Welcome!


From the Blogosphere

On this side is a variant of SDN: network service virtualization (NSV). On the other side is an emerging application architecture: microservices. Where they meet lies devops. One of the most fascinating things to watch in the technological shifts occurring today is to see them all con...
It comes as no surprise that the CEO of Target has resigned in the wake of their massive data breach. The 2nd executive, if I remember correctly, to resign due to the mishap. Data breaches are costly according to the most recent Ponemon 2014 Cost of Data Breach Study: United States and...
It means you can't use "network" protocols to make intelligent decisions about applications any more. Back in 2000 (or 2001, I forget exactly), I got to test a variety of bandwidth management appliances. Oh, they were the bomb back then - able to identify (and classify) applications b...
How many of you actually fill out the registration cards that come with your kid's toys? Anyone? Anyone? Bueller? Bueller? That's what I thought. Me neither. Not as a parent and certainly not as an adult. After all, they were just going to use it for marketing, right? Fast forwa...
In reviewing some opportunities for Plexxi this week, I was reminded that we have made things very hard on ourselves. Through no one’s fault but our own we have created monsters of networks that are impossible to maintain, debug, diagnose and understand. I have been lucky in my career...
There’s a running meme in networking that has caught a lot of momentum with SDN: abstraction. Just about every vendor these days has bold ambitions to abstract out the complexity. There are APIs, abstraction layers, and architectural shims that all aim to hide complexity from the user....
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
How many different network protocols can you name? There are, of course, a set of staples just about everyone knows: IP, ARP, VLAN, TCP, UDP, DNS, HTTP, SSL, TLS, SMTP, FTP, SMB, CIFS, 802.1q, 802.1ad. Then there are recent additions like VXLAN, NVGRE, SPDY. But we could fill post ...
Way back in the early days of the Internet scalability was an issue (the more things change...). One of the answers to this problem was to scale out web servers using a fairly well-proven concept called load balancing. Simply put, distribute the load across web servers to make sure eve...
loud providers Google, AWS and Microsoft are doing some spring-cleaning - out with the old, in with the new - when it comes to pricing services. With the latest cuts, here's a news flash: There's a new business model driving cloud that is every bit as exponential in growth -- with or...
From a cost perspective, the networking dialogue is dominated by CapEx. Acquisition costs for new networking gear have historically been tied to hardware, and despite the relatively recent rise of bare metal switching, networking hardware remains a high-stakes business. But SDN is chan...
Take a moment to consider the things we put up with on a daily basis because they have been understood and accepted as the status quo. Perhaps the old adage, “better the devil you know than the devil you don’t,” rings no truer than for traditional on-premise data storage systems. Sure,...
Over the past few years, the SaaS community has gained a solid understanding of SaaS financial metrics, as well as many of the operational principles required to achieve them. However, there has always been an obvious gap between what happens on the top line and what happens on the gro...
We've talked before about the bifurcation of the network, which is driven as much by the evolution of network services from "nice to have" to "critical" as it is by emerging architectures. The demarcation line in the network stack has traditionally been - and remains - between layers 3...
Like moving to IPv6, simply picking up your existing network architecture and moving it to a completely new one is not going to happen overnight. There will undoubtedly still be "traditional" networks hanging around even when SDN adoption is considered mainstream and fully mature. That...
Earlier this week, Ethan Banks wrote a very nice article about Mellanox’s dual spine and leaf network in support of a large amount 10GbE access ports. After describing the scaled up network design, he reviews 8 observations about the design, not to point out good or bad, but merely to ...
Last week was a crazy week for information security. That's probably also the understatement of the year. With the public exposure of Heartbleed, everyone was talking about what to do and how to do it to help customers and the Internet, in general, deal with the ramifications of such a...
In order to manage today’s highly dynamic application environments, many organisations turn to their logging system for answers – but reliance on these systems may be having an undesired impact on the applications themselves. The vast majority of organisations use some sort of logging...
One of the most powerful aspects of the Internet of Things is the process of synthesis it achieves; it provides a mental model for people to associate and relate a number of different technologies under one umbrella concept and trend. Therefore one early quick win is a simple taxonomy...
OpenStack. OpenDaylight. SDN. Cloud. It's all about abstraction, about APIs and "software-defined" (which really means software-controlled, but this is neither the time or place to get into that debate). It's about jailbreaking the network. Enabling access to features and functionalit...
