by Nick Lippis On August 17th, Cisco reported that revenue fell for a seventh straight quarter. IBM has experienced revenue decline for the past 21 quarters. HP has been broken into multiple businesses. Dell was brought private after it acquired EMC and VMware. All the while, Amazon, Google, and Microsoft’s cloud businesses have grown stronger and collectively invested $31.5 billion in 2016 on capital expenses and leases, up 22% from 2015. Bridges are being built to extend enterprise private cloud infrastructure to public thanks to…
Public cloud providers like Amazon, Microsoft and Google may be destined to dominate the corporate IT world, but their final conquest is a long, long way off.
SD-WAN is the application of SDN principles to the WAN. SDN provided for the separation of the control plane from the data plane, with…
Cloud architectures allow automated, on-demand delivery of applications and services, flexibly deployed across large, cost-effective resource pools…
by Steven Shalita Organizations are looking for ways to scale-out their data center network to meet the increasing demands of the business. The digital enterprise, fueled by new applications, hyper-growth of the Cloud, and adoption of hybrid IT are all driving dramatic change. In order for organizations to fully realize the potential of technology, they are looking to modernize their network and leverage the Cloud for increased agility, speed and consistency. This means new approaches and capabilities are required. Ideally, all aspects of a data…
by Mukesh Gupta When ONUG SDSS (Software Defined Security Services) working group brought together IT executives from large enterprises including Bank of America, Barclays, Cigna, Salesforce, Tesla, Visa, Wells Fargo, etc., they prioritized the following two security use cases to the top of their list:
by Derick Winkworth Software Defined Networking has passed through its first major cycle. Many associated ideas have been consigned to the trash bin of history, while many other ideas have either evolved or sprung anew. As a network engineer I really hoped, back in 2011, that SDN would address many of my day-to-day challenges. With very few exceptions, this did not happen. In fact, within the SDN movement there was open disregard for network engineers. They were often referred to as the “mainframe” engineers of…
by Brighten Godfrey At the ONUG Fall 2016 conference in New York, one theme struck me: the community realized more than ever the need for advanced analytics and verification. A poll of IT users at the event, for example, highlighted that the siloed nature of current monitoring solutions prevents them from understanding the entire network, end-to-end.
by Brandon Heller Sharp network admins already verify the network in a variety of ways, right? Pings, traceroutes, and custom scripts verify expected connectivity. Link and CPU utilization monitoring programs verify normal operation. Maybe pushed configs are read back in to verify that the device accepted them. And isn’t verification just another term for testing, anyway?
by Bruno Germain At the root of John Boyd’s “OODA loop” methodology, there is the notion that we need to acknowledge and work with levels of “uncertainty”—gaps that result when applying established models to new and changing contexts[i]. Unfortunately, the networking community—desperate for operational stability—largely ignores these mismatches, designing network and security architectures as if they can dictate how applications are deployed.