IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

IDG Contributor Network: WANs, tunnels and tags are things of the past

It is probably safe to assume that private networking has been an afterthought. In fact, the Internet Engineering Task Force (IETF) document (RFC 1918) that created private network addresses that are “un-routable” was released years after BGP-4 and IPV6 were codified into standards.In order to join private networks to each other, wide area networks (WANs) emerged. Initially, the benefits obtained by WANs were just pure connectivity. Subsequent benefits accrued, including the belief that private networks were secure because addresses of servers and clients in the private address could not be reached from the public network unless a “translation” or rule was established. This, however, may no longer be the case.To read this article in full or to leave a comment, please click here

Performance Portability on the Road to Exascale

The software ecosystem in high performance computing is set to be more complex with the leaps in capability coming with next generation exascale systems. Among several challenges is making sure that applications retain their performance as they scale to higher core counts and accelerator-rich systems.

Software development and performance profiling company, Allinea, which has been around for almost two decades in HPC, was recently acquired by ARM to add to the company’s software ecosystem story. We talked with one of the early employees of Allinea, VP of Product Development, Mark O’Connor about what has come before—and what the software performance

Performance Portability on the Road to Exascale was written by Nicole Hemsoth at The Next Platform.

Brazil needs to involve all stakeholders in Internet governance

Last week the Brazilian government, through the Ministry of Science, Technology, Innovation and Communication, launched an open consultation as part of a process for reviewing the current structure and mission of the Brazilian Internet Steering Committee, the CGI.Br. 

[Note: Portuguese version of this post included below.]

An evaluation and review of a Governance mechanism is natural and something that should not call the attention of anybody.  The particularity here is that the announcement was unexpected, showing that the criteria to be used, the objectives of the review, and the process itself were not done in a multistakeholder manner.

Mr. Raúl Echeberría

Why Morningstar Moved to the Cloud: 97% Cost Reduction

 

Enterprises won't move to the cloud. If they do, it's tantamount to admitting your IT group sucks. That has been the common wisdom. Morningstar, an investment research provider, is moving to the cloud and they're about as enterprisey as it gets. And they don't strike me as incompetent, it just seems they don't want to worry about all the low level IT stuff anymore. 

Mitch Shue, Morningstar's CTO, gave a short talk at AWS Summit Series 2017 on their move to AWS. It's not full of nitty gritty technical details. That's not the interesting part. The talk is more about their motivations, the process they used to make the move, and some of the results they've experienced. While that's more interesting, we've heard a lot of it before.

What I found most interesting was the idea of Morningstar as a canary test. If Morningstar succeeds, the damn might bust and we'll see a lot more adoption of the cloud by stodgy mainstream enterprises. It's a copy cat world. That sort of precedent gives other CTOs the cover they need to make the same decision.

The most important idea in the whole talk: the cost savings of moving to Continue reading

All you need to know about Unix environment variables

Simply put, environment variables are variables that are set up in your shell when you log in. They are called “environment variables” because most of them affect the way your Unix shell works for you. One points to your home directory and another to your history file. One identifies your mail file while another controls the colors that you see when you ask for a file listing. Still another sets up your default search path.If you haven’t examined your environment variables in a while, you might be surprised by how many of them are configured. An easy way to see how many have been established in your account is to run this command: $ env | wc -l 25 The env command (or printenv) will list all of the enviroment variables and their values. Here’s a sampling:To read this article in full or to leave a comment, please click here

4 tips for managing big data from IoT in your network

Big Data and the Internet of Things. The two seem to go hand in hand, even if there are some important differences between them. As IoT becomes a greater reality, it’s important that your network devops team is ready for its huge impact on your systems and networks. In this post, we’ll cover the basics, like the difference between big data and the Internet of Things, and then we’ll go into more detail about how to ensure your network is managing big data from IoT effectively.

The Internet of Things: a hot topic

The Internet of Things has been a hot topic in recent years. Little wonder, since its potential is increasing daily. From Bluetooth accessible devices such as smart appliances and smart homes, to wearable technology, to smart cars, to energy plants and wind turbines, smart technology is growing fast. Along with this technology is the need to support these devices both in network and storage. By 2025 McKinsey expects IoT will generate $11.1 Trillion annually. Companies are rushing to find ways to capitalize on IoT and the big data it will generate.

Differences between the Internet of Things and big data

Big Data is an interesting concept Continue reading

Why 802.11ax is the next big thing in Wi-Fi

I know, I know, I’ve heard it before. A new technology comes along, and it promises to be the next big thing. Consumers and businesses buy it, and what happens? It fails to live up to the hype. In my opinion, almost every iPhone release over the past five years has been that way. Sure there were some cool new features, but overall it’s not something I’d say was game changing. One technology that does promise to live up to the hype is 802.11ax, the next standard for wireless LANs. I say that because this next generation of Wi-Fi was engineered for the world we live in where everything is connected and there’s an assumption that upload and download traffic will be equivalent. Previous generations of Wi-Fi assumed more casual use and that there would be far more downloading of information than uploading. To read this article in full, please click here

Why 802.11ax is the next big thing in Wi-Fi

I know, I know, I’ve heard it before. A new technology comes along, and it promises to be the next big thing. Consumers and businesses buy it, and what happens? It fails to live up to the hype. In my opinion, almost every iPhone release over the past five years has been that way. Sure there were some cool new features, but overall it’s not something I’d say was game changing. One technology that does promise to live up to the hype is 802.11ax, the next standard for wireless LANs. I say that because this next generation of Wi-Fi was engineered for the world we live in where everything is connected and there’s an assumption that upload and download traffic will be equivalent. Previous generations of Wi-Fi assumed more casual use and that there would be far more downloading of information than uploading. To read this article in full or to leave a comment, please click here

Why 802.11ax is the next big thing in Wi-Fi

I know, I know, I’ve heard it before. A new technology comes along, and it promises to be the next big thing. Consumers and businesses buy it, and what happens? It fails to live up to the hype. In my opinion, almost every iPhone release over the past five years has been that way. Sure there were some cool new features, but overall it’s not something I’d say was game changing. One technology that does promise to live up to the hype is 802.11ax, the next standard for wireless LANs. I say that because this next generation of Wi-Fi was engineered for the world we live in where everything is connected and there’s an assumption that upload and download traffic will be equivalent. Previous generations of Wi-Fi assumed more casual use and that there would be far more downloading of information than uploading. To read this article in full or to leave a comment, please click here