Gartner Fellow told the IT crowd at this year’s IT Symposium/XPO.  Some of those successful prediction have included the rise of automation, robotics, AI technology  and other ongoing trends.Now see how AI can boost data-center availability and efficiency Like some of the other predictions Gartner has made at this event, this year’s package of predictions for 2020 and beyond is heavily weighted toward the human side of technology rather than technology itself. To read this article in full, please click here

AT&T, Sprint, T-Mobile US, Verizon CTOs Diverge on 5G

Some operators want to reverse mistakes of the past, and others simply recognize and want to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Securing open source: a brief look at dependency management

Taking full advantage of all that IT automation and orchestration have to offer frequently involves combining IT infrastructure automation with in-house application development. To this end, open source software is often used to speed development. Unfortunately, incorporating third-party software into your application means incorporating that third-party software’s vulnerabilities, too.

Scanning for, identifying, and patching open source dependencies in an application’s codebase is known as dependency management, and it’s increasingly considered a critical part of modern development. A recent report found that 60% of open source programs audited had a vulnerability that’s already been patched. With 96% of all code using open source libraries, this is a problem that impacts everyone.

There are many dependency management products available; too many to list in a single blog post. That said, we’ll look at some examples of well-known dependency management products that fall into three broad categories: free, open source software; commercial software with a free tier; and commercial software without a free tier.

Some dependency management products rely on open source vulnerability lists (the most famous of which is supplied by the National Institute of Standards and Technology [NIST]). Some products are commercial, and use closed databases (often in combination with the Continue reading

Nokia VP: 5G Security Risks Are Huge

5G's impacts on society will be immense, and so will its security implications, said Mary O'Neill,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BlackBerry CTO: ‘More Security, Less Friction Is The Dream’

BlackBerry has invested billions in security technologies and acquisitions in its quest to replace...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T, Vodafone Bridge IoT Networks Across US, Europe

The carriers reached a roaming deal that allows customers to access to their respective narrowband...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Databricks Bags Bricks of Cash in $400M Series F

Databricks secured a $400 million Series F funding round in tandem with a new chief financial...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

41 – Interconnecting Traditional DCs with DCNM using VXLAN EVPN Multi-site

Good day,

The same question arises often about how to leverage DCNM to deploy a VXLAN EVPN Multi-site between traditional Data Centers. To clarify, DCNM can definitively help interconnecting two or multiple Classical Ethernet-based DC networks, in a short time.

As a reminder (post 37) , VXLAN EVPN Multi-site overlay is initiated from the Border Gateway nodes (BGW). The BGW function can run in two different modes; either in Anycast BGW mode (Up to 6 BGW devices per site), traditionally deployed to interconnect VXLAN EVPN based fabrics, or in vPC BGW mode (up to 2 BGW per site), essentially designed to interconnect traditional data centers, but not limited to. vPC BGW can be leveraged to interconnect multiple VXLAN EVPN fabrics from which Endpoints can be locally dual- attached at layer 2. Several designations are used to describe the Classic Ethernet-based data center networks such as Traditional or legacy data center network. All these terms mean that these network are non VXLAN EVPN-based fabrics. The vPC BGW node is agnostic about data center network types, models or switches that construct the data center infrastructure, as long as it offers Layer 2 (dot1Q) connectivity for layer 2 extension, and if Continue reading

T-Mobile US Accelerates ‘Nationwide’ 5G on 600 MHz

The operator claims it will be the first “nationwide” 5G network in the country, but it will...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nvidia Pushes AI Out To The Edge, Where 5G Is Waiting

The image of Nvidia co-founder and CEO Jensen Huang pacing across the stage at a tech conference and talking about his company’s latest new markets for artificial intelligence, the latest partnerships with high-profile vendors, and looking into the near horizon for Nvidia’s next revenue stream has become a familiar one.

Nvidia Pushes AI Out To The Edge, Where 5G Is Waiting was written by Jeffrey Burt at The Next Platform.

Google claims quantum supremacy over supercomputers

The results of an experiment performed on Google’s Sycamore quantum computer demonstrate that theoretical quantum computing designs can work as expected, the company announced today in a paper published in the journal Nature.Formulating the problem was the first hurdle. The company’s research team eventually settled on comparing the Sycamore computer’s output to that of a modern, classical supercomputer in the task of reading the state of a pseudo-random quantum circuit. This results in a computational challenge that should be comparatively simple for Sycamore, but enormously difficult for a supercomputer equipped with traditional silicon.To read this article in full, please click here

Google claims quantum supremacy over supercomputers

The results of an experiment performed on Google’s Sycamore quantum computer demonstrate that theoretical quantum computing designs can work as expected, the company announced today in a paper published in the journal Nature.Formulating the problem was the first hurdle. The company’s research team eventually settled on comparing the Sycamore computer’s output to that of a modern, classical supercomputer in the task of reading the state of a pseudo-random quantum circuit. This results in a computational challenge that should be comparatively simple for Sycamore, but enormously difficult for a supercomputer equipped with traditional silicon.To read this article in full, please click here