Software-Defined and Cloud-Native Foundations for 5G Networks

Cloud-Native Foundations AvidThink (formerly SDxCentral Research) has put together a research brief that explains the infrastructure changes required, and the role that software-defined and cloud-native technologies will play in the 5G world, including supporting network slicing.

Related Stories

DRaaS options grow, but no one size fits all

AutoNation spent years trying to establish a disaster recovery plan that inspired confidence. It went through multiple iterations, including failed attempts at a full on-premises solution and a solution completely in the cloud. The Fort Lauderdale, Fla.-based auto retailer, which operates 300 locations across 16 states, finally found what it needed with a hybrid model featuring disaster recovery as a service.“Both the on-premises and public cloud disaster recovery models were expensive, not tested often or thoroughly enough, and were true planning and implementation disasters that left us open to risk,” says Adam Rasner, AutoNation’s vice president of IT and operations, who was brought on two years ago in part to revamp the disaster recovery plan. The public cloud approach sported a hefty price tag: an estimated $3 million if it were needed in the wake of a three-month catastrophic outage. “We were probably a little bit too early in the adoption of disaster recovery in the cloud,” Rasner says, noting that the cloud providers have matured substantially in recent years.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.[ Also read: What to consider when deploying a next generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.[ Also read: What to consider when deploying a next generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided. Air-gapping, used often now, is the practice of physically isolating data-storing computers from other systems, computers, and networks. It theoretically can’t be compromised because there is nothing between the machines — there are no links into the machines; they’re removed.However, many say air-gapping is no longer practical, as the cloud and internet takes a hold of massive swaths of data and communications.“Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic,” says Defense Advanced Research Projects Agency (DARPA) on its website, announcing an initiative to develop completely new hardware and software that will allow defense communications to take place securely among myriad existing systems, networks, and security protocols.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided. Air-gapping, used often now, is the practice of physically isolating data-storing computers from other systems, computers, and networks. It theoretically can’t be compromised because there is nothing between the machines — there are no links into the machines; they’re removed.However, many say air-gapping is no longer practical, as the cloud and internet takes a hold of massive swaths of data and communications.“Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic,” says Defense Advanced Research Projects Agency (DARPA) on its website, announcing an initiative to develop completely new hardware and software that will allow defense communications to take place securely among myriad existing systems, networks, and security protocols.To read this article in full, please click here

Internet Society Botswana Chapter Hosts Webinar on the Internet of Things

The Internet of Things (IoT) is upon us. The exponential advancements are fast becoming a reality and Africa is a part of the current wave. On 13 December 2018, the Internet Society Botswana Chapter held an Internet of Things webinar at the University of Botswana Library to discuss local IoT-related implications. In attendance were approximately seventy-five individuals, including members of the public, academia, the developer community, and students.

A quick Internet search reveals that IoT can be synonymous with tracking and monitoring systems, wearables, and smart homes. These may not be relatable in the African context, but IoT prospective usage in farming, irrigation, and utilities management brings it home and introduces the possibilities of IoT being used to provide solutions that fit Africa’s needs. It therefore becomes important to implement a multistakeholder approach where governments and regulators provide high speed connectivity, infrastructure, and the right policies to foster local innovation.

The interactive session offered the participants an appreciation of the current IoT situation in Botswana. A remote presentation by Steve Olshansky, Internet technology program manager at the Internet Society explained the Internet Society’s view of IoT, the  OTA IoT Trust by Design Framework, and why we should ensure Continue reading

What programming languages rule the Internet of Things?

As the Internet of Things (IoT) continues to evolve, it can be difficult to track which tools are most popular for different purposes. Similarly, trying to keep tabs on the relative popularity of programming languages can be a complex endeavor with few clear parameters. So, trying to figure out the most popular programming languages among the estimated 6.2 million IoT developers (in 2016) seems doubly fraught — but I’m not going to let that stop me.To read this article in full, please click here

Time to say goodbye to Barcelona

As im sitting here in the hotel, waiting to leave for the airport, the only thing on my mind is: Wow.. what an amazing week this has been.

I have met so many old friends and made a bunch of new ones. All of the Tech Field Day delegates and staff are so bright and friendly that its hard to put into words. We have debated, discussed, thought out loud, shrugged our shoulders and laughed hard.

If you are not already following these guys on twitter, you really should go ahead and push that follow button. Here they are: @al_rasheed @TechFieldDay @ioshints @networkautobahn @darkkavenger @bockcay @OrhanErgunCCDE

In the coming weeks I will put together my final impressions of both the Cisco Live event and the entire Tech Field Day Extra event. Also to come is an analysis of some of the presentations we were fortunate enough to receive.

A big shoutout to Ben Gage (@BenTGage) and Tom Hollingsworth (@NetworkingNerd) for inviting me to this amazing event! Thank you guys!

Time to leave for the airport. Take care!

/Kim

The post Time to say goodbye to Barcelona appeared first on Packet-Forwarding.net.

SRv6: One Tool to Rule Them All

I got some interesting feedback from one of my readers on Segment Routing with IPv6 extension headers:

Some people position SRv6 as the universal underlay and overlay due to its capabilities for network programming by means of feature+locator SRH separation.

Stupid me replied “SRv6 is NOT an overlay solution but a source routing solution.

Read more ...

Acquisition Rumors Abound As Mellanox Rings Up Record Sales

There hardly seems to be a month that doesn’t go by without a different IT supplier being rumored to want to acquire network chip and system provider Mellanox Technologies, which has an intense focus on the high end, scale out, low latency segment of the datacenter switching market.

Acquisition Rumors Abound As Mellanox Rings Up Record Sales was written by Timothy Prickett Morgan at .

How I lost my data trying to back it up

My data, my precious data… is gone.

Overview

This is a story about how I lost my data when trying to prevent it by backing it up.

Even though there were numerous other factors in play, I take full responsibility for what happened.

I have written this article hoping that it could save someone else from the same situation. No one should ever experience the loss of his/her data.

7 days and 10 hours ago:

Alrighty, It’s time for the offline backup routine again.

When it comes to backing up the full OS, I don’t believe in online backup solutions. This is specially true when I’m dealing with Windows servers. These kinda backups should serve as a disaster recovery solution and I’m not taking any chances.

So I always take them offline, outside of the OS, using a third party program to boot up the servers.

For years I have been using Paragon Software. Their products are great, reliable and I have nothing bad to say about them.

This time however, I thought maybe it’s time to ditch commercial softwares and use the solid ntfs-3g suite instead. Back when I started using Paragon, I didn’t even know what Linux was, Continue reading