To New Adventures.

First and foremost, I want to express my profound gratitude for an amazing eight years at Sauce Labs. From 2016 to now, I’m extremely proud of what we’ve accomplished. I am grateful to have had the opportunity to build not just one, but two world-class teams during my time at Sauce, working alongside many others …

Supply chain improvements, AI demand propel Cisco earnings

Networking giant Cisco’s final quarter of fiscal 2023 was a surprising success, as an easing of the supply chain crisis enabled the company to fulfill back orders and increase quarterly revenue by 16% year over year, reaching a total of $15.2 billion.Cisco’s said that total software-related revenue was up 17% year on year, and revenue from software subscription services rose 20%. That’s part of what the company refers to as its business model transformation, as slack overall demand for collaboration technology resulting from the easing of the pandemic creates the need for Cisco to target new types of business.Net income for the quarter jumped 41% year over year to $4 billion.To read this article in full, please click here

BrandPost: Why working from home just got better (Hint: it’s your Wi-Fi)

By: Gayle Levin, Senior Product Marketing Manager for Wireless at HPE Aruba Networking. Whether we work from home every day or just occasionally, we’ve grown accustomed to blaming the network for poor performance. There’s an ethos of “we just have to deal with it because it’s part of working remotely.” But dealing with it day after day gets old. That’s why I’m so excited about the new HPE Aruba Networking Access Points, designed to make working from home more efficient. They’re designed to conveniently fit on the desktop and can be managed using HPE Aruba Networking Central’s capabilities. Central includes dashboards that provide WAN health insights, enabling IT to troubleshoot issues whether they are due to the corporate network, applications, or even public ISPs.To read this article in full, please click here

US Defense Department Assembles Generative AI Task Force

The Department of Defense in the United States has established a generative AI task force to help oversee the process of adopting AI tools across the department while avoiding some of the pitfalls of such deoployments.

The post US Defense Department Assembles Generative AI Task Force first appeared on The Next Platform.

US Defense Department Assembles Generative AI Task Force was written by Daniel Robinson at The Next Platform.

Introduction to VXLAN

In the previous post, we looked at some of the challenges with L2-based networks. Now let’s start diving into what VXLAN is and what it can provide. First, let’s talk about overlays.

Overlays

Overlays are not new. We have had overlays for many years. The most well known ones are probably GRE and MPLS. In general, overlays are used to create a level of indirection that extends network capabilities. For example, MPLS L3 VPNs provided some of these capabilities to IP networks:

  • Segmentation.
  • Overlapping IPs.
  • Custom topologies.
  • Scaling.
  • Multihoming.

With overlays, intelligence is often pushed to the edge of the network while intermediate devices can be “dumb”. This can reduce costs as not all devices need the advanced features. How does an overlay work? To create the indirection, the original frame or packet needs to be encapsulated. Depending on the type of overlay, the frame or packet could get encapsulated into another frame or packet. The transport between the overlay nodes is called the underlay. This is the network that transports packets between the nodes. For VXLAN, this is a layer 3 network.

Because overlays encapsulate frames or packets, the size of the frame or packet will increase. To compensate Continue reading

Chipping Away

So far, the silicon technology at the heart of this revolution has been truly prodigious. The processes of assembling silicon wafers and the superimposition of tracks and gates hs been the subject of continual refinement, and some 75 years after the invention of the transistor we are now able to cram almost a trillion of them onto a silicon wafer not much biggeer than a fingernail. Have we reached the end of this silicon road, or is there more to come?

