172 posts categorized "Oldcommguy" Feed

Don’t Wait for Standards Before Moving Closer to Smart Manufacturing (by Rana Tarakji)

Dont Wait for Standards Before Moving Closer to Smart Manufacturing

Smart Manufacturing has been making a lot of noise in the manufacturing industry, mostly due to how automation can greatly improve manufacturing operations through enhanced productivity. Also known as the “New Industrial Revolution”, this may indeed drastically shift the entire world of manufacturing.

By BMW Werk Leipzig (http://bmw-werk-leipzig.de) [CC BY-SA 2.0 de (https://creativecommons.org/licenses/by-sa/2.0/de/deed.en)], via Wikimedia Commons

So, what is it?

According to Smart Manufacturing Leadership Coalition, Smart Manufacturing is defined as “integrating network-based data and information that comprises the real-time understanding, reasoning, planning, and management of all aspects of a manufacturing and supply chain enterprise.” Some refer to smart manufacturing as the digitization of various processes in a manufacturing company.

A company that has moved forward to smart manufacturing utilizes intelligent machines, networks, and systems to handle and manage different processes in their operation. Smart manufacturing is basically a term highlighting the different technologies used in manufacturing to make the processes more efficient and more effective.

Industrial photoBy BMW Werk Leipzig (http://bmw-werk-leipzig.de) [CC BY-SA 2.0 de (https://creativecommons.org/licenses/by-sa/2.0/de/deed.en)], via Wikimedia Commons

Continue reading "Don’t Wait for Standards Before Moving Closer to Smart Manufacturing (by Rana Tarakji)" »


Cloud Networking – Once More Into The Breach (by Keith Bromley)

Cloud Networking – Once More Into The Breach

Anyone who has been in networking for several years has seen an exorbitant amount of change. Initially, businesses had physical (racks and chassis) network and switching equipment that resided on their physical premises. This was their corporate network consisting of routers, switches, servers, etc. The simple network concept expanded to include wide area networking, international and distributed offices, and then extensive security measures including IPS, IDS, DLP, WAF, etc.

The concept took a quantum leap as we went through a “virtualization” mania a few years ago. Everything needed to be moved to virtualized servers located in the virtual data center. Now we are on the precipice of another quantum leap, the use of cloud networking, where a significant majority of capabilities are being moved to either public or private cloud networks.

Scary

Whether you are a proponent of this move to the cloud or not, there are some things to consider if, and when, you decide to take the plunge. While there has been a lot of hype around the benefits of cloud computing, very little is being said about the inherent drawbacks.

Continue reading "Cloud Networking – Once More Into The Breach (by Keith Bromley)" »


Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)

Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective

Today’s enterprise networks and service providers are in a conundrum: as network technologies advance, managing network security has become harder and costlier. Sure, they could continuously introduce new monitoring tools - but this adds configuration hours and management complexities to an already intricate scenario. They could also replace slow-running tools with higher-speed devices - but they’ll incur additional costs. Or, for better results, they can adopt a holistic network monitoring infrastructure that enables migration to a higher network speed while increasing the effectiveness of existing security and monitoring tools.

Today’s security landscape demands strong, holistic-visibility architecture

Security breaches are moving up to ever higher (and frightening) levels and remain a thorn in organizations’ sides. Verizon’s 2018 Data Breach Investigations Report (DBIR) indicated that in 2017, more than 53,000 security incidents were reported and 2,216 breaches confirmed. The number of actual attacks remains unknown but undoubtedly is considerably higher.

Unfortunately, the issue of network security cannot be solved with a one-time purchase, and no security product is “perfect.” Today’s organizations’ best bet is a Network Visibility architecture-based security solution that reveals hidden network dangers and inefficiencies, identifies network hiccups and outages, increases network security, and addresses potential compliance issues — all before they impact the business.

Look for these four critical components when choosing a holistic approach: high efficiency and flexible access to the network, monitoring middleware functionalities (filtering, packet grooming, etc.), advanced monitoring functions (application intelligence, NetFlow support), and monitoring tools connectivity.

...and a more efficient and cost-effective security infrastructure

Continue reading "Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)" »


LMTV LIVE | How Tools Must Adapt To NPM Specialists (with Scott Sumner and Boris Rogier)

LIVE Event Start Time: Wednesday, April 25, 2018 - 10:00 AM

We will discuss a number of good technical subjects that relate to troubleshooting tricky scenarios like SaaS applications, SAP and Citrix, and ways that TCP analysis can be used to streamline hybrid-cloud app performance. In particular, we would use this first session under the Accedian brand to discuss more about how we see the future of tools, and what can be done to simplify and accelerate the work of NPM specialists with automation and real-time analysis.

Accedian commits to the future of this space, addressing the emerging challenges that will confront analysts as we move increasingly towards combined legacy /physical and virtual / cloud infrastructure.

Continue reading "LMTV LIVE | How Tools Must Adapt To NPM Specialists (with Scott Sumner and Boris Rogier)" »


Fixing TCP Performance Issues Impacting SaaS and Cloud Applications (by Will Moonen)

In my day-to-day practice as a TCP relationship therapist for cloud services, applications, and networks, more often than not, the not-so healthy beginnings and endings of TCP relationships have a significant impact on the user experience. When TCP doesn’t work efficiently, SaaS and cloud application performance rapidly degrades  – this class of applications, in particular, are highly dependent on consistent, efficient network performance.

So, how can you tell if these critical relationships are healthy? And if not, where do you start fixing things? To what extent is the integrity of your data impacted?

Especially in today’s end-to-end encrypted, turbo-charged, hybrid environments, it’s many times like looking for a needle in a haystack!

There is hope. After hundreds of troubleshooting sessions with the dozens of enterprises I work with, I’ve found that there is a well defined process that helps you isolate SaaS and Cloud application performance issues using TCP analysis. This means looking into the details of each session, to determine where to start.

The way TCP sessions set up and tear down directly impacts SaaS and Cloud performance, and the user experience, especially if there are reasons to believe that hosts are overloaded and messages are dropped. A persistent increase in the number of TCP zero window (0-Win) events and duplicate acknowledgements (DupAck) are typically good indicators that end-users are suffering from degraded performance.

 

Continue reading "Fixing TCP Performance Issues Impacting SaaS and Cloud Applications (by Will Moonen)" »