Which two companies will lead the enterprise Internet of Things?

As the enterprise Interent of Things (eIoT) becomes an increasingly big deal, everyone is starting to wonder which companies have the inside track to dominate this hot new market.It’s not just a pie-in-the-sky question. A July 2018 study from Market Research Future predicted 26 percent annual growth in the eIoT market, hitting $58 billion in 2023.[ Now read: The future of enterprise IoT ] And last year, a McKinsey & Company survey noted, “Although enterprise IoT is a relatively new development, 98 percent of survey respondents reported that most companies within their industry include enterprise IoT initiatives in their strategic road maps, including those related to improving service operations, increasing visibility into operations, enabling new business models, and creating new product and service offerings.”To read this article in full, please click here

Top 10 Networking and Security Sessions at VMworld US 2018

Although it was before my time at VMware running the Networking and Security Business Unit, at VMworld 2017 we demonstrated our expanded NSX network virtualization capabilities in the data center, and the start of our journey to bring NSX to the cloud.

A lot has changed in a year.

Earlier in 2018, we announced the expansion of the NSX family of products to include NSX Data Center (formerly NSX), NSX Cloud, AppDefense, NSX SD-WAN by VeloCloud, and NSX Hybrid Connect.

With the new portfolio, we’ve delivered on the Virtual Cloud Network vision of connecting and protecting applications and data, regardless of where they sit – from the data center to the cloud, and the edge.

VMworld 2018

To help you learn about this vision and the advancements we’ve made in the products that underpin it, we have a huge VMworld 2018 in store for you. With over 70 dedicated networking and security sessions, we’ll cover everything from the basics to super-technical deep dives.

Below is my curated list of can’t-miss networking and security sessions. Make sure you jump onto the content catalog on VMworld.com to reserve your spot before they fill up.

I’m looking forward to joining all of you Continue reading

Using the win_dsc Module in Ansible

Ansible-Get-Started-Windows

Hello, and welcome to another Getting Started with Ansible + Windows post! In this article we’ll be exploring what Desired State Configuration is, why it’s useful, and how to utilize it with Ansible to manage your Windows nodes.

What is DSC?

So what exactly is Desired State Configuration? It’s basically a system configuration management platform that uses the declarative model; in other words, you tell DSC the “what”, and it will figure out the “how”. Much like Ansible, DSC uses push-mode execution to send configurations to the target hosts. This is very important to consider when delivering resources to multiple targets.

This time-saving tool is built into PowerShell, defining Windows node setup through code. It uses the Local Configuration Manager (which is the DSC execution engine that runs on each node).

Microsoft fosters a community effort to build and maintain DSC resources for a variety of technologies. The results of these efforts are curated and published each month to the Powershell Gallery as the DSC Resource Kit. If there isn't a native Ansible module available for the technology you need to manage, there may be a DSC resource.

How Do You Use DSC with Ansible?

DSC Resources are distributed as Continue reading

IDG Contributor Network: Securing the modern mobile OS

The idea for this blog post came to me during a discussion around some recent research performed by Cisco’s Talos threat research group.The post "Advanced Mobile Malware Campaign in India uses Malicious MDM" authored by Warren Mercer, Paul Rascagneres and Andrew Williams and the follow-up post containing additional research found in Part 2.In this beautiful piece of research, these guys identified and analyzed an attacker with malicious intent, that used a modified open source Mobile Device Manager (MDM) to control multiple mobile devices; and to install modified versions of well-known apps like WhatsApp and Telegram in order to gain access to what would otherwise be private data.To read this article in full, please click here

Taiwan Internet Governance Forum 2018: TechGIRLS

“If we can speak up for women today, we can further support other minority groups in future.”

Last year at the Taiwan Internet Governance Forum 2017, we launched TechGIRLs, where we exchanged our life, career, and schooling experience. We all agreed that women in Taiwan enjoy more rights and are more blessed than women in many other countries. But after I attended the Women in ICT session in APNIC 44 and APRICOT 2018, I found there are some differences in Taiwan and other countries, and these problems exist in the whole world. After reviewing ISACA Survey Identifies Five Biggest Barriers Faced by Women in Tech, I agree these are barriers for women, not just in Taiwan, but all over the world:

  1. Lack of mentors
  2. Lack of female role models in the field
  3. Gender bias in the workplace
  4. Unequal growth opportunities compared to men
  5. Unequal pay for the same skills

During the preparation for the Taiwan Internet Governance Forum 2018, I proposed that we discuss these issues in an independent session. We discussed 4 questions:

  1. How to encourage women in Taiwan to work in ICT-related industries or start their own businesses.
  2. How to encourage women to speak Continue reading

Intel FPGA Architecture Focuses on Deep Learning Inference

There has been much written about the potential for FPGAs to take a leadership role in accelerating deep learning but in practice, the hurdles of getting from concept to high performance hardware design are still taller than many AI shops are willing to scale, particularly when GPUs dominate in training and in a pinch, standard CPUs will do just fine for datacenter inference since they involve little developer overhead.

Intel FPGA Architecture Focuses on Deep Learning Inference was written by Nicole Hemsoth at .

Can your network handle digital transformation?

Digital transformation means different things to different organizations. Perhaps it means shifting workloads to the cloud, digging deeper into data analytics, giving your employees more options for mobility or automating more processes. But one thing’s for sure: no matter what your digital transformation strategy looks like, your network is going to be either the hero or a hindrance to your digital transformation efforts.

According to Gartner, “the top networking challenge… is improving agility.” Not a big surprise there. But what is surprising is Gartner’s advice to “shift investments away from premium networking products toward [your] existing network personnel.” That’s right: the answer to improving your network’s speed and agility is not by buying expensive, proprietary monster switches and premium automation solutions. Rather, it’s by letting the people who best know your network decide the best way to make your network more agile.

Agile networks require a deep understanding of your organizational objectives. A “one size fits all” approach to networking just doesn’t work anymore. In order to prepare your network for digital transformation, it has to be both customized to fit your organization’s needs and be flexible enough to adapt when those needs change. Agility requires responsive, Continue reading

How we scaled nginx and saved the world 54 years every day

10 million websites, apps and APIs use Cloudflare to give their users a speed boost. At peak we serve more than 10 million requests a second across our 151 data centers. Over the years we’ve made many modifications to our version of NGINX to handle our growth. This is blog post is about one of them.

How NGINX works

NGINX is one of the programs that popularized using event loops to solve the C10K problem. Every time a network event comes in (a new connection, a request, or a notification that we can send more data, etc.) NGINX wakes up, handles the event, and then goes back to do whatever it needs to do (which may be handling other events). When an event arrives, data associated with the event is already ready, which allows NGINX to efficiently handle many requests simultaneously without waiting.

num_events = epoll_wait(epfd, /*returned=*/events, events_len, /*timeout=*/-1);
 Continue reading