VMware’s Head – And Future – Is In The Clouds

More than a decade ago, VMware and its new server virtualization technology represented  significant threat to traditional OEMs like Dell, IBM, and Hewlett-Packard (now Hewlett Packard Enterprise) who were selling their boxes to enterprises that had to over-provision the systems they were bringing into make sure there was enough compute capacity to handle the biggest spikes in demand over the course of the year.

VMware’s Head – And Future – Is In The Clouds was written by Jeffrey Burt at .

Apstra, VMware NSX Drive Consistent Policies Across Clouds, Data Centers

The latest version of the Apstra Operating System (AOS) integrates with software-defined overlay...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Mellanox introduces SmartNICs to eliminate network load on CPUs

If you were wondering what prompted Nvidia to shell out nearly $7 billion for Mellanox Technologies, here’s your answer: The networking hardware provider has introduced a pair of processors for offloading network workloads from the CPU.ConnectX-6 Dx and BlueField-2 are cloud SmartNICs and I/O Processing Unit (IPU) solutions, respectively, designed to take the work of network processing off the CPU, freeing it to do its processing job.[ Learn more about SDN: Find out where SDN is going and learn the difference between SDN and NFV. | Get regularly scheduled insights: Sign up for Network World newsletters. ] The company promises up to 200Gbit/sec throughput with ConnectX and BlueField. It said the market for 25Gbit and faster Ethernet was 31% of the total market last year and will grow to 61% next year. With the internet of things (IoT) and artificial intelligence (AI), a lot of data needs to be moved around and Ethernet needs to get a lot faster.To read this article in full, please click here

How to rename a group of files on Linux

For decades, Linux users have been renaming files with the mv command. It’s easy, and the command does just what you expect. Yet sometimes you need to rename a large group of files. When that is the case, the rename command can make the task a lot easier. It just requires a little finesse with regular expressions. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Unlike the mv command, rename isn’t going to allow you to simply specify the old and new names. Instead, it uses a regular expression like those you'd use with Perl. In the example below, the "s" specifies that we're substituting the second string (old) for the first, thus changing this.new to this.old.To read this article in full, please click here

AT&T CEO Donovan Departs After Paving SDN Foundation

Donovan's departure follows a busy summer where he played a key role in landing major deals with...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Datadog to Join Tech IPO Pack, Files $100M S-1

Datadog is set to run in the tech IPO pack after it filed a $100 million S-1 with the Securities...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Cherry Picks CloudCherry to Boost Its Contact Center Biz

CloudCherry is focused on predictive analytics that allows contact center workers to have...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

6th Middle East School on Internet Governance: Making the Internet Community Stronger in the Middle East

The 6th Middle East School on Internet Governance (MEAC-SIG) took place this year in Rabat, Morocco, from 8-12 July. First held in 2014 in Kuwait, the school is an annual five days of intensive workshops that aims to inform and strengthen the regional Internet community and ensure active participation in national, local, and global Internet Governance fora. This year, it was hosted by The National Telecommunications Regulatory Agency (ANRT) of Morocco, and jointly organized by the Arab World Internet Institute, the Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Governance Project at Georgia Tech, the Internet Society, and RIPE NCC.

The MEAC-SIG faculty includes experts from academia, civil society, business, the technical community, and government stakeholder groups.

This year’s speakers included Milton Mueller of IGP, Internet Governance expert Hanane Boujemi, Miriam Khuene of RIPE NCC, Fahd Batayneh of ICANN, and many other notables. They covered topics such as the IETF’s standardization, GNSO processes, Regional Registries, IGFs in all their capacities, and the inception and a historical view of Internet Governance.

The discussions were carried out in an open environment where everyone contributed their ideas together with multiple stakeholder groups. These groups mentioned how they started their journey in Continue reading

The Week in Internet News: Google, Mozilla Block Surveillance in Kazakhstan

Root-level spying: Google and Mozilla are blocking surveillance efforts by Kazakhstan’s government, Engadget reports. The two organizations are blocking a root certificate that the Kazakhstan government rolled out, allowing it to monitor the encrypted Internet activity of any users who installed it. The government forced ISPs to require all customers to install the certificate in order to gain Internet access.

Broadband for all: An opinion piece in the New York Daily News calls for citywide municipal broadband service after one city report estimated that 29 percent of city residents have no broadband service. “By virtually all measures, New York City’s system for providing broadband internet service is an abysmal failure,” the piece says.

