Gartner: Worldwide IT spending to reach $4.5T in 2022

Research firm Gartner forecasts IT spending will reach nearly $4.5 trillion worldwide this year, with enterprise software, IT services, and data center systems leading the way. The projected $4.45 trillion in spending this year represents an increase of 5.1% compared with 2021.The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is. Read more: Gartner's top infrastructure and operations trends for 2022To read this article in full, please click here

Where have all the global network aggregators gone?

One of the key selling points of SD-WAN is the ability to use a variety of network transport options. Enterprises can select MPLS, dedicated Internet access, business broadband, or wireless broadband, for example – whatever makes the most sense, technically and economically, for each site that needs connectivity. Cultivating a mix of suppliers can allow enterprises to significantly reduce transport costs as well as improve the flexibility of their networks.The growth in SD-WAN deployments over the last four or five years created a sweet spot for Internet transport aggregators, which, frankly, had struggled to break into the enterprise market when it was dominated by traditional MPLS providers.To read this article in full, please click here

Gartner: Worldwide IT spending to reach $4.5T in 2022

Research firm Gartner forecasts IT spending will reach nearly $4.5 trillion worldwide this year, with enterprise software, IT services, and data center systems leading the way. The projected $4.45 trillion in spending this year represents an increase of 5.1% compared with 2021.The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is. Read more: Gartner's top infrastructure and operations trends for 2022To read this article in full, please click here

Introducing our exciting new ambassador program: Calico Big Cats

The Project Calico community is one of the most collaborative and supportive communities in the open-source space. Our community has shown great engagement through the years, which has helped us maintain and grow the project.

Thanks to our 200+ contributors from all over the world, Calico Open Source (the solution born out of the project) is powering 1.5M+ nodes daily across 166 countries. Our engineering team is committed to maintaining Calico Open Source as the leading standard for container and Kubernetes networking and security!

Given our community’s passion for Project Calico, we wanted to give its members a chance to inspire others by telling their stories. To this end, we are very excited to announce our new Calico Big Cats ambassador program!

What is Calico Big Cats?

Calico Big Cats is an ambassador program that provides a platform for our community to talk about their experiences with Calico. The goal is to help community members connect, inspire, and share common challenges and ways to overcome these challenges using Calico and other tools.

Why join Calico Big Cats?

If you have experience with Project Calico, recognize its value in the open-source networking and security domain, and are passionate about sharing Continue reading

SSH over bluetooth – cleanly

In my previous two posts I set up a login prompt on a bluetooth serial port and then switched to running SSH on it.

I explicitly did not set up an IP network over bluetooth as I want to minimize the number of configurations (e.g. IP address) and increase the chance of it working when needed.

E.g. firewall misconfiguration or Linux’s various “clever” network managers that tend to wipe out network interface configs would have more of a shared fate with the primary access method (SSH over normal network).

This post is about how to accomplish this more properly.

The problems now being solved are:

  • It wasn’t entirely reliable. The rfcomm tool is pretty buggy.

  • There was no authentication of the Bluetooth channel. Not as much a problem when doing SSH, but if there are passwords then there could be a man-in-the-middle attack.

  • The server side had to remain discoverable forever. So anyone who scans for nearby bluetooth devices would see your servers, and would be able to connect, possibly brute forcing passwords. Not as much of a problem if running SSH with password authentication turned off, but why broadcast the name of a server if you don’t Continue reading

No, a researcher didn’t find Olympics app spying on you

For the Beijing 2022 Winter Olympics, the Chinese government requires everyone to download an app onto their phone. It has many security/privacy concerns, as CitizenLab documents. However, another researcher goes further, claiming his analysis proves the app is recording all audio all the time. His analysis is fraudulent. He shows a lot of technical content that looks plausible, but nowhere does he show anything that substantiates his claims.

Average techies may not be able to see this. It all looks technical. Therefore, I thought I'd describe one example of the problems with this data -- something the average techie can recognize.

His "evidence" consists screenshots from reverse-engineering tools, with red arrows pointing to the suspicious bits. An example of one of these screenshots is this on:


This screenshot is that of a reverse-engineering tool (Hopper, I think) that takes code and "disassembles" it. When you dump something into a reverse-engineering tool, it'll make a few assumptions about what it sees. These assumptions are usually wrong. There's a process where the human user looks at the analyzed output, does a "sniff-test" on whether it looks reasonable, and works with the tool until it gets the assumptions correct.

That's the red flag Continue reading

Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)

Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is Aviatrix, which provides multi-cloud networking software for public clouds.

The post Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored) appeared first on Packet Pushers.

Network Break 367: New Custom ASICs For Juniper Routers; Regulators, NVIDIA Arm Wrestle

This week's Network Break looks at new router silicon from Juniper, why NVIDIA's acquisition bid for Arm is running into headwinds, a new LiveAction service that inspects encrypted traffic for threats, financial results from Juniper and Extreme, and more tech news.

The post Network Break 367: New Custom ASICs For Juniper Routers; Regulators, NVIDIA Arm Wrestle appeared first on Packet Pushers.

China finally green lights AMD–Xilinx merger

AMD has been given the green light by the Chinese government to acquire FPGA giant Xilinx. No formal announcement has been made, but eagle-eyed writers spotted the detail in an 8-K filing with the U.S. Securities and Exchange Commission.The deal was first announced in October 2020. The U.S. and EU have already approved the acquisition, but in late December, AMD said it had to delay closing as China's regulators slow-walked the deal. Then came the filing this week:To read this article in full, please click here

China finally green lights AMD–Xilinx merger

AMD has been given the green light by the Chinese government to acquire FPGA giant Xilinx. No formal announcement has been made, but eagle-eyed writers spotted the detail in an 8-K filing with the U.S. Securities and Exchange Commission.The deal was first announced in October 2020. The U.S. and EU have already approved the acquisition, but in late December, AMD said it had to delay closing as China's regulators slow-walked the deal. Then came the filing this week:To read this article in full, please click here

China finally green lights AMD/Xilinx merger

AMD has been given the green light by the Chinese government to acquire FPGA giant Xilinx. No formal announcement has been made, but eagle-eyed writers spotted the detail in an 8-K filing with the U.S. Securities and Exchange Commission.The deal was first announced in October 2020. The U.S. and EU have already approved the acquisition, but in late December, AMD said it had to delay closing as China's regulators slow-walked the deal. Then came the filing this week:To read this article in full, please click here