Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.
Big data is the hot buzzword in security analytics today, but buyers are skeptical because many companies have spent years building “data lakes” only to discover it was impossible to “drain the lake” to get something useful.
And unfortunately, today’s solutions often include expensive clusters coupled with static business intelligence reports and “sexy” dashboards that look good but add little to useful and productive security analytics. Focusing on the analytics and how to use the data (very valuable data) in order to make real time decisions, discover critical patterns, determine on-going and changing security policies and dramatically improve security – ah – that’s useful.
To read this article in full or to leave a comment, please click here
Network Break 71 covers new funding rounds for Big Switch Networks, Cumulus, and Plexxi, as well as Cisco's investment in SD-WAN startup VeloCloud. We also check in on product announcements from Dell and Arista Networks, and discuss potential security issues with medical devices.
The post Network Break 71: Network Startups Get Millions; Medical Device Insecurity appeared first on Packet Pushers.
Network Break 71 covers new funding rounds for Big Switch Networks, Cumulus, and Plexxi, as well as Cisco's investment in SD-WAN startup VeloCloud. We also check in on product announcements from Dell and Arista Networks, and discuss potential security issues with medical devices.
The post Network Break 71: Network Startups Get Millions; Medical Device Insecurity appeared first on Packet Pushers.
The IT Storage market is going through a lot of change. New silicon designs from Intel & Micron branded 3D Xpoint are impacting the short term future of the “all flash array” market. Intel has developed NVMe so that that speed of accessing this fancy new storage can be realised because the 30-year old SCSI/NFS/Fibrechannel protocols […]
The post Talking NVMe, 3DXpoint and Networking appeared first on EtherealMind.
Ivan posted here: I’ll take ownership of the statement because at least it sounds like something I have discussed on the podcast and, sadly, because there aren’t that many networking podcasts. The comment is in relation to the purpose of a stateful firewall when compared to a stateless firewall aka access lists. I do think that […]
The post Response: Doing No Harm appeared first on EtherealMind.

This is a guest post by Benjamin Manes, who did engineery things for Google and is now doing engineery things for a new load documentation startup, LoadDocs.
Caching is a common approach for improving performance, yet most implementations use strictly classical techniques. In this article we will explore the modern methods used by Caffeine, an open-source Java caching library, that yield high hit rates and excellent concurrency. These ideas can be translated to your favorite language and hopefully some readers will be inspired to do just that.
A cache’s eviction policy tries to predict which entries are most likely to be used again in the near future, thereby maximizing the hit ratio. The Least Recently Used (LRU) policy is perhaps the most popular due to its simplicity, good runtime performance, and a decent hit rate in common workloads. Its ability to predict the future is limited to the history of the entries residing in the cache, preferring to give the last access the highest priority by guessing that it is the most likely to be reused again soon...
Multiple hierarchies will transform the RAN topology.

The post Worth Reading: Light at the end of the silicon appeared first on 'net work.
Take the Programmable Network Survey and enter to win one of three $300 Amazon Gift Cards.