IDG Contributor Network: Winning together in the co-economy: a new mindset for the 21st century

During the late 20th century, industrial technology providers focused on delivering complete, turnkey solutions by themselves. The thought was that to effectively address highly specialized and complex environments, a vertically integrated approach would produce a better outcome.Today, that mindset has drastically shifted.The accelerated pace of technology innovation has driven end customers to question this single-vendor model. Now, customers are increasingly embracing the open model involving multiple partners developing solutions based on open standards and the latest technology. Such solutions are typically better future-proofed, more cost effective and agile.To read this article in full, please click here

The Value of Community

What seems, now, like a few short months ago, I was drawn into a small community known as The Network Collective. This last week, we launched our paid membership service.

The first thing that must come to mind is that there will be training. Of course there will be training. A (minor) theme throughout the community launch among Eyvonne, Jordan, and I, is that the training on tap will be different from anything else out there. We all three have a great deal of respect for the existing training materials, and we all intend to continue to be involved in other training and education efforts. On the other hand, the style, tone, and content will be different at The Network Collective. The first series being launched are math for network engineers, a long conversation on network design, and a long conversation on communication skills. But training is, once again, a minor theme.

The major theme of The Network Collective is community.

Consider the position of the “average” network engineer. You are either the expert, or one of a few experts, on a topic very few people care about in your organization. What you build is largely seen as an opaque Continue reading

Network Break 187: China Tech Tariffs; FBI Advises Router Reboot

Take a Network Break! The Trump administration proposes sanctions on a portion of Chinese tech imports, the FBI advises router reboots to help thwart the VPNFilter malware, and Huawei completes a 200Gbps backbone network in Spain.

CenturyLink becomes certified on Cisco Meraki to compete with resellers, OpenStack matures, and network engineers decry an ITU proposal to speed IPv6 deployments in emerging countries.

Apstra extends its network orchestration coverage, Cisco wrestles with how to sell cloud, VMware posts a positive financial quarter, and AT&T tests an all-weather communications drone called a Flying COW.

Get links to all these stories just after our sponsor message.

Sponsor: Couchdrop

Couchdrop provides Secure Copy Protocol,or SCP and Rsync to Dropbox, Box and other cloud storage providers. Find out more at Couchdrop.io.

Show Links:

White House announces tariffs, investment restrictions on China over intellectual property abuse – Axios

Donald Trump to hit US$50 billion of Chinese imports with 25 per cent tariffs and restrict investment in US hi-tech industries – South China Morning Post

Sen. Warner warns against ZTE deal – Axios

Huawei and Orange Spain finalize the construction of 200 Gbps Backbone Network – Huawei Press Center

Foreign Cyber Actors Target Home and Office Continue reading

IDG Contributor Network: To accelerate cloud application performance, start by mapping your apps

In the eternal words of Yogi Berra, “If you don't know where you are going, you'll end up someplace else.” So how does this sage advice apply to the new world of application performance and hybrid IT?As the pace of application migration to the cloud continues to accelerate, enterprise networking teams have turned to hybrid and SD-WANs as practical solutions to open up more localized internet access and direct routing to the cloud. So the theory goes that by deploying broadband and internet connections at the edge of the network, users can bypass the MPLS bottlenecks and avoid transiting the centralized data center internet egress points.So with the proliferation of hybrid and SD-WAN deployments, which according to most analysts is well past the tipping point and going mainstream, why is it that enterprise IT teams are still struggling with cloud application performance? User frustration with the performance of applications like Office 365, Salesforce, Workday, ServiceNow, and others is only growing, rather than waning.To read this article in full, please click here

IDG Contributor Network: To accelerate cloud application performance, start by mapping your apps

In the eternal words of Yogi Berra, “If you don't know where you are going, you'll end up someplace else.” So how does this sage advice apply to the new world of application performance and hybrid IT?As the pace of application migration to the cloud continues to accelerate, enterprise networking teams have turned to hybrid and SD-WANs as practical solutions to open up more localized internet access and direct routing to the cloud. So the theory goes that by deploying broadband and internet connections at the edge of the network, users can bypass the MPLS bottlenecks and avoid transiting the centralized data center internet egress points.So with the proliferation of hybrid and SD-WAN deployments, which according to most analysts is well past the tipping point and going mainstream, why is it that enterprise IT teams are still struggling with cloud application performance? User frustration with the performance of applications like Office 365, Salesforce, Workday, ServiceNow, and others is only growing, rather than waning.To read this article in full, please click here

Great Hopes and some concerns at the African Internet Summit (AIS)

Earlier this month, the African Internet community gathered in Dakar, Senegal for the Africa Internet Summit (AIS). The event highlighted some of the great hopes, as well as some of the concerns, that the African Internet community has for the future.