Data replication works best when combined with robust backups

Data replication has stood the test of time, providing organizations with a reliable means of safeguarding critical information for decades. Replication creates redundant copies of vital data, ensuring its availability and resiliency in case of disasters or system failures. In this article, I will explore the intricacies of data replication, examining its fundamental components, types, and potential limitations.Data replication starts with the selection of a source volume or filesystem that needs protection. This source volume might be a virtual disk, often referred to as a LUN (logical unit number), sourced from a storage array or volume manager. It may also take the form of a filesystem. Replication can occur either at the block level, a common practice due to its efficiency, or at the filesystem level, although the latter tends to be less favored for its relatively inferior performance.To read this article in full, please click here

Data replication works best when combined with robust backups

Data replication has stood the test of time, providing organizations with a reliable means of safeguarding critical information for decades. Replication creates redundant copies of vital data, ensuring its availability and resiliency in case of disasters or system failures. In this article, I will explore the intricacies of data replication, examining its fundamental components, types, and potential limitations.Data replication starts with the selection of a source volume or filesystem that needs protection. This source volume might be a virtual disk, often referred to as a LUN (logical unit number), sourced from a storage array or volume manager. It may also take the form of a filesystem. Replication can occur either at the block level, a common practice due to its efficiency, or at the filesystem level, although the latter tends to be less favored for its relatively inferior performance.To read this article in full, please click here

Supermicro Sets Its Sights On $20 Billion Business

Only a few years ago, motherboard and system maker Supermicro set a target of breaking through $10 billion in sales, and thanks to the explosion in systems for training and inference for AI applications, it looks like the company is going to bust through that goal in its fiscal 2025 ending next June.

The post Supermicro Sets Its Sights On $20 Billion Business first appeared on The Next Platform.

Supermicro Sets Its Sights On $20 Billion Business was written by Timothy Prickett Morgan at The Next Platform.

The Swedbank Outage shows that Change Controls don’t work

This week I’ve been reading through the recent judgment from the Swedish FSA on the Swedbank outage. If you’re unfamiliar with this story, Swedbank had a major outage in April 2022 that was caused by an unapproved change to their IT systems. It temporarily left nearly a million customers with incorrect balances, many of whom were unable to meet payments. 

After investigation, the regulator found that Swedbank had not followed their change management process and issued a SEK850M (~85M USD) fine. That’s a lot of money to you and me, but probably didn’t impact their bottom line very much. Either way I’m sure the whole episode will have been a big wake up call for the people at the bank whose job it is to ensure adequate risk and change controls. So, what went wrong and how could it have been avoided? 

How did the Swedbank incident happen?

The judgment doesn’t describe the technical details behind the incident, but it does provide glimpses into how they assessed what went wrong:

  • “The deficiencies that were present in Swedbank’s internal control made it possible to make changes to one of the bank’s most central IT systems without following the process Continue reading

Endace Debuts Packet Capture Software For Public Clouds

Endace has announced a new offering that can capture packets inside your public cloud deployments. Called EndaceProbe Cloud, the offering is available for AWS and Azure public clouds. It can also be deployed in VMware-based private clouds. Why capture packets in the cloud? Endace says the top two customer drivers are security and performance monitoring. […]

The post Endace Debuts Packet Capture Software For Public Clouds appeared first on Packet Pushers.

Three Common Reasons For Analytics And AI Project Failure

ADVERTORIAL: According to the 2023 Dataiku-sponsored IDC InfoBrief — Create More Business Value From Your Organizational Data — “Although [AI] adoption is rapidly expanding, project failure rates remain high.

The post Three Common Reasons For Analytics And AI Project Failure first appeared on The Next Platform.

Three Common Reasons For Analytics And AI Project Failure was written by Martin Courtney at The Next Platform.

Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN

On today's Day Two Cloud we examine the similarities and differences among SSE and SASE, which provide cloud-delivered security; and SD-WAN, which can provide connections to these services. We also discuss the drivers for cloud-delivered security, the role of networking, where and how zero trust can come into play, some of the big players in these spaces, and more.

Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN

On today's Day Two Cloud we examine the similarities and differences among SSE and SASE, which provide cloud-delivered security; and SD-WAN, which can provide connections to these services. We also discuss the drivers for cloud-delivered security, the role of networking, where and how zero trust can come into play, some of the big players in these spaces, and more.

The post Day Two Cloud 207: Making Sense Of SSE, SASE, And SD-WAN appeared first on Packet Pushers.