Lenovo’s Charles Ferland Shares What’s in Store for SDN, NFV, and Telecoms

Hear from Lenovo's Charles Ferland as he dives into the company's latest ideas in telecom...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

IDG Contributor Network: The software-defined data center drives agility

In this day and age, demands on networks are coming from a variety of sources, internal end-users, external customers and via changes in the application architecture. Such demands put pressure on traditional architectures.To deal effectively with these demands requires the network domain to become more dynamic. For this, we must embrace digital transformation. However, current methods are delaying this much-needed transition. One major pain point that networks suffer from is the necessity to dispense with manual working, which lacks fabric wide automation. This must be addressed if organizations are to implement new products and services ahead of the competition.To read this article in full, please click here

Overcoming the Barriers to Micro-segmentation

It should come as no surprise how much emphasis organizations place on security today. Threats are becoming more and more sophisticated and the number of threats grow to uncontrollable rates every day.

One of the biggest downsides is that the rising cost of data breaches in 2019 alone, a global average of $3.92 million as reported by the Ponemon Institute and IBM Security July 2019 report, is enough to cause organizations to rethink or increase emphasis on their security strategies and how they can help secure their most important assets by improving the cyber hygiene in their organizations.

What is Cyber Hygiene?

Cyber hygiene refers to what an organization can do to improve their security postures around physical hardware, software, and applications.  If you’ve seen Pat Gelsinger’s keynote from 2017, he goes into the 5 pillars of good cyber hygiene and what organizations can do to improve basic and fundamental security for their business.

Over the last several years, VMware has been focusing on helping organizations move to Software-Defined Data Centers (SDDC) to improve their agility and meet the speed of business. As more organizations adopted the SDDC model, VMware found itself in a unique position Continue reading

IDG Contributor Network: Nutanix and HPE’s new hybrid partnership

The hybrid cloud and hyper converged infrastructure (HCI) markets have become an important discussion as more and more companies are looking at cloud as an operating model. This also means more new products set to hit the market to support the growth in Hybrid Cloud and HCI adoption, which will raise a series of questions for enterprises as to which solutions and tools it will adopt, consume and use to deploy workloads, both on-prem and utilizing public cloud infrastructure.  As digital transformation, customer experience, and business outcomes take center stage, we are seeing the infrastructure itself become an enabler, but where the infrastructure is placed has been more fluid. With hyperscalers like AWS moving workloads on-prem, and IT vendors like Cisco, Dell/VMware, and HPE (who traditionally built solutions for on-prem), ramping up offerings for the cloud, we have most certainly reached a tipping point. The phase we are now entering is the phase where infrastructure moves to the background and the market shifts to the need for compute that is charged on an ‘as used,’ or consumption model.  To read this article in full, please click here

BrandPost: A Business-driven SD-WAN Brings Well-Being to Healthcare Providers

This is the first installment of a multi-part blog series that will provide an overview of how technology is dramatically reshaping the healthcare industry and how the wide area network (WAN) can significantly affect innovation acceleration and customer satisfaction in this sector.Like many other industries, the healthcare industry is also undergoing a digital transformation. And, despite being always considered “behind the times” in leveraging information technology, the delivery of healthcare services is becoming more and more modern and data-driven each day. The evolution in data, mobile and cloud technologies is driving healthcare providers to shift from a provider-driven toward a patient-centric business model. Patients today have the same expectations of healthcare providers as they have of any retailer or any other product or service, and they want healthcare on their own schedule and even on-demand.To read this article in full, please click here

Real Life Financial Network Design – Multicast – BGP – EIGRP – Latency Design Considerations

I was in London last week for CCDE Training. During the training, there was a discussion on Financial network design and one of the students explained how they designed their financial world-wide network. We recorded the discussion and I think you will get great benefit if you want to understand how financial networks are designed, …

The post Real Life Financial Network Design – Multicast – BGP – EIGRP – Latency Design Considerations appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Beamforming explained: How it makes wireless communication faster

Beamforming is a technique that focuses a wireless signal towards a specific receiving device, rather than having the signal spread in all directions from a broadcast antenna, as it normally would. The resulting more direct connection is faster and more reliable than it would be without beamforming.Although the principles of beamforming have been known since the 1940s, in recent years beamforming technologies have introduced incremental improvements in Wi-Fi networking. Today, beamforming is crucial to the 5G networks that are just beginning to roll out.To read this article in full, please click here

How Do You Provision a 500-Switch Network in a Few Days?

TL&DR: You automate the whole process. What else do you expect?

During the Tech Field Day Extra @ Cisco Live Europe 2019 we were taken on a behind-the-stage tour that included a chat with people who built the Cisco Live network, and of course I had to ask how they automated the whole thing. They said “well, we have the guy that wrote the whole system onsite and he’ll be able to tell you more”. Turns out the guy was my good friend Andrew Yourtchenko who graciously showed the system they built and explained the behind-the-scenes details.

Read more ...

Invisible mask: practical attacks on face recognition with infrared

Invisible mask: practical attacks on face recognition with infrared Zhou et al., arXiv’18

You might have seen selected write-ups from The Morning Paper appearing in ACM Queue. The editorial board there are also kind enough to send me paper recommendations when they come across something that sparks their interest. So this week things are going to get a little bit circular as we’ll be looking at three papers originally highlighted to me by the ACM Queue board!

