IDG Contributor Network: Why web-scale is the future

While you may associate web-scale networking with cloud giants like Facebook, Google, and Amazon, it’s not just an architecture for the large scale enterprises anymore. The industry has looked at data centers like theirs and asked the question: “What are they doing that we can mimic at a smaller scale?” Through analysis of the way these organizations ran, the term “web-scale” was born, referring specifically to the hyperscale website companies that have built private, efficient, and scalable cloud environments. Since then, it’s become a growing model for organizations to adopt in their journey toward evolving for the future.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why web-scale is the future

While you may associate web-scale networking with cloud giants like Facebook, Google, and Amazon, it’s not just an architecture for the large scale enterprises anymore. The industry has looked at data centers like theirs and asked the question: “What are they doing that we can mimic at a smaller scale?” Through analysis of the way these organizations ran, the term “web-scale” was born, referring specifically to the hyperscale website companies that have built private, efficient, and scalable cloud environments. Since then, it’s become a growing model for organizations to adopt in their journey toward evolving for the future.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Chaos in the enterprise: Managing IoT services across edge and cloud

Over recent years, the Internet of Things (IoT) has been a huge growth market. From consumer gadgets and wearables to connected cars and smart home devices, the proliferation has been rapid, and IHS predicts that the number of IoT devices globally will reach 30.7 billion by 2020 and 75.4 billion by 2025.IoT is also beginning to touch all aspects of the enterprise. This will only fuel its growth as industry sectors from healthcare to manufacturing become more dependent on IoT communications to drive business processes and missions critical systems.IoT is a key driver of the digital transformation (DX) that is taking place across industry sectors. As the demand for new digital and IoT services continues to grow, close monitoring and management of this transformation will be crucial ensure its success. The rise of IoT has been rapid and will continue to gather pace, to the point where we will soon see entirely new IT infrastructure emerge to support IoT applications and critical systems, spanning the edge, core, and cloud of the service delivery infrastructure.To read this article in full or to leave a comment, please click here

NSX Load Balancing – Accelerated Layer 4 Virtual Servers

In the previous blog, we investigated the basic feature set of NSX Load Balancing, some of the business reasons to use it, and deployed an ESG (Edge Services Gateway), the NSX load balancing platform.  Today, we are going to setup our first virtual server.  When we look at load balancing, it operates at the Transport layer or above of the OSI model and is inclusive of the network layer.  In the most basic of terms, Load Balancing looks at a “session” from the transport layer and applies a load balancing algorithm and a NAT policy to the traffic. I put “session” in quotes because we can load balance both TCP and UDP based applications, but UDP does not have a stateful session, but we can still load balance UDP services.

Whenever someone has stated that and given application cannot be load balanced, I first ask them if the traffic can be processed by a NAT at either the client or server end. If the answer is yes, odds are that it can be load balanced with sufficient understanding of the application and the required ports, protocols and persistence to make the application function correctly. This is Continue reading

Open19: A New Step for Data Centers

While most network engineers do not spend a lot of time thinking about environmentals, like power and cooling, physical space problems are actually one of the major hurdles to building truly large scale data centers. Consider this: a typical 1ru rack mount router weighs in at around 30 pounds, including the power supplies. Centralizing rack power, and removing the sheet metal, can probably reduce this by about 25% (if not more). By extension, centralizing power and removing the sheet metal from an entire data center’s worth of equipment could reduce the weight on the floor by about 10-15%—or rather, allow about 10-15% more equipment to be stacked into the same physical space. Cooling, cabling, and other considerations are similar—even paying for the sheet metal around each box to be formed and shipped adds costs.

What about blade mount systems? Most of these are designed for rather specialized environments, or they are designed for a single vendor’s blades. In the routing space, most of these solutions are actually chassis based systems, which are fraught with problems in large scale data center buildouts. The solution? Some form of open, foundation based standard that can be used by all vendors to build equipment Continue reading

Online meetup recap: Introduction to LinuxKit

At DockerCon 2017 we introduced LinuxKit: A toolkit for building secure, lean and portable Linux subsystems. Here are the key principles and motivations behind the project:

  • Secure defaults without compromising usability
  • Everything is replaceable and customizable
  • Immutable infrastructure applied to building Linux distributions
  • Completely stateless, but persistent storage can be attached
  • Easy tooling, with easy iteration
  • Built with containers, for running containers
  • Designed for building and running clustered applications, including but not limited to container orchestration such as Docker or Kubernetes
  • Designed from the experience of building Docker Editions, but redesigned as a general-purpose toolkit
  • Designed to be managed by external tooling, such as Infrakit or similar tools
  • Includes a set of longer-term collaborative projects in various stages of development to innovate on kernel and userspace changes, particularly around security

For this Online Meetup, Docker Technical Staff member Rolf Neugebauer gave an introduction to LinuxKit, explained the rationale behind its development and gave a demo on how to get started using it.

