Introducing VMware AppDefense – Expanding beyond micro-segmentation to threat detection and response

Hopefully, you have heard the news today! We couldn’t be more excited to announce the general availability of VMware AppDefense, our new security solution. AppDefense bolsters the micro-segmentations threat prevention capabilities delivered by NSX with data center endpoint threat detection and response. It’s no secret that organizations are spending more money than ever on security. It’s also no surprise that the only thing outpacing security spend are the losses due to security breaches. At VMware, we believe the struggle organizations face in gaining the upper-hand in this battle is due to a foundational architectural gap that creates misalignment between the infrastructure where security is applied and the applications that security is designed to protect.

NSX was the first step toward re-aligning network security policy with applications by leveraging the virtualization layer to enable micro-segmentation, as well as enhance the posture of other security solutions through integrations and features like service insertion and guest introspection. But applications are made up of both networks and data center endpoints like VMs. AppDefense is the other half of the puzzle. Whereas NSX prevents threats from moving freely throughout the network, AppDefense detects anything that does make it to an endpoint and can automatically Continue reading

Google leaked prefixes – and knocked Japan off the Internet

Last Friday, 25 August, a routing incident caused large-scale internet disruption. It hit Japanese users the hardest, slowing or blocking access to websites and online services for dozens of Japanese companies.

What happened is that Google accidentally leaked BGP prefixes it learned from peering relationships, essentially becoming a transit provider instead of simply exchanging traffic between two networks and their customers. This also exposed some internal traffic engineering that caused many of these prefixes to get de-aggregated and therefore raised their probability of getting accepted elsewhere.

Andrei Robachevsky

IDG Contributor Network: 5 myths about Z-wave technology debunked

As the IoT and industries related to it continue to expand at mind-boggling speeds, it’s only natural that myths and hear-say about IoT-related technologies grow as well. One of the greatest victims of scandalous rumors is Z-Wave technology, a critical aspect of the IoT that is often unfairly castigated by those who present false or misleading information.So just how secure is Z-Wave technology? What are the most persistent myths about it, and why do some people benefit from spreading them? Below, we’ll go over five common myths about Z-Wave tech, and explain just how wrong they are.Z-Wave is difficult to integrate into the IoT One of the most heinous hoaxes proliferating around the internet is that Z-Wave technology is difficult to integrate into the IoT, and presents serious challenges to IoT application and gadget developers. Nothing could be further from the truth, however. Some Z-Wave critics argue that its development kits are few and far-between, and challenging to both locate and utilize. The reality, however, is that a plethora of Z-Wave development kits are readily prepared to help IoT developers achieve their objectives easily.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 5 myths about Z-wave technology debunked

As the IoT and industries related to it continue to expand at mind-boggling speeds, it’s only natural that myths and hear-say about IoT-related technologies grow as well. One of the greatest victims of scandalous rumors is Z-Wave technology, a critical aspect of the IoT that is often unfairly castigated by those who present false or misleading information.So just how secure is Z-Wave technology? What are the most persistent myths about it, and why do some people benefit from spreading them? Below, we’ll go over five common myths about Z-Wave tech, and explain just how wrong they are.Z-Wave is difficult to integrate into the IoT One of the most heinous hoaxes proliferating around the internet is that Z-Wave technology is difficult to integrate into the IoT, and presents serious challenges to IoT application and gadget developers. Nothing could be further from the truth, however. Some Z-Wave critics argue that its development kits are few and far-between, and challenging to both locate and utilize. The reality, however, is that a plethora of Z-Wave development kits are readily prepared to help IoT developers achieve their objectives easily.To read this article in full or to leave a comment, please click here

History of computers, part 1 — The bulletin board system

One weird little quirk about being human is that we (as a group) tend to think things have been the way they currently are for a lot longer than they actually have been — and that they're not likely to change.Even the most hard and well-backed-up science tends to change with the proverbial wind. Example: Cholesterol ... good or bad? See? Things (and ideas) change. Fast. And often we don't think they've changed at all. Sometimes it's good to sit back and look at how things have already changed — to see how things might change in the future.Let's apply that to servers. Computers serving up bits of data to other computers. What did those look like 10 years ago? 20? 50? In this article series, let's look over each major era and type of servers, in no particular order — I'll be bouncing around a bit as I tell the story of "Computer Servers."To read this article in full or to leave a comment, please click here

History of computers, part 1 — The bulletin board system

One weird little quirk about being human is that we (as a group) tend to think things have been the way they currently are for a lot longer than they actually have been — and that they're not likely to change.Even the most hard and well-backed-up science tends to change with the proverbial wind. Example: Cholesterol ... good or bad? See? Things (and ideas) change. Fast. And often we don't think they've changed at all. Sometimes it's good to sit back and look at how things have already changed — to see how things might change in the future.Let's apply that to servers. Computers serving up bits of data to other computers. What did those look like 10 years ago? 20? 50? In this article series, let's look over each major era and type of servers, in no particular order — I'll be bouncing around a bit as I tell the story of "Computer Servers."To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why microservices are the foundation to a digital future

There’s no doubt that digital transformation (DX) is revolutionizing the way we do business, and cloud computing serves as a key cog in the DX machine. Cloud’s elasticity can indeed help digital businesses communicate more rapidly and increase innovation. But to extract full value from the cloud, companies must make sure that they aren’t bringing the equivalent of a cutlass to a gun fight when it comes to migrating existing applications and accelerating software development.Here is what I mean: many businesses start their migration journeys by lifting and shifting existing on-premises applications into the cloud, making few to no changes to the application itself.  But running such the same old monolithic application architectures in the cloud means that your applications aren’t built to maximize cloud benefits. Just the opposite: They often present scalability issues, increase cost and require time-consuming application support. Ultimately, this will erode DX strategies, which depend on modernizing, rapidly iterating, and scaling applications.To read this article in full or to leave a comment, please click here

VMWare Networking to Openstack Networking to AWS Networking

Infrastructure and management of infrastructure has come a long way in the past few years. Buzzwords today (2016-17) are Private clouds, Public clouds and more recently Hybrid clouds and containers (docker, kubernetes, et.al.). Datacenter design is also changing rapidly with some companies expanding their server footprint building massive private clouds while others reduce them by adopting hybrid cloud strategies. Networking also has be re-thought and reworked by both the public cloud providers and their customers who move towards a hybrid cloud approach. One major area of investment by cloud adopters is to mimic and apply network policies and topologies present in a private data center onto one or more of public cloud providers.

Understanding the networking constructs in Openstack, VMware and AWS will help in making these networking design decisions. I will try to compare and equate network constructs in these three cloud technologies below:

Openstack

Amazon AWS

VMware (VSwitch / DVSwitch)
                                                             Virtual Network                             Continue reading

Heterogeneous Supercomputing on Japan’s Most Powerful System

We continue with our second part of the series on the Tsubame supercomputer (first section here) with the next segment of our interview with Professor Satoshi Matsuoka, of the Tokyo Institute of Technology (Tokyo Tech).

Matsuoka researches and designs large scale supercomputers and similar infrastructures. More recently, he has worked on the convergence of Big Data, machine/deep learning, and AI with traditional HPC, as well as investigating the post-Moore technologies towards 2025. He has designed supercomputers for years and has collaborated on projects involving basic elements for the current and more importantly future exascale systems.

TNP: Will you be running

Heterogeneous Supercomputing on Japan’s Most Powerful System was written by Nicole Hemsoth at The Next Platform.