Tuesday, May 5, 2020

7 Emerging Trends In Cloud Technology For 2020

  With each passing year, cloud computing is slowly becoming synonymous with computing as such.

7 Emerging Trends In Cloud Technology For 2020

Calculations that involve massive amounts of data are simply not solvable on a single computer, no matter how powerful. Instead, the task has to be distributed over a network of machines that comprise the modern computing cloud.

Understanding the current state of cloud computing is vital for business owners. By leveraging cloud technology businesses can keep running even in situations of economic disruption, such as the one we are experiencing due to the Covid-19 pandemic.

To bring you up to speed on where cloud computing is heading in 2020, we decided to cover the latest trends in the cloud industry. You can find our coverage in the paragraphs below.


1. The Rise of Containers

A container is a virtual software environment for running applications. Containers are the backbone of many cloud computing systems. Containers offer an effective way to distribute computing resources. Cloud systems that use containers are also easy to scale through the addition of additional containers.

According to 451 Research, the container market is set to achieve market worth of $2.7 billion this year. A survey by Cloud Foundry further confirms this trend, stating that 53% of surveyed companies are in the process of integrating containers in their tech stack.

Kubernetes is by far the most popular container solution on the market. What initially started as a Google project in 2014 grew to become the leading platform for container orchestration. Kubernetes is an example of Infrastructure-as-a-service (IaaS).


2. Serverless Computing

The basic building block of a computer network is the server. And since running a businesses without a computer network is impossible, companies had no other choice to rent or purchase servers to host their data and applications.

The problem with servers is that you can rarely tell in advance how much power and space you will need, and for how long. You could end up spending a hefty sum upfront, only to find out you’re using 50% of its computing power.

Enter serverless computing. This new cloud computing service model eschews paying for servers on per unit basis. Instead, serverless computing providers offer a pay-as-you-go model for renting servers. Serverless computing is another trend towards increasing decentralization of IT infrastructure.


3. Hybrid Clouds

As cloud computing proliferates, we will see more and more enterprises starting to develop cloud infrastructure for internal use. Such clouds can be built on top of existing networks and resources. While setting up a private cloud can be a complex endeavor the benefits in terms of scaling, flexibility, and data safety make it a worthwhile choice.

Some companies are taking things a step further and adopting a hybrid cloud approach. In addition to using internal cloud networks, these companies are utilizing public cloud infrastructure as well. Such hybrid solutions allow companies to fully harness the power of the cloud.

Hybrid clouds are a sign that companies are looking for ways to prevent vendor lock-in. Relying on a single cloud provider is akin to putting all your eggs in a single basket, and hybrid clouds represent a way to avoid this.


4. Edge Computing

The main advantage of cloud computing over centralized computer networks is its distributed nature. Instead of relying on a single hub for computation, cloud networks are divided into nodes with a certain geographic distribution. The edges of such networks are used as an entry point for users wanting to interact with the cloud. This is edge computing.

Cloud providers are increasingly working on developing edge computing in an effort to give users data and computing power through a low-latency connection. Cloud devices located on the edge have their own computing, storage, and network modules. These devices operate as the gathering spot for processing information from other parts of the network. This information is then sent to the nearest data center based on pre-defined protocols.


5. Cloud for Mobile

The transition to a mobile-first environment has affected cloud computing as well. Mobile cloud computing is a model for developing applications for portable devices such as smartphones and tablets.

According to this model, on the user side of the application there is a light-weight client interface used for presenting data and querying inputs. As for the actual computation, it is performed entirely on the cloud. This allows for the development of feature-rich mobile apps that can run on any kind of device thanks to the cloud.

While mobile cloud computing is on the rise, there are still some pending issues. One of them is security, as mobile devices are notoriously prone to hacking attacks.


6. Cloud AI

The cloud is a natural environment for artificial intelligence. AIs hosted on the cloud gain direct access to massive amounts of data, which enables them to optimize their core competencies via machine learning.

AI is also being used to solve cloud-related problems. From determining trends in power usage in server clusters, to finding patterns of network failure, AIs are essential for the continued development of cloud infrastructure.

Conversely, the distributed nature of cloud computing gives AI the ability to manage its resources more effectively, allowing for faster computation, and therefore faster learning.


7. Cyber-security Within the Cloud

Ever since the Capital One data breach last year there is growing interest and concern for cloud security. The case of Capital One has shown that when cloud credential management systems go haywire, disastrous consequences soon follow. This has prompted cyber security vendors to focus their efforts on cloud security.

A cloud is a system with many moving parts, which makes implementing security measures more difficult than in the case of conventional computer networks. The cloud has numerous points of entry by design, which unfortunately makes it more vulnerable to attacks from hackers.

