Cisco upgrade enables SD-WAN in 1M+ ISR/ASR routers

Cisco is moving rapidly toward its ultimate goal of making SD-WAN features ubiquitous across its communication products, promising to boost network performance and reliability of distributed branches and cloud services.The company this week took a giant step that direction by adding Viptela SD-WAN technology to the IOS XE software that runs its core ISR/ASR routers. Over a million of ISR/ASR edge routers, such as the ISR models 1000, 4000 and ASR 5000 are in use by organizations worldwide.[ Related: MPLS explained -- What you need to know about multi-protocol label switching]To read this article in full, please click here

Cisco upgrade enables SD-WAN in 1M+ ISR/ASR routers

Cisco is moving rapidly toward its ultimate goal of making SD-WAN features ubiquitous across its communication products, promising to boost network performance and reliability of distributed branches and cloud services.The company this week took a giant step that direction by adding Viptela SD-WAN technology to the IOS XE software that runs its core ISR/ASR routers. Over a million of ISR/ASR edge routers, such as the ISR models 1000, 4000 and ASR 5000 are in use by organizations worldwide.[ Related: MPLS explained -- What you need to know about multi-protocol label switching]To read this article in full, please click here

Cisco upgrade enables SD-WAN in 1M+ ISR/ASR routers

Cisco is moving rapidly toward its ultimate goal of making SD-WAN features ubiquitous across its communication products, promising to boost network performance and reliability of distributed branches and cloud services.The company this week took a giant step that direction by adding Viptela SD-WAN technology to the IOS XE software that runs its core ISR/ASR routers. Over a million of ISR/ASR edge routers, such as the ISR models 1000, 4000 and ASR 5000 are in use by organizations worldwide.[ Related: MPLS explained -- What you need to know about multi-protocol label switching]To read this article in full, please click here

Transforming Security in a Cloud and Mobile World – Security Showcase Session

Over the last several years, VMware has been heavily investing in technology and solutions to transform security.  Our goal has been simple; leverage the virtual and mobile infrastructure to build security in – making it intrinsic, simple, aligned to applications and data, and infinitely more effective.

5 years ago, with NSX, we introduced the concept of micro-segmentation, enabling organizations to leverage network virtualization to compartmentalize their critical applications at a network level.

Last VMworld, we introduced VMware AppDefense, to protect the applications running on that virtual infrastructure.  This enabled organizations to leverage server virtualization to ensure the only thing running is what the application intended – flipping the security model to “ensuring good” versus “chasing bad”

Meanwhile, our Workspace ONE team has been steadily building out their platform that leverages user infrastructure, to ensure only legitimate users can get access to critical applications from devices we can trust.

The momentum for NSX, AppDefense, and Workspace ONE has been growing exponentially. And our product teams have not been standing still.  They’ve been hard at work on some incredible innovations and integrations.

 

Transforming Security in a Cloud and Mobile World

In my security showcase session, Transforming Security in Continue reading

Case Study: Pokémon GO on Google Cloud Load Balancing

 

There are a lot of cool nuggets in Google's New Book: The Site Reliability Workbook. If you haven't put it on your reading list, here's a tantalizing excerpt from CHAPTER 11 Managing Load by Cooper Bethea, Gráinne Sheerin, Jennifer Mace, and Ruth King with Gary Luo and Gary O’Connor.

 

Niantic launched Pokémon GO in the summer of 2016. It was the first new Pokémon game in years, the first official Pokémon smartphone game, and Niantic’s first project in concert with a major entertainment company. The game was a runaway hit and more popular than anyone expected—that summer you’d regularly see players gathering to duel around landmarks that were Pokémon Gyms in the virtual world.

