Trend: Colocation facilities provide tools to manage data center infrastructure

Enterprises understand the advantages of colocation, but they also know that entrusting mission-critical infrastructure to third-party data centers means giving up some control over their servers.Data center Infrastructure Management (DCIM) tools can provide colocation customers with transparency into their data center's operations, to verify that providers are fulfilling the terms of their Service Level Agreements. A DCIM platform gives customers a "single pane of glass" to view the status of their IT infrastructure."Today, more colocation providers are offering their customers access to DCIM portals," explains Rhonda Ascierto, Research Director for Data centers and Critical Infrastructure at 451 Research. "Customers want to see how well a colocation facility is operating, not just rely on the SLA. A DCIM tool gives the customer visibility into data center operations, and assurance that the colocation provider is meeting their obligations."To read this article in full or to leave a comment, please click here

Trend: Colocation facilities provide tools to manage data center infrastructure

Enterprises understand the advantages of colocation, but they also know that entrusting mission-critical infrastructure to third-party data centers means giving up some control over their servers.Data center Infrastructure Management (DCIM) tools can provide colocation customers with transparency into their data center's operations, to verify that providers are fulfilling the terms of their Service Level Agreements. A DCIM platform gives customers a "single pane of glass" to view the status of their IT infrastructure."Today, more colocation providers are offering their customers access to DCIM portals," explains Rhonda Ascierto, Research Director for Data centers and Critical Infrastructure at 451 Research. "Customers want to see how well a colocation facility is operating, not just rely on the SLA. A DCIM tool gives the customer visibility into data center operations, and assurance that the colocation provider is meeting their obligations."To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:VPNs are good for your privacy and securityOpen wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.To read this article in full or to leave a comment, please click here

Casing The HPC Market Is Hard, And Getting Harder

Markets are always changing. Sometimes information technology is replaced by a new thing, and sometimes it morphs from one thing to another so gradually that is just becomes computing or networking or storage as we know it. For instance, in the broadest sense, all infrastructure will be cloudy, even if it is bare metal machines or those using containers or heavier server virtualization. In a similar way, in the future all high performance computing may largely be a kind of artificial intelligence, bearing little resemblance to the crunch-heavy simulations we are used to.

It has taken two decades for cloud

Casing The HPC Market Is Hard, And Getting Harder was written by Timothy Prickett Morgan at The Next Platform.

Subscription Defined Networking

Cisco’s big announcement this week ahead of Cisco Live was their new Intent-based Networking push. This new portfolio does include new switching platforms in the guise of the Catalyst 9000 series, but the majority of the innovation is coming in the software layer. Articles released so far tout the ability of the network to sense context, provide additional security based on advanced heuristics, and more. But the one thing that seems to be getting little publicity is the way you’re going to be paying for software going forward.

The Bottom Line

Cisco licensing has always been an all-or-nothing affair for the most part. You buy a switch and you have two options – basic L2 switching or everything the switch supports. Routers are similar. Through the early 15.x releases, Cisco routers could be loaded with an advanced image that ran every service imaginable. Those early 15.x releases gave us some attempts at role-based licensing for packet, voice, and security device routers. However, those efforts were rolled back due to customer response.

Shockingly, voice licensing has been the most progressive part of Cisco’s licensing model for a while now. CallManager 4.x didn’t even bother. Hook things up and Continue reading

Juniper Routers Sample BGP Configurations : Quick and Easy

As in my earlier post i wrote about the basic configurations on Cisco Router where i define configurations on Route Reflector, Confederation, Route-Maps, Prefix Lists, Local Preference, AS-Path, MED, Communities and Peer groups.

In this article I am just going to put Juniper router basics BGP configurations. In the later articles I will cover all the configurations like Route Reflector, Confederation, Route-Maps, Prefix Lists, Local Preference, AS-Path, MED, Communities and Peer groups on juniper and Huawei routers.

Below is the basic network topology with configuration as below

Fig 1.1- Juniper Router BGP Topology
Here in the above shown topology, we have Router A, Router B, Router C, Router D and Router E. Router A, B and C are in the AS 22 while Router D is in AS 79 and Router E is in AS 17

Configure the interfaces to Peers A, B, C, and D
Router_NB# set ge-1/2/0 unit 0 description to-A
Router_NB# set ge-1/2/0 unit 0 family inet address 10.10.10.1/30
Router_NB# set ge-0/0/1 unit 5 description to-B
Router_NB# set ge-0/0/1 unit 5 family inet address 10.10.10.5/30
Router_NB# set ge-0/1/0 unit 9 description to-C
Router_NB# set ge-0/1/0 unit 9 family inet address Continue reading

Data center startup offers compute colo at cell towers

Vapor IO, an Austin-based data center technology startup, is launching a rather interesting collocation business by offering leased data center capacity at cellular network towers. The company’s argument is that it should offer compute and network capabilities together for maximum edge computing.The service, called Project Volutus, includes everything from site selection to rack space, power, connectivity, infrastructure management software, and remote hands. The company believes that the need for edge computing capacity will increase as things like IoT, connected and autonomous cars, augmented and virtual reality, and 5G wireless come to market and start scaling.To read this article in full or to leave a comment, please click here

Data center startup offers compute colo at cell towers

Vapor IO, an Austin-based data center technology startup, is launching a rather interesting collocation business by offering leased data center capacity at cellular network towers. The company’s argument is that it should offer compute and network capabilities together for maximum edge computing.The service, called Project Volutus, includes everything from site selection to rack space, power, connectivity, infrastructure management software, and remote hands. The company believes that the need for edge computing capacity will increase as things like IoT, connected and autonomous cars, augmented and virtual reality, and 5G wireless come to market and start scaling.To read this article in full or to leave a comment, please click here

Viewing Linux output in columns

The Linux column command makes it easy to display data in a columnar format -- often making it easier to view, digest, or incorporate into a report. While column is a command that's simple to use, it has some very useful options that are worth considering. In the examples in this post, you will get a feel for how the command works and how you can get it to format data in the most useful ways.By default, the column command will ignore blanks lines in the input data. When displaying data in multiple columns, it will organize the content by filling the left column first and then moving to the right. For example, a file containing numbers 1 to 12 might be displayed in this order:To read this article in full or to leave a comment, please click here

Viewing Linux output in columns

The Linux column command makes it easy to display data in a columnar format -- often making it easier to view, digest, or incorporate into a report. While column is a command that's simple to use, it has some very useful options that are worth considering. In the examples in this post, you will get a feel for how the command works and how you can get it to format data in the most useful ways.By default, the column command will ignore blanks lines in the input data. When displaying data in multiple columns, it will organize the content by filling the left column first and then moving to the right. For example, a file containing numbers 1 to 12 might be displayed in this order:To read this article in full or to leave a comment, please click here