Cloud data centers have changed the networking topology and how data moves throughout a large data center, prompting significant changes in the architecture of the chips used to route that data and raising a whole new set of design challenges. Cloud computing has emerged as the fast growing segment of the data center market. In fact, it is expected to grow three-fold in the next few years, and by 2021 it is forecast to account for 95% of all data center traffic, according to Cisco’s Global Cloud Index Forecast. A key part of that equation is virtualization, which allows for dynamic allocation of compute instances and workloads to keep up with the dynamic nature of cloud services. Looked at from a different angle, more than 75% of the traffic now flows in the east-west direction, from server to server, within the datacenter. That raises the first set of issues because the traditional three-tier network topology is optimized for north-south client-server traffic, so it cannot … [Read more...] about Cloud Drives Changes In Network Chip Architectures
Enterprise network security architecture
The adoption of cloud technologies is rapidly becoming a priority for businesses, with the UK business adoption rate already at 88%. Increased agility, reduced cost and easily accessible data are at the heart of why businesses have been jumping towards the cloud, keen to profit from the many advantages it has to offer. While more and more sensitive company data is being moved into the cloud, the security of that data has become a critical issue for organisations in many industries. Barely a week seems to go by without news of another cyber-attack hitting the headlines, prompting businesses to invest heavily in next-generation technologies in an attempt to protect their infrastructure and keep their confidential data secure. In fact, Gartner has forecast that worldwide enterprise security spending is set to reach $96 billion in 2018, up 8 per cent from last year. One such technology that plays a key role in securing the organisation are network security policies. These … [Read more...] about Five network security deficiencies endangering your corporate data
PALO ALTO, Calif.--(BUSINESS WIRE)--May 22, 2018--Pica8, a leading provider of advanced, open networking software, today announced PicaPilot™, the first-ever networking software solution capable of automatically connecting almost any number of multivendor 1G to 100G white box Ethernet switches and running them as if they were a single logical switch with a single IP address. With PicaPilot, Pica8’s PICOS® network operating system – already the leading open networking solution for enterprise branch offices – can now be deployed across an entire enterprise: in remote offices, corporate campuses and data centers alike, replacing legacy switch stacks and chassis switches with a modern white box leaf-spine architecture – only minus all the deployment complexity associated with either three-tier, traditional leaf-spine, or non-Pica8 white box solutions.By compressing dozens of white box switches into a single logical device for configuration and … [Read more...] about Pica8 Launches PicaPilot™ Switch Orchestration Software, Crushing Enterprise Network Deployment and Management Complexity
As you implement digital transformation strategies, you need to plan for an explosion in traffic growth. Consequently, you need to build data centers using the same state-of-the-art principles the hyperscales have adopted: A leaf spine Clos design, which accommodates large amounts of east-west traffic, is essential to support today’s web applications A multi-hardware vendor strategy, leveraging both established hardware vendors (Arista, Cisco, Dell, Juniper, Mellanox), and open alternatives (Cumulus and OCP hardware) Major investments in automation and analytics for efficient scalable operations. Doing this right means embracing a disaggregated approach, separating the hardware, choice of network operating system, and automation layer. If you are a regular attendee of the OCP Summit, ONS Conference, or ONUG Conferences, you are familiar with these best-practice approaches deployed by Facebook, Google, Microsoft and Amazon.Hardware lock-in versus DIY – flawed choicesAs for … [Read more...] about Build vs buy for your next-gen data center network infrastructure?
Digital transformation (DX) is about digitizing processes and services so businesses can be more agile and operate more efficiently, from delivering customer service to improving processes with supply chain partners. It is the marketing team that wants to transform how it promotes product, the HR division that wishes to improve recruitment, and the IT team that wants to iterate online services in an instant.To initiate a DX project, organizations need to bring together people, process and technology in the planning and strategy phase, offering them an opportunity to see where technologies like data analytics, internet of things (IoT), mobile and social can make a difference. However, many believe that information security is too often left out of the loop. Security-less digital transformation increases riskAs IT and business fast-track initiatives like agile and DevOps to improve speed to market, security’s role is confined to asking questions afterwards about the knock-on impact … [Read more...] about What is security’s role in digital transformation?