Not too long ago, it took even the most successful entrepreneurs several centuries or at least decades to reach a valuation of a billion and thus become a member of the exclusive Billionaire Boys Club*. Families like the Rothschilds, the Waltons or the Brenninkmeijers have indeed built...
Despite claims that there exists (or will, look out!) a mythical "god box" for the enterprise data center, capable of performing every data center function imaginable, it remains, well, mythical. Efforts to effectively secure the data center and the applications it delivers therefore r...
We love analogies. No matter what the topic, analogies are a great way to explain something in a different context to make a specific point with a frame of reference that may be more familiar to those we are making a point to. There is one that seems to come back over and over again in...
Nick Lippis, who writes the eponymously named Lippis Report, had a fascinating report on the differences between enterprise and service provider environments with respect to network virtualization. He observes, through a survey of the ONUG (Open Networking User Group) membership, t...
In any space, there is a very small vocal minority. Most people lack the time, interest, or even confidence to say what they think in public. So we are left with a vocal few who drive the conversation. In networking, the vocal minority consists mainly of the vanguards for change. For t...
In the cloud lock-in is often a greater concern than lock-out*, but both should be top of mind for organizations looking to deploy cloud seriously, or better said, for organizations that want to deploy cloud for serious business. Lock-in is the phenomenon that it is often difficult ...
You've all heard the news, right? Load balancers are dead. But that doesn't mean load balancing is dead and, in fact, it's a pretty critical piece of today's emerging technologies. That's because when you look out at what's going on and what's growing like weeds in a Midwest corn fiel...
The term "service chaining" hasn't quite yet made it into the mainstream IT vernacular. It's currently viewed as a technical mechanism for directing packets, flows or messages (depending on where you sit in the network stack) around the network. Service chaining is the answer to "how ...
While technology changes on a regular basis, IT teams have had a standard approach to administration. In recent years, however, there has been a drastic shift in data center administration. One of the biggest shifts is the adoption of private and public clouds. In part one of this seri...
Perhaps not as popular as its brothers and sisters I, P and S, Network-As-A-Service or NaaS has slowly started to appear in industry press, articles and presentations. While sometimes associated with a hypervisor based overlay solution, its definition is not very clear, which is not at...
A recent joint study from IDC and the National University of Singapore (NUS) predicts that companies around the globe will spend around $491 billion in 2014 for fixes and recovery from data breaches and malware. The sponsor, Microsoft, also noted that pirated software tweaked with inte...
Infrastructure must balance between applications and the network because otherwise werewolves would cease to exist. In science we're taught that gravity is the law. As it relates to us living here on earth (I can't speak for all you displaced aliens, sorry) there are two gravitational...
In the cloud storage industry, we talk a lot about “price wars.” Every 6 months or so, one of the major cloud storage providers drop their prices, and everyone else follows suit. Well guess what? Game over. Perhaps you’ve heard Google dropped the cost to $0.026/GB per month for sta...
A recent Forrester Research survey of Fortune 1000 companies indicates that 58% of IT leaders in their companies place faster delivery of IT services in their top 3 priorities. Yet, only 12% can deliver high quality results fast enough. 2014: The Year of Continuous Delivery
One of the most common phrases heard when new technology is introduced is that it's going to "bridge the gap" between X and Y. X and Y are almost always one of three IT groups: development, operations and networking. And while that goal is admirable (and indeed there are techno-cultura...
The overall networking landscape has been going through a fairly deliberate shift over the past couple of years. Where we used to talk CapEx, we are now talking OpEx. Where we used to talk features, we are now talking about workflows. This change in industry dialogue mirrors the rise o...
I will admit I have been a strong opponent of those listing roles and organizations as DevOps. Primarily because DevOps is a way to do something and creating a role DevOps Engineer is just putting lipstick on the pig for those looking to hire a Linux Sysadmin or infrastructure script c...
Perhaps you may have read that Brazil recently abandoned their controversial proposal that would have forced global internet companies to store data on Brazilian users inside the country. While many of us can surmise a number of reasons the viability of such a measure might have been u...
Windows 8.1 has a lot to offer Business, probably one of the bigger improvements is the inclusion of Hyper-V in the client. This provides support for several scenarios including: Test Lab: This is what I use it mainly for to test all the wickedly cool technologies in Windows Server ...
After five days (and eleven meetings) with new customers in Europe, Russia, and the Middle East, I think time is right for another refinement of in-memory computing's definition. To me, it is clear that our industry is lagging when it comes to explaining in-memory computing to potentia...