A new war: The industrial Internet of Things is a new battleground for hackers, Silicon Angle says. Nation states are increasingly targeting these systems, with potentially deadly consequences. “The stage is set for the world to find out what might happen if petrochemical, gas and power plant safety systems designed to prevent catastrophic accidents are disabled by malicious hackers,” the story says.

Regulation isn’t the cure: Meanwhile, regulation alone won’t solve the IoT security problems, says IoT for All. While several governments are considering IoT security regulations, Continue reading

Network Break 249: VMware’s Buying Spree; Big Switch Doubles Down On Cloud Networking

Today's Network Break explores why VMware spent billions on Carbon Black, looks at new cloud networking products from Big Switch Networks, discusses why Google stopped sharing Android data with mobile carriers, and gawks at VMware's jaw-dropping tax break.

The post Network Break 249: VMware’s Buying Spree; Big Switch Doubles Down On Cloud Networking appeared first on Packet Pushers.

IDG Contributor Network: Software-defined perimeter – the essence of trust

Actions speak louder than words. Reliable actions build lasting trust in contrast to unreliable words. Imagine that you had a house with a guarded wall. You would feel safe in the house, correct? Now, what if that wall is dismantled? You might start to feel your security is under threat. Anyone could have easy access to your house.In the same way, with traditional security products: it is as if anyone is allowed to leave their house, knock at your door and pick your locks. Wouldn’t it be more secure if only certain individuals whom you fully trust can even see your house? This is the essence of zero-trust networking and is a core concept discussed in my recent course on SDP (software-defined perimeter).To read this article in full, please click here

VMware Goes All In On Kubernetes With Tanzu

VMware kicked off VMworld with more proof that it’s all in on containers in the form of Tanzu,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Liveblog: VMworld 2019 Day 1 General Session

This is the liveblog from the day 1 general session at VMworld 2019. This year the event is back at Moscone Center in San Francisco, and VMware has already released some juicy news (see here, here, and here) in advance of the keynote this morning, foreshadowing what Pat is expected to talk about.

The keynote kicks off with the usual inspirational video, this one incorporating themes and references from a number of high-tech movies, including “The Matrix” and “Inception,” among others. As the video concludes, Pat Gelsinger takes the stage promptly at 9am.

Gelsingers speaks briefly of his 7 years at VMware (this is his 8th VMworld), then jumps into the content of his presentation with the theme of this morning’s session: “Tech in the Age of Any”. Along those lines, Gelsinger talks about the diversity of the VMworld audience, welcomes the attendees in Klingon, and speaks very quickly to the Pivotal and Carbon Black acquisitions that were announced only a few days ago.

Shifting gears, Gelsinger talks about “digital life” and how that translates into millions of applications and billions of devices and billions of users. He talks about how 5G, Edge, and AI are going Continue reading

Snuba: automating weak supervision to label training data

Snuba: automating weak supervision to label training data Varma & Ré, VLDB 2019

This week we’re moving on from ICML to start looking at some of the papers from VLDB 2019. VLDB is a huge conference, and once again I have a problem because my shortlist of “that looks really interesting, I’d love to read it” papers runs to 54 long at the moment! As a special bonus for me, I’m actually going to be at VLDB this year, where no doubt I’ll learn about even more interesting things! By the time you get to read this, it should be the first (workshop) day of the conference…

The conference may have changed, but to bridge from ICML to VLDB I’m going to start with a paper on very much the same theme as we’ve been dipping into over the past couple of weeks: how to combine and learn from multiple noisy sources of data and labels. Snuba is from the same Stanford line as Snorkel which we looked at last year. It’s tackling the same fundamental problem: how to gather enough labeled data to train a model, and how to effectively use it in a weak supervision setting (supervised learning Continue reading

Recently Published: Azure Networking Demo Videos

Remember my rant about the glacial speed of Azure orchestration system? I decided I won’t allow it to derail yet another event and recorded the demos in advance of the first live session. The final videos are just over an hour long; it probably took me at least three hours to record them.

If you plan to attend the live webinar session on September 12th, you might want to watch at least the first few videos before the live session - I will not waste everyone’s time repeating the demos during the live session.

Top 5 IoT networking security mistakes

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things.That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.To read this article in full, please click here

Top 5 IoT networking security mistakes

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things.That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.To read this article in full, please click here