‘Invisible Mask’ looks at the very topical subject of face authentication systems. We’ve looked at adversarial attacks on machine learning systems before, including those that can be deployed in the wild, such as decorating stop signs. Most adversarial attacks against image recognition systems require you to have pixel-level control over the input image though. Invisible Mask is different, it’s a practical attack in that the techniques described in this paper could be used to subvert face authentication systems deployed in the wild, without there being any obvious visual difference (e.g. specially printed glass frames) in the face of the attacker to a casual observer. That’s the invisible part: to the face recognition system it’s as if you are wearing a mask, Continue reading

Keeping NATS Connections DRY in Go

In the previous posts, I covered the basics of connecting to NATS in Go and the different ways subscribers can request information is sent to them. In this post, I’d like to build on those concepts by exploring how to structure your NATS-powered Go code so that things are clean and DRY. I’ll also show that trying to make things too DRY can be problematic; as with everything, moderation is a good idea.

Keeping NATS Connections DRY in Go

In the previous posts, I covered the basics of connecting to NATS in Go and the different ways subscribers can request information is sent to them. In this post, I’d like to build on those concepts by exploring how to structure your NATS-powered Go code so that things are clean and DRY. I’ll also show that trying to make things too DRY can be problematic; as with everything, moderation is a good idea.

Women in Tech Week Profile: Renee Mascarinas

We’re continuing our celebration of Women in Tech Week into this week with another profile of one of many of the amazing women who make a tremendous impact at Docker – this week, and every week – helping developers build modern apps.

Renee Mascarinas is a Product Designer at Docker. You can follow her on Twitter @renee_ners.

What is your job?

Product Designer. 

How long have you worked at Docker?

11 months.

Is your current role one that you always intended on your career path? 

The designer part, yes. But the software product part, not necessarily. My background is in architecture and industrial design and I imagined I would do physical product design. But I enjoy UX; the speed at which you can iterate is great for design.

What is your advice for someone entering the field?

To embrace discomfort. I don’t mean that in a bad way. A mentor once told me that the only time your brain is actually growing is when you’re uncomfortable. It has something to do with the dendrites being forced to grow because you’re forced to learn new things.

Tell us about a favorite moment or memory at Docker or from your Continue reading

Automation And Policy Drive Optimal Hybrid Cloud Spending

Hybrid cloud is gaining traction as organizations seek to realize the flexibility and scale of a joint public and on-premises model of IT provisioning while also changing the way their compute and storage infrastructure is funded, transferring costs from a capital expense (capex) to an operating expense (opex).

Automation And Policy Drive Optimal Hybrid Cloud Spending was written by Timothy Prickett Morgan at The Next Platform.

‘These Are Our First Roadways’: Internet Access and Self-Determination in Pu`uhonua O Waimanalo

The establishment of Pu‘uhonua o Waimānalo in 1994 was a significant milestone in the native Hawaiian movement to regain independence from the United States, which overthrew its kingdom in 1893. The United States formally acknowledged its role in the overthrow of the Kingdom of Hawaii in a law adopted by Congress in 1993 known as the Apology Resolution. A quarter of a century later, the Nation of Hawai’i is levelling up with a new effort in the push for sovereignty: community-led Internet access.

The Nation of Hawai’i is excitedly gearing up for the upcoming build and launch of Hawai’i’s first independent community broadband network in our village of Pu`uhonua O Waimanalo on the island of O’ahu.

As an early adopter of the Internet, the Nation of Hawai’i quickly recognized its potential to support sovereignty and self-determination efforts.

In 1995, the Nation of Hawai’i launched hawaii-nation.org as a way to share its history and updates about current initiatives with the world. The website housed extensive primary-source historical documents, including the constitutions and treaties of the Hawaiian Kingdom. It hoped that by providing access to lesser known parts of history, Hawaiians and supporters around the world could learn and make up Continue reading

AWS Makes It Rain, Extends Credits to Open Source Projects

The promotional credits could help projects that directly feed into AWS' all-in cloud strategy.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Broadcom Aims to Bolster 10G PON Adoption With New Gear

Broadcom's flamboyantly named BCM68650 packs up to 16 passive optical network interfaces in three...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Huawei Dodges German 5G Ban Despite US-Led Campaign

Germany today declined to ban any vendors from participating in the design and buildout of 5G...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Commvault Dazzles With SaaS Backup Venture Metallic

Commvault GO kicked off with the launch of a new cloud-native data protection venture called...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Thoma Bravo Scoops Up Sophos for $3.9 Billion

The buyout firm spent nearly $3 billion purchasing other security vendors in 2018 including...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Designing Your First App in Kubernetes: An Overview

Kubernetes is a powerful container orchestrator and has been establishing itself as IT architects’ container orchestrator of choice. But Kubernetes’ power comes at a price; jumping into the cockpit of a state-of-the-art jet puts a lot of power under you, but knowing how to actually fly it is not so simple. That complexity can overwhelm a lot of people approaching the system for the first time.

I wrote a blog series recently where I walk you through the basics of architecting an application for Kubernetes, with a tactical focus on the actual Kubernetes objects you’re going to need. The posts go into quite a bit of detail, so I’ve provided an abbreviated version here, with links to the original posts.

Part 1: Getting Started 

Just Enough Kube

With a machine as powerful as Kubernetes, I like to identify the absolute minimum set of things we’ll need to understand in order to be successful; there’ll be time to learn about all the other bells and whistles another day, after we master the core ideas. No matter where your application runs, in Kubernetes or anywhere else, there are four concerns we are going to have to address: