MSP program customers are ensured compatibility with Cloudian’s technology partners’ software...
Having been around the block a time or two, I’ve seen my share of trade show event booth giveaways and all manner of tchotchkes, most of which find their way to a trash can before the visitor gets home. For the upcomingDell Technologies World 2019in Las Vegas, we wanted to do something different – something that would impact the world in a positive way.
So, we’ll be raffling off 100 “adoptions” of real North American pikas, as part of the National Wildlife Federation’s Adopt-a-Pika program.
A pika is a small mammal, closely related to rabbits – and it’s in trouble. As the NWF explains, “Pikas live in high mountain ecosystems that are cool and moist. Higher temperatures can cause the pikas to overheat.”
As global warming brings higher temperatures to the pika’s habitat, it’s creating real problems. Pikas can’t just go find higher ground where it’s cooler – because that higher ground is their natural habitat.
“Without our protection and help, American pikas could be the first species with the distinction of going extinct due to global warming,” the NWF says.
Helping to save the pika
To avoid that distinction, the NWF launched the “Adopt an Continue reading
As part of the settlement, Apple agreed to pay Qualcomm an undisclosed amount and inked a six-year...
Pushing your heritage application to the cloud won't digitally transform your company any more that slapping an Autobots symbol on your car makes it a Transformer. On today's Day Two Cloud podcast, guest Martin Ehrnst delves into the nuances of digital transformation in the enterprise.
The post Day Two Cloud 007: Digital Transformation Is More Than Just Cloud Migration appeared first on Packet Pushers.
This blog post will provide a deep dive on the distributed firewall (DFW) on VMware Cloud on AWS (VMC on AWS). Let’s start with the basic concepts of a distributed firewall:
The distributed firewall is an essential feature of NSX Data Center and essentially provides the ability to wrap virtual machines around a virtual firewall.
The virtual firewall is a stateful Layer 4 (L4) firewall – it’s capable of inspecting the traffic up to the Layer 4 of the OSI model: in simple terms, it means they look at IP addresses (source and destination) and TCP/UDP ports and filter the traffic based upon these criteria.
What’s unique about our firewall is that it has contextual view of the virtual data center – this means our distributed firewall can secure workloads based on VM criteria instead of just source and destination IP addresses.
Traditional firewalling is based on source and destination IPs – constructs that have no business logic or context into applications. Our distributed firewall can secure workloads based on smarter criteria such as the name of the virtual machine or metadata such as tags.
This enables us to build security rules based on business logic (using Continue reading
If the proposed merger with T-Mobile fails and SoftBank doesn’t invest further in Sprint, the...
A recent Rightscale enterprise survey had GKE as the seventh most used container tool by those...
The SD-WAN provider claims a 90% win-rate over legacy vendors and other SD-WAN products when...
“Had the attackers wanted to take down the DNS portion of the internet, they could have done...
For us at the Internet Society, the role that people play in our community is vital to carrying our message in favor of an open and trusted Internet for all. We rely on the contributions, knowledge, and experience of our members. For this reason, the Chapters of the Latin American and Caribbean region have come together to offer and implement a pilot training program for their members.
Active participation of people in their local chapter is one of the main objectives of the program. The people involved will contribute to the four focus areas of the Internet Society’s 2019 Action Plan and will adopt our narrative and tone of voice. The sessions of the program will have facilitators from the LAC region with extensive knowledge on the topics addressed. In addition there will be special sessions with participation of experts from Internet Society staff.
180 seats are available to be distributed among Chapters of the LAC region. The selected candidates will have the opportunity to be trained in Internet Governance; community networks and access; Internet technical security; or the Internet of Things and Public Policy. The general criteria for participating is published here, although it is important to emphasize Continue reading
The post Episode 49 – Mentorship (Ad Free) appeared first on Network Collective.
Mentorship can have a significant impact on early career development and in this episode we sit down to talk about what you can expect from the mentorship process, how to find a mentor, and how to be a mentor.
We would like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus Networks makes networking software for the open, modern data center. It’s the only open networking software that allows you to affordably build and efficiently operate your network like the worlds largest data center operators. Cumulus also just launched a brand new certification program offering free resources, on-demand modules, live training, and a certifications exam. If you would like to learn more you can head on over to https://cumulusnetworks.com/certified
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 49 – Mentorship appeared first on Network Collective.