Network Virtualization

Subscribe to Network Virtualization: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Network Virtualization: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Network Virtualization
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to incl...
The cloud ushered in a fundamental change in the way applications are deployed. Instead of worrying about how much dedicated hardware to order for your data center, you simply spin up as many servers as you need to do the job, then decommission them once the job is done. Yet, you still...
Put yourself in the shoes of Captain Edward Smith of the RMS Titanic, seconds after the iceberg was reported to him and seconds (there were 37 of them, reportedly) before he reacted. In this critical timeframe – this brief space of time when the inevitability of disaster became clear –...
Instead of trying to determine whether or not virtualization is a good general business practice, you need to ask yourself one simple question: Does it make sense for my business? The floodgates have officially opened. Businesses that were once reluctant to invest in the IoT are now wi...
Many IT organizations look to the private cloud to improve agility and simplify business operations. More and more are introducing converged and hyperconverged infrastructure solutions to support cloud initiatives and agile development practices. But there is too often a road block — l...
Talari has announced two changes in its executive leadership team. Mark Masur, who currently serves as Talari Chairman of the Board, has taken over the responsibility of Chief Executive Officer, succeeding Emerick Woods, the company’s previous CEO. In addition, John Dickey, co-founder ...
Arista Networks, Inc. (NYSE: ANET), has announced financial results for its fourth quarter and year ended December 31, 2015. Revenue of $245.4 million, an increase of 41.5% compared to the fourth quarter of 2014, and an increase of 12.8% from the third quarter of 2015. Non-GAAP gross...
Network communications are a top priority for DevOps teams working in support of modern globally-distributed systems and microservices. But basic network interface statistics like received and sent traffic aren’t as useful as they once were because multiple microservices may share the ...
The Net Neutrality fight has been all over the news this year with the latest installment on Net Neutrality coming in from T-Mobile. Private and public companies alike are tuned into to this continual saga to see how the eventual outcome will affect business and ultimately their online...
With another New Year upon us, I’ve found that as an industry we’re once again spending a lot of time looking forward, which is a good thing, but also not enough time grounded in the present or even the past, which absolutely can be a bad thing, especially for network administrators. A...
SYS-CON Events announced today that Interface Masters Technologies, a leading vendor in the network monitoring and high speed networking markets, will exhibit at the 18th International CloudExpo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York,...
Part of the difficulty in procuring “predictions” for something like the Internet of Things is that the possibilities are truly endless. We know that “IoT” as a concept will increasingly touch on almost every single facet of our daily lives with each passing month, so part of the excit...
The purpose of the maturity model is to enable accelerated adoption of the new Cloud technologies that make disruptive business models possible, faster, the headline reference example being the ‘Platform Business Model’. Gartner says senior IT executives should be “digitally remaste...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve co...
There’s a whole lot of talking and proposing and presenting going on around risk-based . Usually it’s around authentication and access. The basic premise is that based on a score, formulated from a set of variables (context), you decide whether or not someone is allowed access to a res...
We Need a Holistic Network Infrastructure: Why Controllers Are Not Cutting It For years, we've relied too heavily on individual network functions or simplistic cloud controllers. However, they are no longer enough for today's modern cloud data center. Businesses need a comprehensive p...
Services providers have traditionally organized the management and operation of different technologies into several teams with very specific domain knowledge. These teams have been staffed with specialists looking after routing, network services, servers, virtualization, storage area n...
"PLUMgrid is a software defined networking company - we provide virtual network infrastructure which plugs into any framework you're using," explained Dhiraj Sehgal of PLUMgrid in this SYS-CON.tv interview at Cloud Expo (http://www.CloudComputingExpo.com), held June 9-11, 2015, at the ...
Live Webinar with 451 Research Analyst Peter Christy. Join us on Wednesday July 22, 2015, at 10 am PT / 1 pm ET In a world where users are on the Internet and the applications are in the cloud, how do you maintain your historic SLA with your users? Peter Christy, Research Director, ...
I’ve always had a fascination with the way information is acquired and process. Reading back through the history of this site, you can see this tendency towards more fanciful thinking, e.g. GPGPU assisted network analytics, future storage systems using Torrenza-style processing. What...
Maintaining network security has never been more challenging than it is right now. Traditional network perimeters are beginning to blur in the face of consumerization, the rise of mobility, migration to the cloud, and the Internet of Things. The pursuit of business agility has driven t...
