Open19’s Goal: Create an Open Standard for Data Center Infrastructure
LinkedIn created the open source project, and Cumulus is an early contributor.
LinkedIn created the open source project, and Cumulus is an early contributor.
What is VPWS , VLL , EoMPLS ? Actually all are the same thing. VPWS stands for virtual private wire service , VLL stands for virtual leased line and EoMPLS stands for Ethernet over MPLS. All are MPLS Layer 2 VPN service and terms are used to define point to point layer 2 circuit. In […]
The post What is VPWS , VLL , EoMPLS appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
The last weekend in February, Holberton School and Docker held a joint Docker Hackathon where current students spent 24 hours making cool Docker hacks. Students were joined by Docker mentors who helped them along the way in addition to serving as judges for the final products.

Here are some highlights from the hackathon.
In their own words:
After discussing a few ideas, we settled on the idea of doing a Docker/Alexa integration that would abstract away repetitive command line interactions, allowing the user/developer to check the state of her Docker containers, and easily deploy them to production, only using voice commands. Hands free, we would prompt Alexa to interact with our Docker images and containers in various ways (ex1: “spin up image file x on server y”, “list all running containers on server z”, “deploy image a from server x to server y”) and Alexa would do it.
The main technical hurdle of the project was securely communicating between Alexa and our VMs running. To do this we used the Java JSch library. This class gave us the ability to programmatically shell into Continue reading
The goal is to give enterprise customers better insight on IoT data.
It’s focusing on E-Line service for an underserved market.
The post Worth Reading: Optical encryption moves to ubiquitous appeared first on 'net work.
Martin Casado doesn’t have a proper job since he left VMware. This gives him times to think deeply about the future of IT security as part of his role of wasting investors money at A16Z and considering where the next advances or futures will be. This video makes a lot of sense to me.
Once upon a time, we thought of security measures as being built like a wall around a medieval city. Then, as threats grew in complexity, we began to think of it more like securing a city or nation-state. Finally, security grew alike to aerial warfare — mobile, quick, wide-ranging. Each of these new modes for thinking about security represented a major misalignment between the security threats that had evolved and our strategies/tactics for dealing with them.
Now we are once again at another such major misalignment — thanks largely to the cloud and new complexity — requiring both a shift in how we think about and respond to threats. But we also have security “overload” given the vast size of our systems and scale of notifications.
How do security threats develop? How should CEOs and CSOs think of planning for them? What role will AI and Continue reading