Gartner’s open model: How does Cumulus stack up?

As we’ve discussed in a previous blog post, it can be difficult to determine whether or not a vendor is truly as open as they claim to be. Sure, your network provider says they support open solutions, but the reality is they take advantage of open networking’s flexible definition to market not-so-flexible networks. How can you be certain that you’re investing in the open network your data center deserves?

Never fear, Gartner is here! Their report on gauging vendors’ openness provides you with five easy questions to help you take a machete to the forest of false advertisement. So, how does Cumulus Networks stack up to these requirements, and how have we maintained our dedication to open networking? Let’s take a look at Gartner’s criteria — we think you’ll find that this open model fits Cumulus like a glove.

1) How simple is the solution?

We’ve broken down the qualifications for a simple solution into three parts. First of all, managing your network should be easy from the moment it comes online. Cumulus Linux is an operating system that ensures a simple start. A few features that guarantee a confusion-free beginning include:

What is disaster recovery? How to ensure business continuity

Disasters come in all shapes and sizes. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, but also incidents such as cyber-attacks, equipment failures and even terrorism that can be classified as disasters.Companies and organizations prepare by creating disaster recovery plans that detail actions to take and processes to follow to resume mission-critical functions quickly and without major losses in revenues or business. BE SURE NOT TO MISS: REVIEW: 4 top disaster-recovery platforms compared Go-to storage and disaster recovery products Video: Questions to ask your recovery vendor before you buy What is disaster recovery? In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.To read this article in full, please click here

What is disaster recovery?

Disasters come in all shapes and sizes. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, but also incidents such as cyber-attacks, equipment failures and even terrorism that can be classified as disasters.Companies and organizations prepare by creating disaster recovery plans that detail actions to take and processes to follow to resume mission-critical functions quickly and without major losses in revenues or business. BE SURE NOT TO MISS: REVIEW: 4 top disaster-recovery platforms compared Go-to storage and disaster recovery products Video: Questions to ask your recovery vendor before you buy What is disaster recovery? In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.To read this article in full, please click here

What is disaster recovery?

Disasters come in all shapes and sizes. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, but also incidents such as cyber-attacks, equipment failures and even terrorism that can be classified as disasters.Companies and organizations prepare by creating disaster recovery plans that detail actions to take and processes to follow to resume mission-critical functions quickly and without major losses in revenues or business. BE SURE NOT TO MISS: REVIEW: 4 top disaster-recovery platforms compared Go-to storage and disaster recovery products Video: Questions to ask your recovery vendor before you buy What is disaster recovery? In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.To read this article in full, please click here

Get ready to use Linux containers

One of the most exciting things to happen in the Linux world in the past few years is the emergence of containers — self-contained Linux environments that live inside another OS and provide a way to package and isolate applications.They're not quite virtual systems, since they rely on the host OS to operate, nor are they simply applications. Dan Walsh from Red Hat has said that on Linux, "everything is a container," reminding me of the days when people claimed that everything on Unix was a file. But the vision has less to do with the guts of the OS and more to do with explaining how containers work and how they are different than virtual systems in some very interesting and important ways.To read this article in full, please click here

Responding to Readers: Automated Design?

Deepak responded to my video on network commodization with a question:

What’s your thoughts on how Network Design itself can be Automated and validated. Also from Intent based Networking at some stage Network should re-look into itself and adjust to meet design goals or best practices or alternatively suggest the design itself in green field situation for example. APSTRA seems to be moving into this direction.

The answer to this question, as always, is—how many balloons fit in a bag? ? I think it depends on what you mean when you use the term design. If we are talking about the overlay, or traffic engineering, or even quality of service, I think we will see a rising trend towards using machine learning in network environments to help solve those problems. I am not convinced machine learning can solve these problems, in the sense of leaving humans out of the loop, but humans could set the parameters up, let the neural network learn the flows, and then let the machine adjust things over time. I tend to think this kind of work will be pretty narrow for a long time to come.

There will be stumbling blocks here that need to be Continue reading

Amazon Is Offering a $40-Off Deal On Its Echo Spot Devices

Amazon's Echo Spot brings you all the features of its Echo, with a screen for displaying weather forecasts, news updates, sports scores, song lyrics and much more. All you need to do is ask Alexa. It fits comfortably on a nightstand and works well as an alarm clock and bedside calendar as well. Watch videos, call your friends, control your smarthome -- new features are added all the time. Right now, if you buy two, Amazon will activate a $40 discount in your cart. See this deal now on Amazon.To read this article in full, please click here

BrandPost: An essential guide to managed SD-WAN services

Over the last two years, SD-WANs have been the hottest topic in networking. In that timeframe, SD-WAN solutions have evolved dramatically with many vendors recently implementing new, highly robust architectures and adding functionality such as routing and more sophisticated security.But it is not just the technology that has changed. The way that SD-WANs are planned, owned and operated has also matured significantly. The goals of this blog include discussing the large interest that organizations have relative to consuming SD-WAN as a managed service; the evolution of what is meant by a managed SD-WAN service; and the evolution of how managed SD-WAN services are built and operated.To read this article in full, please click here