Cisco CEO trumpets Catalyst 9K advances, software business success

Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent.But one of the of the more interesting tidbits is that the company said it was selling some 40 Catalyst 9000 systems a day in and has installed 2,700 of the big boxes this quarter bring the total to 5,800 since its introduction in 2017. The Catalyst 9000 is key to a number of Cisco’s future initiatives – one of the most important being its drive to build out its Network Intuitive plans for intent-based networking.[ Related: Getting grounded in intent-based networking] | The other is that the way its software is sold – via a variety of subscription/feature levels is a key component of its overall strategy to become a more software-oriented company.To read this article in full, please click here

Cisco CEO trumpets Catalyst 9K advances, software business success

Industry bellwether Cisco revealed some important financial numbers this week – its revenues were $12.5 billion, up 4 percent for the third quarter year-over-year, with product revenue up 5 percent.But one of the of the more interesting tidbits is that the company said it was selling some 40 Catalyst 9000 systems a day in and has installed 2,700 of the big boxes this quarter bring the total to 5,800 since its introduction in 2017. The Catalyst 9000 is key to a number of Cisco’s future initiatives – one of the most important being its drive to build out its Network Intuitive plans for intent-based networking.[ Related: Getting grounded in intent-based networking] | The other is that the way its software is sold – via a variety of subscription/feature levels is a key component of its overall strategy to become a more software-oriented company.To read this article in full, please click here

Red Hat Summit 2018 Automation Recap

RedHat-Summt-2018

This year Red Hat Ansible Automation was featured in more talks than ever before at Red Hat Summit, as there was an emphasis on automation and management content throughout the conference. Below you’ll find links to the recorded sessions that included Ansible and our Red Hat Management friends from Red Hat CloudForms, Red Hat Insights and Red Hat Satellite. We hope you enjoy these sessions and share with your colleagues.

Want even more? Mark your calendar for AnsibleFest! We’ll be in Austin, TX this year for two days of conference on Oct 2-3.

SESSION RECAP:

Operations risk remediation in highly secure infrastructures

If you have data concerns about using Red Hat’s operations analytics service, Red Hat Insights, this session is for you. Insights speeds up discovery and automates remediation of potential problems in your Red Hat infrastructure quickly and simply. In this session, William Nix and Bill Hirsch of Red Hat show you how to configure Red Hat Insights to obfuscate and remove sensitive data from Red Hat Insights analytics. You'll learn how Red Hat Insights securely transfers, stores, and protects the data it does use while you're taking advantage of the service. 

 

Push-button deployments with Red Hat Continue reading

Magnetic smart fabrics will store data in clothes

High-density data could one day be stored in fabric patches embedded in people’s clothing, say scientists at the University of Washington. Importantly, it wouldn’t require electricity, so the smart-fabric could be washed or ironed just like regular clothing. That could make it more convenient than other forms of memory.Off-the-shelf conductive thread, which the scientists say they recently discovered can be magnetized, is being used in trials. The data is read using a simple magnometer. The conductive thread is used commercially now in gloves for operating touch screens, for example.“You can think of the fabric as a hard disk,” said Shyam Gollakota, associate professor in the Paul G. Allen School of Computer Science & Engineering at the University of Washington, announcing the breakthrough on the school’s website at the end of last year. “You’re actually doing this data storage on the clothes you’re wearing.”To read this article in full, please click here

RIPE 76 Sees Strong Focus on Routing Security

The RIPE 76 meeting is happening this week in Marseille, France, held at the fantastic location of the Palais du Pharo overlooking Marseille’s Old Port. And it’s also another record attendance with over 850 people registered.

The first couple of days have primarily been devoted to plenary sessions, and there’s been a big focus on routing security. Erik Bais (A2B Internet) kicked off the discussion with a presentation on ‘Why are we still seeing DDoS traffic?‘, which highlighted that DDoS attacks are still originating from the same networks. Looking at the list of the worst offenders, there’s even one amongst the regular RIPE attendees, and he called for networks to clean up their acts. This was also a good opportunity to highlight the MANRS initiative, which of course includes measures to mitigate amplification attacks, and encourages networks to make good routing practices the norm.

Alexander Azimov (Qrator Labs) reinforced this message by outlining the current problems with BGP, including the ongoing route leaks and hijacks affecting the Internet. There are currently only moral obligations to not use other providers’ address space or to support anti-spoofing policies, yet major providers (including Tier 1 providers) continue to both originate Continue reading

IDG Contributor Network: Rationale in irrationality – The coming of cloud bust?

