The Onug Blog
Enterprise Cloud 2.0 Technology Solutions, Strategy and Use Cases

Subscribe

Can Kubernetes Avoid Being OpenStack 2.0?

Kubernetes and its various commercial manifestations are getting much attention from the vendor community these days, much like OpenStack did in 2014-2016. Kubernetes is an open-source system for automating deployment, scaling and management of containerized applications. What’s important about Kubernetes is that all the major cloud providers, such as Google Cloud Platform, Microsoft Azure, Amazon Web Services, are adopting it, and there are many enterprise-based Kubernetes distributions from companies such as Rancher Labs, Docker, CoreOS, Mirantis, RedHat’s OpenShift, IBM’s Cloud Container Service, Pivotal’s PKS, Mesosphere’s…

Driven by ONUG and the IT Community, the Future of SD-WAN Depends on Responsible Service Provider Delivery

by Kevin O’Toole Software-defined wide area networking (SD-WAN) has come a long way since ONUG ignited the conversation about the market and practical use cases for this promising new technology just four years ago. Eighty-seven percent of 800 network management executives use or plan to use SD-WAN within the next two years, according to a March 2017 IDC survey of mid-size and large companies with at least 10 locations and representing a variety of industries. SD-WAN sales are predicted to grow at a 69 percent…

How AI will transform your Wi-Fi

I’ve always had a lot of respect for veterinarians, because they are masters at solving problems based purely on fuzzy symptoms that their patients cannot explain: where it hurts, how long it’s been hurting, and what events led up to the problem. Many times the patients don’t even know they are sick. Yet a vet is able to make educated guesses with the data they do have, which often results in successful diagnoses and treatments.

How do we Define What is and is Not Actionable Intelligence in Cybersecurity Defense?

In the study of Machine Learning, the focus is on supervised and unsupervised learning. (We will not be considering deep learning in this article.) Supervised learning, and many aspects of unsupervised learning, require the known anomalies to be available to learn from and then predict anomalies in test data using the trained models and then fine tune them through techniques such as cross-validation. In cybersecurity, one is usually looking for an anomaly in the midst of a huge amount of normal traffic or behavior.  Such…

SD-WAN Turns the Traditional Network and Its Legacy “Rules” on Its Head

This scenario should sound familiar to you: You’ve been running IT organizations for what seems like forever and while you work tirelessly to make sure the network is working right, that everyone can access the network at all times, and that network traffic goes where it needs to when it needs to be there, the fact that you can’t control every nuance can be frustrating and impeding to your service level objectives. There’s a certain lack of control when it comes to managing WAN links…

Evaluating Architectural Approaches to Micro-Segmentation

The concept of segmentation has existed ever since we started connecting data centers to each other. In the early days, firewalls controlled what was able to get in from the outside. Perimeter firewalls are still a critical part of protecting the data center and that will never go away, despite the dissolving perimeter. As networks became more complex, we saw the concept of segmentation move inside with VLANs creating segments for the right size broadcast zones to ensure network performance. For more granular control, we’ve…

Dynamically Securing Applications in a Multi-Cloud World

Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating applications more frequently and many are migrating them between different clouds for business agility. The greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new code every year that will generate 50 times more data volume by…

The Multi-Cloud World is Here to Stay: Be Sure You Are Ready…

by Calvin Rowland The whole tech industry is abuzz with talk of multi-cloud environments. Survey after survey shows definitively that the race is on to a multi-cloud world. In fact, according to IDC, 30%[1] or more of organizations have already migrated or have plans to migrate literally every workload to the cloud. Further, 85%[2] of large businesses will be committed by 2018 to multi-cloud strategies as IT continues to transform.

The Blueprint for Micro-Segmentation 2.0

by Manuel Nedbal  “Micro-segmentation” has rapidly become the de facto term invoked when cloud and virtualization teams start talking risk, compliance and security policy for highly virtualized or Cloud infrastructure environments.  Yet while this important concept provides a foundation upon which security may be applied, by itself, it does not constitute enterprise-class security. It is simply a foundation, a first step.

Enabling Hybrid WAN for Cloud and IoT Applications

by Atchison Frazer Back in 2015, we offered some popular advice on “how to create a virtual WAN” (VWAN), a concept that was widely covered in the media at the time as a game-changing alternative to MPLS. However, the name quickly became outdated, as discussions about the future of networking shifted to software-defined WANs (SD-WANs) and hybrid WANs that actually complement MPLS. Today, the VWAN descriptor is rarely used, except as an occasional synonym for SD-WAN.