Cato Networks Raises $55M to Take On Legacy Telcos
The young SD-WAN provider will use the funds to invest in its service infrastructure, engineering and support organizations, and marketing and sales efforts.
The young SD-WAN provider will use the funds to invest in its service infrastructure, engineering and support organizations, and marketing and sales efforts.
“We build the most powerful and efficient computer possible and make it available to scientists based on the quality of their proposals,” says Jack Wells, director of science at the Oak Ridge Leadership Computing facility in Tennessee. …
Take a Peek Inside ORNL’s GPU-Powered “Summit” Supercomputer was written by Nicole Hemsoth at .
By the end of this year, 74 percent of the service providers said they will use SDN to deliver new services, while 65 percent will use it in operations and management operations.
The German telecom giant expressed fears that Europe could fall behind China and the U.S. by at least two years if governments ban Huawei over security concerns.
My personal approach to technology design is to visualise three broad stages. Design, Deploy and Operate. Because those terms are boring and much abused by marketing, I actually use Day Zero, Day One and Day Two. Day Zero design, strategy customer needs, service goals and values – how to keep the service runnings business – […]
The post Day Zero, One, Two appeared first on EtherealMind.
We are excited to announce that Cumulus and Nutanix are partnering to build and operate modern data centers with open networking software. We’ve worked closely with Nutanix, a leader in enterprise cloud computing, to develop a joint integration that will solve one of the most pressing enterprise infrastructure problems by unlocking the power of hyperconverged systems with open networking.
It’s a challenge every enterprise knows all too well: siloed servers, storage and compute make traditional IT infrastructure expensive and complex to maintain and creates a dynamic that holds back business innovation. Hyperconverged infrastructure with modern, open networking software allows for agility, flexibility, and a greatly simplified operational model across compute, storage, and networking. Our joint solution brings a fully automated and highly distributed network fabric to hyperconverged workloads for the modern data center.
Cumulus Linux and NetQ with Nutanix delivers tangible business value by increasing operational efficiency shortening the time required to stand up Nutanix clusters, organizational agility by improving the user experience via a single interface using Nutanix Prism, streamlined procurement through common hardware partners such Continue reading
News of cyber attacks and personal data breaches frequently make headlines nowadays, particularly in Asia Pacific*, and every time a new incident happens, it deals a blow to the trust of some users. Since cyber threats are grave and growing, society must understand how policymakers are addressing cybersecurity concerns, and what can be done to strengthen trust.
A United Nations agency recently launched a tool to do exactly that. Against the backdrop of increasingly complex cybersecurity policies around the world, the portal aims to “enhance informed participation in key policy processes by all relevant stakeholders”, thus facilitating information sharing, capacity building, and trust and cooperation in cyberspace. We spent some time with it to evaluate the state of cybersecurity in Asia Pacific and to highlight the importance of the issue.
The Cyber Policy Portal, released this month by the United Nations Institute for Disarmament Research (UNIDIR), maps the global cybersecurity capability landscape, covering all 193 of the UN Member States, 13 intergovernmental organizations, including the Association of Southeast Asian Nations (ASEAN), and a number of multilateral frameworks.
The interactive map draws from public information and, where applicable, carries links to original documents. Systematically, it answers some of the salient questions Continue reading
It sounds similar to VMware’s “NSX everywhere” push, which seeks to stretch that vendor’s networking and security capabilities from data centers to clouds and the edge.
Remember how earlier releases of Nexus-OS started dropping configuration commands if you were typing them too quickly (and how it was declared a feature ;)?
Mark Fergusson had a similar experience on Cisco IOS. All he wanted to do was to use Ansible to configure a VRF, an interface in the VRF, and OSPF routing process on Cisco CSR 1000v running software release 15.5(3).
Here’s what he was trying to deploy. Looks like a configuration straight out of an MPLS book, right?
Read more ... Cisco discovered a number of vulnerabilities affecting devices that connect to its SD-WAN software. This includes one critical security flaw to its vController software.
ExtraHop CEO Arif Kareem is also positioning the software provider for an IPO in the next 24 months. But he’s quick to add, “that’s not our end goal.”
Have you ever tried to make water flow in a specific direction? Maybe you have some particularly muddy spot in your yard, so you dig a small ditch and think, “the water will now flow from here to there, and the muddy spot won’t be so muddy the next time it rains.” Then it rains, and the water goes a completely different direction, or overflows the little channel you’ve dug, making things worse. The most effective way to channel water, of course, is to put it in pipes—but this doesn’t always seem to work, either.
The next time you think about shadow IT in your organization, think of these pipes, and how the entire system of IT must look to a user in your organization. For instance, I have had corporate laptops where you must enter two or three passwords to boot the laptop, provided by departments that require you to use your corporate laptop for everything, and with security rules forbidding the use of any personal software on the corporate laptop. I have even had company issued laptops on which you could not modify the position of icons on the desktop, change the menu items in any piece Continue reading
Two main issues remain: Dissatisfaction by vendors with the technical approach being taken by the Defense Department, and if Pentagon personnel moves represent a conflict of interest.