Posts

CITRIX VDI as a solution

Image
The challenges of these past few months have transformed our workplaces in numerous ways. More recently, a Gartner survey had reported that 88% of organizations have asked employees to work-from-home and nearly all organizations (97%) have canceled any work-related travel. Work-from-home, therefore, has become the new norm of the workplace today. While the workplace shifts to different environments, business continuity must continue. Businesses should not suffer from a remote work environment. Having the best virtual workplace environments helps to bridge this gap.  However, this is not always convenient. A remote worker faces various challenges. Common complaints include inaccessibility to essential applications and files, network connectivity,  security  threats, lack of essential devices, and low performance. This means there is a need in organizations to increase the capacity, capability, manageability, and visibility of a remote worker so that the technical issues do n

How does Software Defined Networking (SDN) Work?

Image
Visiting back, SD-WAN  is an acronym for software-defined  networking  in a wide area network (WAN). SD-WAN simplifies the management and operation of a WAN by decoupling (separating) the networking hardware from its control mechanism -Wikipedia Since SD-WAN separates  network mechanism  (WAN architecture) from its control mechanism (Routing Protocols and decisions), the routing decisions for each request can be made intelligently. No longer does a data packet or an application request from the Branch office need to Travel Back to the data center for it to be routed. Intelligence is added at the branch office location itself so that traffic can be routed across the WAN for the highest performance and efficiency outputs. How does SD-WAN work? In a network infrastructure environment, there are two planes- the data plane and the control plane. In an SD-WAN environment, the two planes are separated. However, in the traditional model, The Data plane and the control pl

What is SD-WAN (Software- Defined Network)?

Image
Suppose you want to connect with the internet, to the outside world. How is the networking capability leveraged? Through a Wide Area Network! In order to access the internet, any computing device needs to be connected to a WAN ( Wide Area Network). Whereas LANs (Local Area Networks) connect machines locally, WANs (Wide Area Networks) help machines communicate to the outside world. With the proliferation of the  cloud  environment, SD-WAN capabilities are becoming a necessity at many organizations. We will discuss the various capabilities of SD-WAN in this article series. Traditional Network Architecture: Image 1: Traditional WAN Architecture, Image Credits: Khan Academy Traditionally, branch offices connect to  data centers  via MPLs or dedicated lease lines to request access on applications. Traffic was routed among branch locations and data centers via their addresses on data packets through TCP or IP Protocol. Routers managed the work of distribution of data packet

WHAT IS kubernetes?

Image
Let’s start with a brief history of the evolution of application deployment. Traditional Application Deployment Era: In the traditional environment, organizations used to run applications on physical servers. There was no way to define resource boundaries in a physical server and this caused resource allocation problems. For example, if multiple applications ran on a physical server, there were instances where one application would take up most of the resources, and as a result, the other applications would underperform. A solution for this was to run each application on a different physical server. But this had a problem- it gave rise to many physical servers that were not scalable. As a result, resources were underutilized, and it was expensive for organizations to maintain many  physical servers . This problem gave rise to a solution: Traditional Virtual Machines. Figure 1: Traditional Architecture vs Virtual Architecture Virtualization Era:  Virtualization

What is Malware?

Image
In our uber-connected, internet world, threats from various sources continue to endanger our data. To stay secure, cybersecurity is a must-have. As a part of cyber-security series, I will try to explain malware. The initial step towards understanding  cybersecurity  is to understand what is malware? Malware stands for “malicious software.” Malware is basically a computer code that takes advantages of technical flaws in your computer system environment. Malware is often brought into the computer environment without your knowledge when you visit certain websites. These can be both — trusted and untrusted websites. Trusted websites can be overtaken by malware creators whereas untrusted websites are created solely for the purpose of distributing malicious software. Most of the malware is designed to disable and control your computer system, usually for the purpose of stealing money, taking control of your system such as deleting files and stealing passwords, robbing banking infor