Join the Docker team, the container ecosystem, contributors and maintainers, developers, IT professionals and executives at DockerCon Barcelona December 3-5. DockerCon is the must attend conference to learn, network and innovate with the container industry.
Besides Barcelona being a beautiful city with delicious food, here are our top 5 reasons to attend DockerCon:
This eBrief from SDxCentral delves into the latest developments in container security and looks at the techniques companies are using to ensure their container environments are secure and not vulnerable to breaches.
Last week was an exceptionally exciting week for the African Regional Bureau as we successfully held, in partnership with the Association for Progressive Community (APC), the 3rd Summit on Community Networks in Africa from 2-7 September 2018, at Wild Lubanzi Trail Lodge, Eastern Cape, South Africa.
The objective of the Summit was to promote the creation and growth of community networks, increase collaboration between community network operators in Africa and to provide an opportunity for them to engage with other stakeholders.
The event was attended by more than 100 participants from at least 18 countries worldwide, 13 from Africa (Kenya, Uganda, South Africa, DRC, Zimbabwe, Zambia, Malawi, Namibia, Cameroon, Tanzania, Sudan, Egypt, and Ethiopia) and 5 from Spain, Germany, Argentina, India, and the U.S. The formal opening of the Summit was addressed by representatives from the Ministry of Telecommunications and Postal Services of South Africa.
This year’s Summit turned out to be very special as 12 established community networks in Africa and 18 other communities (particularly from rural South Africa interested to replicate initiatives) attended and contributed to the discussions held throughout the 6 days.
The week started with 2 days of training, which provided community network operators with clear Continue reading
Continuing on with the theme of previous cheat sheet articles, this article will help decode the format for Amazon Web Services’ Elastic Compute Cloud (EC2) instance types.
An EC2 instance type provides the definition for the size and certain capabilities of the instance:
Some of this information can be gleaned from the instance type name. For the information that can’t, refer to the links below in the references section.
Here is an example of an instance type name: c5d.2xlarge
c | 5 | d | . | 2xlarge |
family | generation | [optional] presence of local storage (aka instance storage) | “t-shirt size”; defines amount of RAM and number of vCPUs |
Cloudflare first started talking about DNSSEC in 2014 and at the time, Nick Sullivan wrote: “DNSSEC is a valuable tool for improving the trust and integrity of DNS, the backbone of the modern Internet.”
Over the past four years, it has become an even more critical part of securing the internet. While HTTPS has gone a long way in preventing user sessions from being hijacked and maliciously (or innocuously) redirected, not all internet traffic is HTTPS. A safer Internet should secure every possible layer between a user and the origin they are intending to visit.
As a quick refresher, DNSSEC allows a user, application, or recursive resolver to trust that the answer to their DNS query is what the domain owner intends it to be. Put another way: DNSSEC proves authenticity and integrity (though not confidentiality) of a response from the authoritative nameserver. Doing so makes it much harder for a bad actor to inject malicious DNS records into the resolution path through BGP Leaks and cache poisoning. Trust in DNS matters even more when a domain is publishing record types that are used to declare trust for other systems. As a specific example, DNSSEC is helpful for preventing Continue reading
AI use by telcos and providers potentially can improve customer service, speed onboarding, and reduce outages by pro-actively identifying problems. Is this hype or can AI deliver benefits to the enterprise?
Here’s a bit of good news for those of you scared of network automation replacing your jobs: even Elon Musk didn’t manage to pull it off, so I don’t think a networking vendor dabbling in intent will manage to do it (particularly considering the track record of networking vendors’ network management and orchestration systems).
Read more ...Continuing on with the theme of previous cheat sheet articles, this article will help decode the format for Amazon Web Services’ Elastic Compute Cloud (EC2) instance types.
When asked about Kurian, who heads the company’s cloud business, Co-CEO Mark Hurd said “we expect him back.” But Hurd refused to say when that will happen.
Startups share their path to market with their global telecommunications providers at TC3 Summit 2018.
When I joined Arista ten years ago, we were in the midst of developing a novel purpose-built software architecture from a clean sheet of paper for networking. The financial services industry was in crisis, with the collapse of major banks like Lehman Brothers. In parallel, emerging slowly but surely, was a new breed of hyper-scale cloud operators. Amazon AWS, Microsoft Azure and Google GCP were in the early stages of shaping what was to become the public cloud. The requirements of these new titans provided a source of inspiration for the Arista founders and me. We couldn’t have predicted the pace nor the impact of this cloud fury; it came strongly and rapidly. As I reminisce over the past decade, it is clear that the cloud inflection has forever changed the face of enterprise IT for the better. Yet it is just the beginning, and there is much ahead.