For years, we’ve relied too heavily on individual network functions or simplistic cloud controllers. However, they are no longer enough for today’s modern cloud data center. Businesses need a comprehensive platform architecture in order to deliver a complete networking suite for IoT en...
It is possible to implement SDN solely using existing network infrastructure and to provide SDN overlay connectivity using tunneling technologies. That said, most people concede that some physical hardware will be needed to perform certain key network functions or at key locations wit...
The need to be connected to the ‘smarter world’ is ever increasing with the rise in the number of mobile devices. LTE is now a global reality for millions of subscribers and the age of the Internet of Things (IoT) is well and truly upon us. While this opens up a variety of opportunitie...
Ariba today announced innovations to its cloud-based applications and global business network designed to deliver a personal, contextual and increasingly mobile-first user experience for business applications consumers. Among the announcements are a newly designed user interface (UI) ...
Vicom Computer Services, Inc. was awarded an 11 year contract with the MTA. The MTA launched a request for proposal in September 2013 for a project encompassing and creating a fully redundant core data network across the three core data centers and upgrade user access to applications...
While many hardware vendors publicly appear to be embracing the move to virtual Layer 4-7 network services, the reality is quite different. To sell virtual appliances – such as load balancers, firewalls, VPNs and intrusion prevention systems (IPS) – they have to overcome the fear of ca...
"Programmability in the network" is a wordy yet simpler way to describe the extension of network capabilities through the use of software-defined techniques. See what I mean? In any case, whatever you want to call it, there are two distinct methods of leveraging programmability in ...
Virtualization technology has matured and is a critical infrastructure component in most modern data centers, especially as a trusted part of production environments. As our use of, and reliance on, virtualization technology continues to grow it is important that we are managing the te...
Some of the network gear vendors cast a wary look at network management vendors, particularly those who do continual, automatic discovery of the network inventory and connectivity. Why? We know what’s actually out there, and what’s actually being used. We had one customer in the i...
After reading Sean Michael Kerner’s article in Enterprise Networking Planet earlier this month, I thought I’d add a few thoughts of my own to what he wrote. He discusses SDN and IPv6. Here’s my take on Software Defined Networking (SDN) in 2015: Given the ongoing hype and the rang...
In Part 1, I shared my thoughts on SDN in 2015, after reading Sean Michael Kerner’s article in Enterprise Networking Planet. This post will cover a few of my thoughts on IPv6. Once the initial scares surrounding IPv4 address exhaustion passed, enterprises have taken a relaxed attitud...
With every New Year it is time to look back at the industry events of the past 12 months, and use our expertise to predict what lies ahead, in order to be more prepared. With regards to DDoS attacks, here is a short list of what to expect in 2015. We expect to see an increase in DDoS...
Through http://blog.ipspace.net I landed on this article on acm.org discussing the complexity of distributed systems. Through some good examples, George Neville-Neil makes it clear that creating and scaling distributed systems is very complex and “any one that tells you it is easy is e...
Throughout the development cycle of new features and functions for any network platform (or probably most other products not targeted at the mass market consumer) this one question will always come up: should we protect the user of our product from doing this? And “this” is always some...
Over the past few weeks I have had several conversations related to calculating network topologies and how packet forwarding is done based on those topologies. I wrote this post about a year ago explaining some of these details, but after a conversation with a customer earlier this wee...
User Experience (UX), in networking is a tricky thing. It’s not just about the direct user interaction of a particular feature or of a particular product. Over at Packet Pushers, we see many blog entries reviewing network products. Time and time again, they show us that UX encompass...
In the five seconds it takes you to read this, 60% of your visitors just abandoned your site. Another 20% were gone before you even hit the first comma, and 30% of all them are purchasing from one of your competitors. That's what Limelight Networks "State of the User Experience" says,...
In a previous article, we talked about “Short T’s.” We talked about how, in network engineering, the “T” is very long: Configuring a network to achieve business goals requires considerable skill and knowledge. While we set up a conceptual model in that post to talk about what “T” me...
Some people believe good or bad things always happen in threes. I believe you will always be able to find three (and probably more) things that are good or bad and somewhat related, but sometimes I get surprised by the apparent coincidental appearance of several closely related “things...