SDxCentral Weekly News Roundup — October 30, 2015
Verizon gets serious about IOT while Ericsson launches a 5G exchange in Europe
Verizon gets serious about IOT while Ericsson launches a 5G exchange in Europe
Please join us in congratulating the following iPexpert students who have passed their CCIE lab!
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Once only used by the likes of Google, Amazon and Facebook, many industries are now adopting NoSQL database technology for crucial business applications, replacing their relational database deployments to gain flexibility and scalability. Here are 10 enterprise use cases best addressed by NoSQL:
* Personalization. A personalized experience requires data, and lots of it – demographic, contextual, behavioral and more. The more data available, the more personalized the experience. However, relational databases are overwhelmed by the volume of data required for personalization. In contrast, a distributed NoSQL database can scale elastically to meet the most demanding workloads and build and update visitor profiles on the fly, delivering the low latency required for real-time engagement with your customers.
To read this article in full or to leave a comment, please click here
Vendors aim to prove they're ready to support a new IT paradigm.
The post Worth Reading: Rebuilding with Docker appeared first on 'net work.
Last week, our director of product marketing, Bob Noel, penned a blog post that identified the five new networking requirements being driven by IoT and Big Data. This week, we are shining the spotlight on one of the third era of IT requirements Bob highlighted – scalability. In today’s dynamic application environments, the ability to scale gracefully to be able to handle distributed applications is critical. The network must be scaled to match demand, but the challenge (and a pain point for many) is how. Traditional “scale up” techniques were about replacing outgrown processing and storage capacity with bigger boxes and migrating data onto the new platform. Now, as the environment grows, more physical devices will be connected to the network. Providers need to think beyond adding capacity through bigger pipes and consider how to support a rapidly growing number of storage and compute nodes. It can be spooky thing to consider, but at Plexxi we make scaling your network to meet Third Era demands a treat, not a trick.
Below please find a few of our top picks for our favorite news articles of the week. Happy Halloween!
Enterprise Networking Planet: Better Networking Through the API
By Arthur Cole
Continue reading
William Gibson is working at the height of his abilities in The Peripheral. Characters move back and forth between near present-day and an unusual post-apocalyptic future, and the book blends high-tech, visionary showpieces with themes of class, opportunity, and economic injustice.
The post Book Review: ‘The Peripheral’ By William Gibson appeared first on Packet Pushers.
Five characteristics for good project governance.
Hey, it's HighScalability time:
Republished from Corero DDoS Blog
It’s well known in the industry that DDoS attacks are becoming more frequent and increasingly debilitating, turning DDoS mitigation into a mission critical initiative. From the largest of carriers to small and mid-level enterprises, more and more Internet connected businesses are becoming a target of DDoS attacks. What was once a problem that only a select few dealt with is now becoming a regularly occurring burden faced by network operators.
In my daily engagements with various customers of all shapes and sizes, it’s truly interesting to see how the approach to DDoS mitigation is changing. Much of this is the result of DDoS mitigation services shifting from a “nice to have” technology to a “must-have”, essential in order to maintain business continuity and availability.
When I built DDoS mitigation and detection services for Verizon back in 2004, the intent was to offer value-add revenue producing services to offer subscribers, in an effort to build out our security offerings. For many years, this concept was one that pretty much every provider I worked with was looking into; build a service with the intent of generating new revenue opportunity from customers when traditional avenues such as Continue reading
Talari CTO and co-founder John Dickey joins Ethan Banks and Greg Ferro, along with four IT leaders from various organizations, in a sponsored podcast about real-world SD-WAN deployments and use cases.
The post Show 261: Lessons Learned From SD-WAN Deployments (Sponsored) appeared first on Packet Pushers.
Earlier this week, an article in New York Times captured the world’s imagination with the prospect of secret Russian submarines possessing the ability to sabotage undersea communication cables (with perhaps Marko Ramius at the helm, pictured above). While it is a bit of a Hollywood scenario, it is still an interesting one to consider, although, as we’ll see, perhaps an unrealistic one, despite the temptation to exaggerate the risk.
Submarine cable cuts occur with regularity and the cable repair industry has considerable experience dealing with these incidents. However, the vast majority of these failures are the result of accidents occurring in relatively shallow water, and not due to a deliberate actor intending to maximize downtime. There is enormous capacity and resiliency among the cables crossing the Atlantic (the subject of the New York Times article), so to even make a dent, a saboteur would need to take out numerous cables in short order.
A mass telecom sabotage event involving the severing of many submarine cables (perhaps at multiple hard-to-reach deep-water locations to complicate repairs) would be profoundly disruptive to international communications — Internet or otherwise. For countries like the U.S. with extensive local hosting, the impact Continue reading
Sertillanges, The Intellectual Life
The post QOTW: The Occupation of the Wise appeared first on 'net work.