Any technology, product, or service can become so popular that it develops a trendiness, in which case it becomes difficult to determine if the tool actually has its perceived value or is causing overzealousness in the market. Cloud computing has the huge visibility that could allow it to become an overvalued product, which could allow industry analysts to think it will expand more rapidly than it actually will. This article explores the current industry growth rate projections for the cloud and signs that these growth rates could begin to slow in the years ahead.The numbers: how fast is cloud growing? For many reasons, businesses are turning toward the cloud. One key one is that a greater understanding has developed that the security of cloud is preferable to the security of on-premise architecture.To read this article in full, please click here

Survey: Mainstream adoption of SDN, SD-WAN finally arrives

In 2018, for the first time cloud and software-defined data-center concerns have become the primary focus of enterprise network teams, bumping server virtualization from the top spot, according to an Enterprise management Associates (EMA) report based on a survey of 251 North American and European enterprise network managersThis is the first shift in their priorities for in more than a decade. Since 2008, EMA has been asking network managers to identify the broad IT initiatives that drive their priorities. Server virtualization has dominated their responses year after year. Cloud and software-defined data center (SDDC) architectures have always been secondary or tertiary drivers.To read this article in full, please click here

Survey: Mainstream adoption of SDN, SD-WAN finally arrives

In 2018, for the first time cloud and software-defined data-center concerns have become the primary focus of enterprise network teams, bumping server virtualization from the top spot, according to an Enterprise management Associates (EMA) report based on a survey of 251 North American and European enterprise network managersThis is the first shift in their priorities for in more than a decade. Since 2008, EMA has been asking network managers to identify the broad IT initiatives that drive their priorities. Server virtualization has dominated their responses year after year. Cloud and software-defined data center (SDDC) architectures have always been secondary or tertiary drivers.To read this article in full, please click here

Get Familiar with Leaf-and-Spine Fabrics

An attendee of my Building Next-Generation Data Center online course asked me what the best learning path might be for a total (data center) beginner that has to design and install a small leaf-and-spine fabric in a near future.

This blog post was written for ipSpace.net subscribers who want to get the most out of ipSpace.net content. If you’re only interested in free stuff, you might feel it’s a waste of your time. You’ve been warned ;)

Read more ...

Re-coding Black Mirror Part IV

This is part IV of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications.

(If you don’t have ACM Digital Library access, all of the papers in this workshop can be accessed either by following the links above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page).

Is this the era of misinformation yet? Combining social bots and fake news to deceive the masses

In 2016, the world witnessed the storming of social media by social bots spreading fake news during the US Presidential elections… researchers collected Twitter data over four weeks preceding the final ballot to estimate the magnitude of this phenomenon. Their results showed that social bots were behind 15% of all accounts and produced roughly 19% of all tweets… What would happen if social media were to get so contaminated by fake news that trustworthy information hardly reaches us anymore?

Fake news and hoaxes have been Continue reading

Getting Logical About Cavium ThunderX2 Versus Intel Skylake

Any processor that hopes to displace the Xeon as the engine of choice for general purpose compute has to do one of two things, and we would argue both: It has to be a relatively seamless replacement for a Xeon processor inside of existing systems, much as the Opteron was back in the early 2000s, and it has to offer compelling advantages that yield better performance per dollar per watt per unit of space in a rack.

The “Vulcan” ThunderX2 chips, at least based on the initial information that is available in the wake of their launch, appear to do

Getting Logical About Cavium ThunderX2 Versus Intel Skylake was written by Timothy Prickett Morgan at The Next Platform.

Why I’m Joining Cloudflare

Why I'm Joining Cloudflare

I love working as a Chief Security Officer because every day centers around building something that makes people safer. Back in 2002, as I considered leaving my role as a cybercrime federal prosecutor to work in tech on e-commerce trust and safety, a mentor told me, “You have two rewarding but very different paths: you can prosecute one bad actor at a time, or you can try to build solutions that take away many bad actors' ability to do harm at all.” And while each is rewarding in its own way, my best days are those where I get to see harm prevented—at Internet scale.

Why I'm Joining Cloudflare

In 2016, while traveling the United States to conduct hearings on the condition of Internet security as a member of President Obama's cyber commission, my co-commissioners noticed I had fallen into a pattern of asking the same question of every panelist: “Who is responsible for building a safer online environment where small businesses can set up shop without fear?” We heard many answers that all led to the same “not a through street” conclusion: Most law enforcement agencies extend their jurisdiction online, but there are no digital equivalents to the Department of Continue reading