LinuxKit

Watch the recording and slides

You’ll find below a list of additional questions asked by attendees at the end of the online meetups:

You said the ONBOOT containers are run sequentially, does it wait for one to finish before it Continue reading

US defense contractor stored intelligence data on Amazon server without a password

About 28GB of sensitive US intelligence data was discovered on a publicly-accessible Amazon Web Services’ S3 storage bucket. The cache, containing over 60,000 files, was linked to defense and intelligence contractor Booz Allen Hamilton, which was working on a project for the US National Geospatial-Intelligence Agency (NGA). NGA provides satellite and drone surveillance imagery for the Department of Defense and the US intelligence community.The unsecured data was discovered by Chris Vickery, who now works as a cyber risk analyst for the security firm UpGuard.According to UpGuard, the “information that would ordinarily require a Top Secret-level security clearance from the DoD was accessible to anyone looking in the right place; no hacking was required to gain credentials needed for potentially accessing materials of a high classification level.”To read this article in full or to leave a comment, please click here

US defense contractor stored intelligence data on Amazon server without a password

About 28GB of sensitive US intelligence data was discovered on a publicly-accessible Amazon Web Services’ S3 storage bucket. The cache, containing over 60,000 files, was linked to defense and intelligence contractor Booz Allen Hamilton, which was working on a project for the US National Geospatial-Intelligence Agency (NGA). NGA provides satellite and drone surveillance imagery for the Department of Defense and the US intelligence community.The unsecured data was discovered by Chris Vickery, who now works as a cyber risk analyst for the security firm UpGuard.According to UpGuard, the “information that would ordinarily require a Top Secret-level security clearance from the DoD was accessible to anyone looking in the right place; no hacking was required to gain credentials needed for potentially accessing materials of a high classification level.”To read this article in full or to leave a comment, please click here

Capacity Planner Version 2.0 Released

Modern Wi-Fi networks are complex beasts. Despite all the fancy new features in products, the technology is only becoming more complex and the demands on the network are only growing. Wi-Fi is the most heavily used method to transport user data today, eclipsing cellular and LAN traffic volumes according to multiple reports from analysis firms including Cisco, Ofcom, Mobidia, Ovum, and others. Meanwhile, the technical complexity contained within the IEEE 802.11 standard results in a technical document that is over 3,200 pages long!  This means deploying a network right is no easy task.

One of the most difficult aspects to get right when deploying a Wi-Fi network is understanding capacity requirements. It is not sufficient enough to use rule-of-thumb guidelines based on number of clients per access point or number of access points per square foot/meter since they often result in networks that do not adequately meet actual end-user demands and perform poorly. More rigor is required while maintaining simplicity of use so that most network administrators can be confident of a successful outcome.

Essential to wireless network performance and capacity planning is understanding the interaction between access point capabilities, network configuration, client device capabilities, and the RF Continue reading

Tempered Networks makes it HIP to connect the unconnectable

IP networks were originally designed to be fairly simple. There’s a source and a destination address, and the network devices use this information to perform some fancy calculations—and magically, things connect. But as the internet has grown and more endpoints have been connected, networking has become a black magic. Since it’s impossible to give every device its own unique IP address, the clever folks at networking companies came up with an assortment of workarounds, such as being able to NAT (network address translation) non-routable, private addresses. And as we’ve added more dynamic environments, such as private and public cloud, defining policy based on addresses or ranges has become unsustainable. To read this article in full or to leave a comment, please click here

Tempered Networks makes it HIP to connect the unconnectable

IP networks were originally designed to be fairly simple. There’s a source and a destination address, and the network devices use this information to perform some fancy calculations—and magically, things connect. But as the internet has grown and more endpoints have been connected, networking has become a black magic. Since it’s impossible to give every device its own unique IP address, the clever folks at networking companies came up with an assortment of workarounds, such as being able to NAT (network address translation) non-routable, private addresses. And as we’ve added more dynamic environments, such as private and public cloud, defining policy based on addresses or ranges has become unsustainable. To read this article in full or to leave a comment, please click here

$10 off TP-Link AC1200 Wi-Fi Range Extender Powerline Edition – Deal Alert

The AC1200 is a wifi range extender that transmits its signal through your home wiring via your wall outlets, so walls and floors won't slow it down. Game online and watch HD movies in any room. The powerline adapter is simple to use -- it sets up in minutes, plugs into any power outlet, works with all routers, and up to 16 can be added to the same network, making it easy to expand your Wi-Fi across your home. Right now the price on this highly rated wifi extender will be reduced $10 to $99.99 in your shopping cart when you "clip" a special coupon.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

$10 off TP-Link AC1200 Wi-Fi Range Extender Powerline Edition – Deal Alert

The AC1200 is a wifi range extender that transmits its signal through your home wiring via your wall outlets, so walls and floors won't slow it down. Game online and watch HD movies in any room. The powerline adapter is simple to use -- it sets up in minutes, plugs into any power outlet, works with all routers, and up to 16 can be added to the same network, making it easy to expand your Wi-Fi across your home. Right now the price on this highly rated wifi extender will be reduced $10 to $99.99 in your shopping cart when you "clip" a special coupon.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here