This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
More than a third of businesses in the United States currently use the cloud, but by 2020 that number is expected to more than double to a whopping 80%. But even though the cloud is secure, it doesn’t guarantee immunity from data breaches. Now that the cloud is rapidly becoming a mainstream part of IT, businesses must think more critically about how to bolster their security beyond cloud providers’ default security infrastructure—which often proves to be inadequate for the changing face of business.
To read this article in full or to leave a comment, please click here
Proven by telcos, it works for enterprises as well.
This week, we announced that Perseus selected Plexxi to deploy a next-generation network system to expand its service operations into 11 new major Asian markets and offer new services between 29 sites across the globe. By using our solutions, Perseus is able to supply low latency point-to-point and multipoint Ethernet services as well as global market data distribution in all of the world’s key emerging markets and financial liquidity centers.
Perseus came to us looking for a vendor to help improve its network’s geographic scale, simplicity, agility and service offering capabilities. Through Plexxi’s technology, the company found ways to reduce its network’s operational overhead, intense manual labor and complexity, while at the same time increasing and improving service delivery options for its customers. We’re proud that we were able to help Perseus find a solution that accommodated their requirements of today as well as those of the future. Interested in learning more about how we’re working together? Take a look at this blog post from our CEO Rich Napolitano.
Below please find a few of our top picks for our favorite news articles of the week.
Light Reading: Perseus Builds 75,000-Mile Global SDN Network
By Mitch Wagner
Perseus is deploying Continue reading
Try saying that five times fast.
There’s a concept called idempotency which can be loosely explained as
Make sure it’s like this. If it’s not like this, make it like this. If it’s already like this. Don’t do anything
Essentially, it’s a way to declare the desired configuration state of whatever it is you’re trying to configure. If the configuration state of that server, or switch or router is already in that state, than just leave it alone.
It’s a way to ensure that configuration drift doesn’t happen.
So if there’s some rabbid network administrator with a console cable running around laughing maniacly as they randomly changes things… this will help you keep them in check.
So we’re going to look at the last example here where we did the following:
You know the drill here, Continue reading
The post Worth Reading: The myth of in-memory computing appeared first on 'net work.
Address east-west security by adopting and operationalizing micro-segmentation.
The story is evolving as NFV reaches real-world deployment.
Define Footgun
The post Network Dictionary: Footgun appeared first on EtherealMind.