BrandPost: Measuring the edge: Finding success with edge deployments

Edge computing deployments are well underway as companies seek to better process the wealth of data being generated, for example, by Internet of Things (IoT) devices.So, what are the results? Plus, how can you ensure success with your own edge projects?Measurements of successThe use cases for edge computing deployments vary widely, as do the business drivers and, ultimately, the benefits.Whether they’re seeking improved network or application performance, real-time data analytics, a better customer experience, or other efficiencies, enterprises are accomplishing their goals. Based on two surveys — one by Automation World and another by Futurum Research — respondents have reported:To read this article in full, please click here

Interview with John Kindervag, the Godfather of Zero Trust Networking

Last month, I had the pleasure of spending a few minutes with John Kindervag, the industry-described “Godfather” and thought leader behind Zero Trust Networking. John developed these concepts during his tenure as Vice President and Principal Analyst at Forrester Research. Zero Trust, rooted in the principle of “never trust, always verify,” is primarily designed to …

History of MIME with Nathaniel Borenstein

On this episode of the History of Networking, Donald and I are joined by Nathaniel Borenstein, who is the primary author of the original MIME specifications.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

Announcing Docker Enterprise 3.0: Delivering High-Velocity Application Innovation

Today at DockerCon, we’re excited to announce Docker Enterprise 3.0 – the only desktop-to-cloud enterprise container platform enabling organizations to build and share any application and securely run them anywhere – from hybrid cloud to the edge.

With Docker Enterprise 3.0, developers can rapidly build multi-service container-based applications right from their desktop and package them in a standardized format that can be shared seamlessly and run anywhere. In addition, Docker Enterprise 3.0 expands its container platform leadership position with the introduction of new capabilities for automated lifecycle management and enhanced security.

Here are some of the highlights that you can look forward to in Docker Enterprise 3.0.

Accelerated application delivery

Enterprises are looking for ways to quickly adapt to new competitive challenges and changing customer requirements through the introduction of new applications. Docker Enterprise 3.0 introduces a number of capabilities that help organizations accelerate application delivery.

Docker Desktop Enterprise

Docker Desktop Enterprise is a new developer tool that extends the Docker Enterprise Platform to developers’ desktops, improving developer productivity while accelerating time-to-market for new applications.

  • Application Designer interface: template-based workflows for creating containerized applications – no Docker CLI commands are required to get started
  • Configurable version packs: Continue reading

AWS Is Now The Largest Systems Business In The World

Considering all of the hundreds of different moving parts, as gauged by different types of features and services, that Amazon Web Services delivers on its public cloud, and the ever-increasing complexity of the AWS platform, it is pretty amazing that the cloud juggernaut can delivery pretty consistently growing revenue growth.

AWS Is Now The Largest Systems Business In The World was written by Timothy Prickett Morgan at .

Dell, VMware Team Up To Tackle The Hybrid Cloud

As enterprises shift more of their workloads into public clouds and grow out their multicloud strategies – many are using three or more public clouds for their applications and data to as much  protect them against problems with the cloud provider as to take advantage of particular strengths that each cloud provider offer – there can be the tendency to think that many will end up putting everything in the cloud.

Dell, VMware Team Up To Tackle The Hybrid Cloud was written by Jeffrey Burt at .

2019 Customer Innovation awards: 6 Stories of Transformation in the Enterprise

We are thrilled to honor six of our enterprise customers with the 2019 Docker Customer Innovation Award today at DockerCon. We launched the awards last year to recognize customers who stand out for how they are using  Docker Enterprise to drive transformation within IT and their business.

These are companies ranging from cruise lines to established “brick and mortar” enterprises, some of whom have been in business for well over 100 years. These are their stories.

Creating Exceptional Experiences: Carnival Corporation

         

Carnival’s first commitment is to creating fun, memorable and safe experiences for its guests. As the largest cruise line in the world, Carnival hosts over 12 million customers annually on 110 ships and at 15 resorts. Technology plays a key role in providing a world-class consistent customer experience.

Carnival leverages Docker Enterprise to build, run and update over 300 services on its new Medallion System, a necklace or wrist band IoT token unique to each passenger used to pay for drinks or as a key to your room. Adding or changes services, or testing new ones, is easy with the Docker Enterprise platform. The system is running on two ships today, with plans to expand Continue reading

Heavy Networking 446: How Open Systems Integrates Security And SD-WAN As A Service

Open Systems integrates security and SD-WAN as a service, including next-gen firewalls and Web gateways. They're the sponsor for today's Heavy Networking podcast. We discuss Open Systems' architecture, how it applies SD-WAN and security policies to traffic, and how Open Systems differentiates itself in this crowded market.

The post Heavy Networking 446: How Open Systems Integrates Security And SD-WAN As A Service appeared first on Packet Pushers.

Commentary: We’re stuck with 40 years old technology

One of my readers sent me this email after reading my Loop Avoidance in VXLAN Networks blog post:

Not much has changed really! It’s still a flood/learn bridged network, at least in parts. We count 2019 and talk a lot about “fabrics” but have 1980’s networks still.

The networking fundamentals haven’t changed in the last 40 years. We still use IP (sometimes with larger addresses and augmentations that make it harder to use and more vulnerable), stream-based transport protocol on top of that, leak addresses up and down the protocol stack, and rely on technology that was designed to run on 500 meters of thick yellow cable.

Read more ...

How to shop for enterprise firewalls

Firewalls have been around for years, but the technology keeps evolving as the threat landscape changes. Here are some tips about what to look for in a next-generation firewall (NGFW) that will satisfy business needs today and into the future.Don't trust firewall performance stats Understanding how a NGFW performs requires more than looking at a vendor’s specification or running a bit of traffic through it. Most firewalls will perform well when traffic loads are light. It’s important to see how a firewall responds at scale, particularly when encryption is turned on. Roughly 80% of traffic is encrypted today, and the ability to maintain performance levels with high volumes of encrypted traffic is critical.To read this article in full, please click here

How to shop for enterprise firewalls

Firewalls have been around for years, but the technology keeps evolving as the threat landscape changes. Here are some tips about what to look for in a next-generation firewall (NGFW) that will satisfy business needs today and into the future.Don't trust firewall performance stats Understanding how a NGFW performs requires more than looking at a vendor’s specification or running a bit of traffic through it. Most firewalls will perform well when traffic loads are light. It’s important to see how a firewall responds at scale, particularly when encryption is turned on. Roughly 80% of traffic is encrypted today, and the ability to maintain performance levels with high volumes of encrypted traffic is critical.To read this article in full, please click here