A Few Points About VMware EVO SDDC Networking

A Packet Pushers listener that heard us chatting about VMware's EVO SDDC solution raised a few concerns about the networking functionality in the current version of EVO SDDC. I was able to talk briefly with Krish Sivakumar, Director of Product Marketing, EVO SDDC & Ven Immani, Senior Technical Marketing Engineer, EVO SDDC at VMware to help clarify some of the issues.

Gartner: IT should simplify security to fight inescapable hackers

ORLANDO -- On some level it may seem incongruous to many IT organizations but as security challenges mount, enterprises should take a look at their protection systems and look to simplify them -- not make the more complicated -- to battle hackers.+More on Network World: Gartner: Get onboard the algorithm train!+The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk management approach is falling behind, said Peter Sondergaard senior vice president of research withGartner at the consultancy’s Symposium/IT Expo this week.To read this article in full or to leave a comment, please click here

1 More Reason To Be Wary of Sky High Drones (See Video)

Even wireless LANs located many stories from the ground in skyscraper offices might not be safe from hackers -- if the hackers are armed with drones. So say researchers in Singapore, a country where skyscrapers are plentiful.In this video, researchers from iTrust, a Center for Research in Cyber Security at the Singapore University of Technology And Design, show how attackers could infiltrate a wireless printer using a personal drone and an Android phone outfitted with a special app.MORE: New super-precise drones could win over wireless carriersTo read this article in full or to leave a comment, please click here

IDG Contributor Network: More data breaches caused by lost devices than malware or hacking, Trend Micro says

Prices are dropping for Personally Identifiable Information (PII) on the Dark Web. One likely reason is a surplus of the data; cybercriminals have been too successful gathering the stuff. Criminals can now purchase PII for $1 a line — that's down from $4 just a year ago, Trend Micro reported in its new research paper. Each line contains a name, a full address, a date of birth, a Social Security number, and other information. Criminals only need a few lines to clone an identity.Studying stolen data Trend Micro analyzed a decade's worth of data breach information in its new report, "Follow the Data, Dissecting Data Breaches and Debunking the Myths' (PDF).To read this article in full or to leave a comment, please click here

AT&T adds Juniper SDN controller

AT&T has added Juniper Networks’ controller to its SDN. Juniper’s Contrail controller will provide SDN control of AT&T’s Integrated Cloud infrastructure.AT&T will use Contrail to help automate and virtualize the network for deployment of new services. AT&T is also using Brocade’s Vyatta controller in its Network on Demand service.Juniper says Contrail is based on its Open Contrail open source software, and allows AT&T to incorporate new capabilities into its network while decreasing development time and cost.To read this article in full or to leave a comment, please click here

Gartner: Get onboard the algorithm train!

ORLANDO -- Algorithms are hot and will be a major driver in the future of IT and business. That was the driving thought from the opening keynote session at this week’s Gartner Symposium/IT Expo.In five years 1 million new devices will come online every hour and these devices will create billions of new relationships. These relationships are not driven solely by data but algorithms, said Peter Sondergaard senior vice president of research withGartner.+More on Network World: Gartner: Top 10 Technology Trends for 2015 IT can’t ignore+To read this article in full or to leave a comment, please click here

Network Design Best Practices – Simplicity

Network Design should be simple.Simplicity is the first of the network design best practices which I want you to remember. If you are in the field for enough time, you probably heard the KISS principle. If you are a good follower of my blog , you maybe heard SUCK principle as well. KISS stands for… Read More »

The post Network Design Best Practices – Simplicity appeared first on Network Design and Architecture.

Your Load Generator is Probably Lying to You – Take the Red Pill and Find Out Why

Pretty much all your load generation and monitoring tools do not work correctly. Those charts you thought were full of relevant information about how your system is performing are really just telling you a lie. Your sensory inputs are being jammed. 

To find out how listen to the Morpheous of performance monitoring Gil Tene, CTO and co-founder at Azul Systems, makers of truly high performance JVMs, in a mesmerizing talk on How NOT to Measure Latency.

This talk is about removing the wool from your eyes. It's the red pill option for what you thought you were testing with load generators.

Some highlights:

  • If you want to hide the truth from someone show them a chart of all normal traffic with one just one bad spike surging into 95 percentile territory. 

  • The number one indicator you should never get rid of is the maximum value. That’s not noise, it’s the signal, the rest is noise.

  • 99% of users experience ~99.995%’ile response times, so why are you even looking at 95%'ile numbers?

  • Monitoring tools routinely drop important samples in the result set, leading you to draw really bad conclusions about the quality of the performance of Continue reading