Pokémon GO’s success greatly exceeded the expectations of the Niantic engineering team. Prior to launch, they load-tested their software stack to process up to 5x their most optimistic traffic estimates. The actual launch requests per second (RPS) rate was nearly 50x that estimate—enough to present a scaling challenge for nearly any software stack. To further complicate the matter, the world of Pokémon GO is highly interactive and globally shared among its users. All players in a given area see the same view of the game Continue reading

Intel ends the Xeon Phi product line

You can scratch the Xeon Phi off your shopping list. And if you deployed it, don’t plan on upgrades. That's because Intel has quietly killed off its high-performance computing co-processor because forthcoming Xeon chips have all the features of the Phi, no separate chip or add-in card needed.Intel quietly ended the life of the Xeon Phi on July 23 with a “Product Change Notification” that contained Product Discontinuance/End of Life information for the entire Knight’s Landing line of Xeon Phis.The last order date for the Xeon Phi is Aug. 31, 2018, and orders are non-cancelable and non-returnable after that date. The final shipment date is set for July 19, 2019.To read this article in full, please click here

Intel ends the Xeon Phi product line

You can scratch the Xeon Phi off your shopping list. And if you deployed it, don’t plan on upgrades. That's because Intel has quietly killed off its high-performance computing co-processor because forthcoming Xeon chips have all the features of the Phi, no separate chip or add-in card needed.Intel quietly ended the life of the Xeon Phi on July 23 with a “Product Change Notification” that contained Product Discontinuance/End of Life information for the entire Knight’s Landing line of Xeon Phis.The last order date for the Xeon Phi is Aug. 31, 2018, and orders are non-cancelable and non-returnable after that date. The final shipment date is set for July 19, 2019.To read this article in full, please click here

IDG Contributor Network: Data hoarding is not a viable strategy anymore

For years it has been normal practice for organizations to store as much data as they can. More economical storage options combined with the hype around big data encouraged data hoarding, with the idea that value would be extracted at some point in the future.With advances in data analysis many companies are now successfully mining their data for useful business insights, but the sheer volume of data being produced and the need to prepare it for analysis are prime reasons to reconsider your strategy. To balance cost and value it’s important to look beyond data hoarding and to find ways of processing and reducing the data you’re collecting.To read this article in full, please click here

IDG Contributor Network: Data hoarding is not a viable strategy anymore

For years it has been normal practice for organizations to store as much data as they can. More economical storage options combined with the hype around big data encouraged data hoarding, with the idea that value would be extracted at some point in the future.With advances in data analysis many companies are now successfully mining their data for useful business insights, but the sheer volume of data being produced and the need to prepare it for analysis are prime reasons to reconsider your strategy. To balance cost and value it’s important to look beyond data hoarding and to find ways of processing and reducing the data you’re collecting.To read this article in full, please click here

Episode 32 – Networking In Harsh Environments

Networking is hard enough when deploying it into typical environments like campuses and datacenters, but what happens when you’re tasked with doing networking in areas that were never meant to support technology? In this episode of Network Collective, Scott Morris and Jeremy Austin join us to share their experience with networking in harsh environments.


 

We would like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus is bringing S.O.U.L. back to the network. Simple. Open. Untethered. Linux. For more information about how you can bring S.O.U.L. to your network, head on over to https://cumulusnetworks.com/networkcollectivehassoul. There you can find out how Cumulus Networks can help you build a datacenter as efficient and as flexible as the worlds largest data centers and try Cumulus technology absolutely free.

 


Scott Morris
Guest
Jeremy Austin
Guest

Jordan Martin
Host
Eyvonne Sharp
Host
Russ White
Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 32 – Networking In Harsh Environments appeared first on Network Collective.

IDG Contributor Network: Why blockchain is the missing link to IoT transformations

Mention blockchain in the watercooler chat, and odds are that it evokes notions of cryptocurrencies, like Bitcoin, and covert financial transactions. But in the enterprise world, blockchain is much more than an ultra-secure, digital financial ledger or another “over-hyped” new technology.When combined with the Internet of Things (IoT), blockchain drives new value propositions and new business models, while addressing transparency, complexity and even some security challenges surrounding data transactions. In many ways, blockchain is the “missing link” that enables IoT deployments to achieve their full potentialBlockchain 101 Before diving into this subject in more detail, let’s begin with the definitions. In a basic sense, blockchain is a decentralized ledger that allows multiple parties to records transactions between them efficiently, securely and permanently. Once recorded, it is impossible to manipulate information within the blockchain. Thus, blockchain becomes a single source of truth for the transactions without a need for a third-party validation and verification. Easy enough, right?To read this article in full, please click here