byWilbur_Smith09-06-201710:23 AM - edited 09-06-201710:25 AM
As I was thinking through a topic for this blog entry, I remembered a conversation with a fellow SE describing their customer’s first demo with our new SLX router: “…yeah, and he thinks Air Traffic Controller is a blast!”
Though I didn’t get it initially, the comment was a joking reference to the underlying Linux OS that SLX-OS is built on. It took some Googling to learn Air Traffic Controller is a TTY Console-based game that has survived as a port into Linux. Still confused? Don’t worry, because the Internet is amazing at stuff like this: https://ttygames.wordpress.com/2013/06/14/air-traffic-controller
So is there really a hidden console game on Brocade’s newest routing platform, the SLX? Not quite, but it is inside the Third Party VM (TPVM) that can be deployed on SLX. What’s the TPVM and why should customers care? Before answering, let’s take a step back.
Imagine two cars are racing. The first is a Ferrari, while the second is a 1999 Ford Taurus. The comparison seems unfair, yet this is one way to view the relationship between today’s government IT environment and IT expectations. The Ferrari represents government employee and citizen expectations for security and reliable data access. The Ford Taurus represents aging government networks that cannot keep pace with a wide variety of emerging security threats. In the current vehicles, it’s an impossible race to win.
However, this scenario doesn’t need to be the case. Machine learning in the network can help detect and negate attacks. Similar to the idea of automatically upgrading the engine in the Ford Taurus, weaving real-time intelligence via machine learning into the network infrastructure can help keep pace with emerging threats. In a world where attacks can occur at any time, the network needs agile defensive and offensive capabilities. With machine learning built into the network, a heightened level of awareness is integrated in to your environment to address zero-day threats as well as other service disruptive anomalies.
While many machine-learning capabilities are still being developed, this is the time for agencies to prepare. Government should take three steps to leverage machine learning for your network within the next few years.