News Stay informed about the latest enterprise technology news and product updates.

Networking blogs: AWS joins ranks of Desktop as a Service providers

This week's networking blog roundup includes discussions about Amazon's DaaS initiative and a Yelp for IT.

Amazon Web Services DaaS not ready for prime time

IT management consultant Keith Townsend sheds some light on recent developments within Amazon Web Services. He says it is offering its virtual desktop infrastructure as a way to get its foot in the door of the enterprise. Although it is necessary that AWS provides this service if it wants to outsource the enterprise data center, Townsend is not quite sold on its DaaS approach and its ability to join the ranks of current Desktop as a Service providers.

Townsend bases his skepticism in part on a Q&A by Gartner, which indicates AWS is lacking enterprise Active Directory provisioning tools, streaming application support, pooled desktops, image version control and desktop provisioning based on location. If you want a good example of more complete platforms, Townsend suggests XenDesktop and VMware Horizon.

See what questions Keith has about AWS.

IT Central Station the 'Yelp' for IT?

For IT professionals looking to choose an enterprise network monitoring platform, the recently created IT Central Station is a go-to resource, says Love My Tool blogger Denny K. Miu. Founded by Russell Rothstein, the site acts like a Yelp or a TripAdvisor, only geared to the IT community.

Using real-life reviews from fellow engineers, the site guides users toward the products and software that might be best for their organizations. The site verifies its reviewers by using their LinkedIn profiles as a reference. What makes the site even more appealing is its freedom from vendor bias.

See what its backer is saying about IT Central Station.

Segment routing explained

In a recent post on Packet Pushers, network engineer Youssef El Fathi explains the basics of segment routing. Segment routing is a new technology that El Fathi contends will improve Internet Protocol and Multiprotocol Label Switching networks. It will enable fast retransmit and recovery protection for any network El Fathi says, adding that segment routing is both scalable and simple to operate. Finally, he writes that it will provide quicker interaction with applications for future software-defined networks (SDNs).

So how does it work? El Fathi explains that segment routing uses label switching with extensions to the Interior Gateway Protocol. There are two types of segments: nodal and adjacency. Nodal segments are unique and globally significant, whereas adjacency segments do not have to be unique, and are local.

El Fathi says segment routing is useful for fast retransmit and recovery, traffic engineering and SDN. What is even more compelling, he writes, is that segment routing is a multivendor initiative.

View a diagram and explanation of segment routing.

IBM and its enterprise security evolution

Enterprise security is rapidly evolving and, according to Enterprise Strategy Group analyst Jon Oltsik, IBM is at the forefront of the action. With mobile and cloud computing creating a more sophisticated IT landscape, chief information security officers are looking for ways to maintain security.

Oltsik explains five key ways that IBM is adapting security practices to keep up with advancing technology. First, IBM is selling at the C-level by pushing long-term strategies that take into account organizational initiatives and business processes. Second, IBM adds professional and managed services to its sales. IBM is also focused on centralizing its command-and-control for configuration and policy management, security monitoring and distributed enforcement. Another tactic it is using is integrating data analytics companies into its security division. Finally, IBM is adding identity to its security structure.

While it isn't trying to be an equivalent of Cisco, HP or Juniper, IBM has a key advantage: Big Blue is popular with its customers, which is what Oltsik says really matters.

Learn more about the evolution of IBM security structure.

This was last published in December 2013

Dig Deeper on Network Design

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.