Dell EMC flexes some HCI muscle at VMworld 2017

In the world of technology, August is normally a fairly quiet month, and overall it was—but not in the realm of hyper-converged infrastructure (HCI).Around mid-August, Cisco finally announced the long overdue acquisition of Springpath, indicating it sees a strong potential upside in this market. Also in August, VMware held its annual user event, VMworld, and at the event it and its closest technology partner, Dell EMC, made a significant amount of news in the area of HCI. Historically, HCI has been used for desktop virtualization, but recently the uses cases have expanded into other business critical areas. And last week, Dell EMC and VMware announced new joint solutions. To read this article in full or to leave a comment, please click here

Dell EMC flexes some HCI muscle at VMworld 2017

In the world of technology, August is normally a fairly quiet month, and overall it was—but not in the realm of hyper-converged infrastructure (HCI).Around mid-August, Cisco finally announced the long overdue acquisition of Springpath, indicating it sees a strong potential upside in this market. Also in August, VMware held its annual user event, VMworld, and at the event it and its closest technology partner, Dell EMC, made a significant amount of news in the area of HCI. Historically, HCI has been used for desktop virtualization, but recently the uses cases have expanded into other business critical areas. And last week, Dell EMC and VMware announced new joint solutions. To read this article in full or to leave a comment, please click here

Fixing, upgrading and patching IoT devices can be a real nightmare

Ensuring cybersecurity for computers and mobile phones is a huge, complex business. The ever-widening scope and unbelievable variety of threats makes keeping these devices safe from cyber criminals and malware a full-time challenge for companies, governments and individuals around the world.But at least the vast majority of those devices are easily accessible, safe in the pockets or sitting on the desktops of the very people who want to protect them. The Internet of Things (IoT) devices that need protection, on the other hand, could be almost anywhere: sitting in a remote desert, buried deep in coal mine, built into a giant truck. Or, even implanted inside the human body.To read this article in full or to leave a comment, please click here

Review: Microsoft Azure IoT Suite

The Internet of Things – a vast network of connected microdevices, sensors, and small computers generating vast amounts of data – is all around us. In fact, it's hard to find an industry that remains untouched by IoT.To read this article in full or to leave a comment, please click here(Insider Story)

Fixing, upgrading and patching IoT devices can be a real nightmare

Ensuring cybersecurity for computers and mobile phones is a huge, complex business. The ever-widening scope and unbelievable variety of threats makes keeping these devices safe from cyber criminals and malware a full-time challenge for companies, governments and individuals around the world.But at least the vast majority of those devices are easily accessible, safe in the pockets or sitting on the desktops of the very people who want to protect them. The Internet of Things (IoT) devices that need protection, on the other hand, could be almost anywhere: sitting in a remote desert, buried deep in coal mine, built into a giant truck. Or, even implanted inside the human body.To read this article in full or to leave a comment, please click here

Secure Multi-Tenancy at Scale with Docker Enterprise Edition

With the latest release of Docker Enterprise Edition (EE), enterprise organizations are able to extend the benefits of containers across their entire application portfolio. Docker EE enables rapid modernization of traditional Windows and Linux applications as well as Linux applications running on IBM Z mainframes. By addressing all of these applications, Docker EE provides the opportunity to standardize around a common packaging format for greater portability, agility, and with an additional layer of security, resulting in more teams bringing their workloads into Docker EE.

The key to operating this diverse environment is to have a way to secure and isolate the applications and the multiple teams who build, ship, and deploy them. This release of Docker Enterprise Edition makes it possible for organizations to modernize traditional applications of every variety and to do so in a secure manner that aligns to complex organizational needs.

Building a Secure Software Supply Chain for Windows Applications

 

Windows applications make up about half of all enterprise applications. Docker has been working closely with Microsoft to ensure that the same security benefits that are available to Linux containers are also available to Windows Server containers. When Windows containers are managed with Docker EE, organizations Continue reading

The Prospects For A Leaner And Meaner HPE

The era of Hewlett Packard Enterprise’s envious – and expensive – desire to become IT software and services behemoth like the IBM of the 1990s and 2000s is coming to a close.

The company has finalized its spinout-merger of substantially all of its software assets to Micro Focus. HPE has already spun out the lion’s share of its outsourcing and consulting businesses to Computer Sciences and even earlier had split from its troublesome PC and very profitable printer businesses. These were spun out together to give the combined HP Inc a chance to live on Wall Street and because PCs

The Prospects For A Leaner And Meaner HPE was written by Timothy Prickett Morgan at The Next Platform.

25 Under 25: Using the Internet to Make a Difference in Communities

On September 18th in Los Angeles, California, the Internet Society will celebrate a selected group of exceptional young people under the age of 25 who are using the Internet to make a difference in peoples’ lives.

I had the privilege of reading hundreds of submissions and nominations, many of which left me feeling humbled and inspired. The incredible impact these individuals have already had in such a short time is a model for youth around the world and for those of us who already have some years of experience!

Toral Cowieson

On the ‘web: What’s Wrong with BGP

Our guests are Russ White, a network architect at LinkedIn; and Sue Hares, a consultant and chair of the Inter-Domain Routing Working Group at the IETF. They discuss the history of BGP, the original problems it was intended to solve, and what might change. This is an informed and wide-ranging conversation that also covers whitebox, software quality, and more. Thanks to Huawei, which covered travel and accommodations to enable the Packet Pushers to attend IETF 99 and record some shows to spread the news about IETF projects and initiatives.

You can jump to the original post on Packet Pushers here.

The post On the ‘web: What’s Wrong with BGP appeared first on rule 11 reader.

Finding an Efficient VNF Architecture for Next-Generation Telecom Infrastructure

Efficient VNF Architecture Download the HPE White Paper, “”. Global IP traffic expected to triple over the next five years, driven by large-scale mobility, the rise of the Internet of Things (IoT), emerging applications like 4K video and virtual/augmented reality, and smart everything, from connected cars to connected waste-management systems for cities. Telecom providers are facing a broken... Read more →