Cloud providers such as Amazon are increasingly using AI to automate their security efforts. They are also simplifying cloud access interfaces to limit potential venues of attack.

The Future of The Cloud

Over the coming year, we can expect cloud computing to evolve further, eventually becoming so ubiquitous that it becomes synonymous with computing as such. Once cloud vendors solve problems with infrastructure, we can expect the cloud to become a commodity like electricity or internet access. Once we reach this stage, we can expect cloud services to proliferate, bringing the cloud closer to businesses and consumers alike.


Author - Angelina Harper - Angelina is a tech writer and contributor to reputable digital marketing websites.

She is interested in cloud technology, web design and social media marketing.

If you would like to read more articles from her, follow her on her Linkedin profile.

Monday, May 4, 2020

NetFlow vs Metadata vs Packet Inspection - Which is right for you?

 

NetFlow vs Metadata vs Packet Inspection - Which is right for you?

Isolating and rooting out network problems all comes down to having good visibility into the network. Without it, engineers just end up finger pointing and chasing problems around the enterprise.


At this stage of the network game, there are three major methods of getting insight into the network infrastructure and the traffic that traverses it: NetFlow, Metadata, and Packet Capture.


All three have their strengths in providing engineers with the right data in the right place at the right time - however they all have their weaknesses too. As you consider your visibility method in your environment, which one is right for you, and when?


With the security intrusions and pesky performance issues that are clearly here to stay, network engineers should have a solid answer to that question. NetFlow is easy to store, but can be limited in detail. Metadata shows pain points in a mountain of data, but can lead us in the wrong direction at times. Packets are the gold analysis standard on networks, but digging through them can be very confusing.


This whitepaper by ProfiTap discusses the strengths of each of these analysis methods and how and when each should be used.



Check it out to get better insight into these three visibility methods and how to use them to troubleshoot and secure your network.


Thursday, April 23, 2020

Free Command Line timer

 Command line or batch files are incredibly important to me as an analyst.

I cannot count the number of times creating a simple script has saved me countless hours. Some examples that come mind;

  • Performing testing when I’m working alone

  • Running tests unattended

  • Having other people perform your testing

  • Running a task as part of a notification system

In this article I use a simple example of recording the start/stop or elapsed time when copying a file. This can be easily modified for a wget, iperf, iperf3 copy, etc.


I would strongly encourage you to get a little familiar with this as a valuable skill and to better understand similar commercial applications that you may have.


URL to the timer.exe utility https://www.gammadyne.com/cmdline.htm

Troubleshooting HTTP 503 Issues

 I have mentioned in the past that you should really look ‘under the hood’ as far as application communication goes.



I have seen many applications that ‘work’ but not ‘work well’ generate error messages. These errors can be categorized as follows;



Application - Messages are entirely application based and are addressed by the application team or vendor.



Sending commands with no authentication, wait for the error message, then resend the same command but this time with authentication


Using small packet or data payload sizes


Inefficient multi-tiered server architecture


Login processes that download application files without checking if you have the current files


References to servers that are de-commissioned or used for testing/development



Network – Messages generated by the network devices that can affect application performance and are addressed by the networking team



MTU issues caused by different network topologies, firewalls, routers or load balancers

Blocked ICMP error messages that the application needs to make proper adjustments, like MTU and routing

Inefficient routes

Proxies or firewalls that do not allow application access but fails to the default gateway that still works

New equipment with old switch port speed or duplex configurations

Access points with 1 Gb Ethernet ports using the previous 100Mb POE injector

Client/Server- Errors caused at the server or host configurations. These are addressed by the server and desktop team.

Old configurations blindly used on newer operating systems

Using all the default protocols and services when they are not needed

Aggressive antivirus or firewall settings causing disconnections or performance issues

Server with limited resources (RAM or CPU)

In this example, I will focus on HTTP 503 Service Unavailable messages generated from web servers. In many cases, these are generated from a component as a webpage loads and the user has no idea this is happening.

If you’re lucky, the error will cause a noticeable issue, so you can investigate.  If you’re not lucky the issue may intermittently resolve itself quickly resulting in performance or ‘random’ problems.

Many protocol analyzers and applications can report or count the number of errors. I suggest you initially concentrate on 4xx or 5xx error codes. If none exist, look for big delta times between the HTTP command responses.

If you are using HTTPS, look into what logs or analysis tools are available. For example most web browsers have a Developer Tools facility that will record all sorts of helpful information.  Alternatively there are agents you can load on your clients to record and log performance or errors.

In any case, I suggest you test and get familiar with your chosen tools to ensure they are accurate and that you understand what they are reporting.

The HFS HTTP server link is here https://www.rejetto.com/hfs/

Enjoy




Popular post