I had the personal honor of speaking at the Opening of the AFNOG meeting where I talked about what the Internet has brought to Africa and the promise that it still holds. I highlighted how Africa has experienced tremendous growth in Internet access and usage over the past few years, and how enormous development opportunities have been opened up for its young population. Believing that we need to put people at the center of our decision-making and build an Internet where everyone’s voice counts, I encouraged the Internet community in Africa to continue to embrace diversity, inclusion, and equality in order to shape an Internet that best serves the billions of people who use it every day, now and into the future.

In many ways, AIS is a showcase for the progress that is being made in creating an Internet for everyone. Key groups are making sure that their voices are being heard.

For example, at a Women in Continue reading

This Week in Internet News: AI Diagnoses Skin Cancer Better than Doctors

AI plays doctor: Artificial intelligence can detect skin cancer better than dermatologists, according to a new international study. Flesh-and-blood dermatologists in the study accurately detected 86.6 percent of skin cancers from images, compared to 95 percent for a deep learning convolutional neural network, reports Agence France Presse. Still, there’s no substitute for a thorough clinical examination, the researchers said in a Mirror.co.uk story.

AI can teach, too: Many schools in China are now testing AI as a way to grade homework, reports the South China Morning Post. AI is being used to grade essays, and it recommends improvements in writing style and structure.

AI vs. Internet trolls: AI can even predict when an Internet fight is about to break out, says Bigthink.com. Apparently, one way to predict an online fight is about to happen is when a commenter begins to let the accusations fly by using the word “you.”

Hackers target routers: It’s those Russian hackers again, and they’re after your router. The Russian Sofancy group is among the foreign cyber actors who “have compromised hundreds of thousands of home and office routers and other networked devices,” the FBI warned. One way to limit the attack Continue reading

Cato Networks adds threat hunting to its Network as a Service

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.One of the key benefits of cloud-based networking is increased security for applications and data. Given that the traditional perimeter of on-premise networks has been decimated by mobile and cloud computing, NaaS builds a new perimeter in the cloud. Now it’s possible to unify all traffic – from data centers, branch locations, mobile users, and cloud platforms – in the cloud. This means an enterprise can set all its security policies in one place, and it can push traffic through cloud-based security functions such as next-generation firewall, secure web gateway, advanced threat protection, and so on.To read this article in full, please click here

Cato Networks adds threat hunting to its Network as a Service

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.One of the key benefits of cloud-based networking is increased security for applications and data. Given that the traditional perimeter of on-premise networks has been decimated by mobile and cloud computing, NaaS builds a new perimeter in the cloud. Now it’s possible to unify all traffic – from data centers, branch locations, mobile users, and cloud platforms – in the cloud. This means an enterprise can set all its security policies in one place, and it can push traffic through cloud-based security functions such as next-generation firewall, secure web gateway, advanced threat protection, and so on.To read this article in full, please click here

REVIEW: 6 enterprise-scale IoT platforms

There's little need to tell anyone in IT that the Internet of Things (IoT) is a big deal and that it's growing insanely fast; BI Intelligence estimates that there will be some 23.3 billion IoT devices by 2019. As IoT support becomes more of an enterprise concern, there are four key issues about enterprise IoT (EIoT) deployments to consider: The sheer number of enterprise IoT endpoint devices – There will be 1 billion by 2019. The frequency of data generated IoT devices – IDC estimates that by 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day or one interaction every 18 seconds. The incredible volume of IoT data – Of the 163 zettabytes (that's 1021bytes) of data that will be created in 2025, IDC estimates that 60% will be from IoT endpoints and half of that (roughly 49 zettabytes) will be stored in enterprise data centers. The challenges of maintaining security for your device constellation – IDC estimates that by 2025, 45% of the stored enterprise data will be sensitive enough to require being secured but will not be. [ For more on IoT see tips for securing IoT Continue reading