The chip maker is retooling its server business to focus on edge computing and is pushing hard on new growth areas like IoT and 5G.
Kong CEO and co-founder Augusto Marietti has touted the company’s platform as an “air traffic control to manage, broker, and hold APIs.”
The product uses a Kubernetes orchestration framework. It supports on-premises storage devices and cloud storage from Amazon, Microsoft, Google, Digital Ocean, Wasabi, and Scality’s software-defined storage platform Ring.
Token Ring, in its original form, was clearly a superior technology. For instance, because of the token passing capabilities, it could make use of more than 90% of the available bandwidth. In contrast, Ethernet systems, particularly early Ethernet systems used a true “single wire” broadcast domain. The Fiber Distributed Data Interface (FDDI), is like Token Ring in many ways.
Although Tier 1 operators are leading the way with NFV, the research firm says that it believes smaller operators will begin to see the benefits as well.
SD-WAN 2.0 takes into account the new requirements of IT and new enterprise communication patterns to spread SD-WAN across multiple locations and clouds, says Nuage CEO Sunil Khandekar.
With this release, NSX-T 2.3 continues to enable VMware’s vision of delivering consistent, pervasive connectivity and intrinsic security for applications and data across any environment. These new advancements help customers implement a more secure, end-to-end software-based network architecture – a Virtual Cloud Network – that supports their multi-cloud enterprises and advanced security in new and compelling ways.
NSX-T Data Center 2.3 extends advanced multi-cloud networking and security capabilities to AWS, in addition to Microsoft Azure and on-premises environments, and adds support for bare metal hosts as well.
Here are a few highlighted features among what’s new in this release.
NSX-T Data Center 2.3 introduces support for bare metal hosts, in addition to hypervisor and container environments. This includes Linux-based workloads running on bare-metal servers, as well as containers running on bare-metal servers without a hypervisor. To support this new capability, NSX-T leverages the Open vSwitch, allowing any Linux host to be an NSX-T transport node.
Bare-Metal Server Support
This release introduces support for Bare-Metal native compute workloads running RHEL 7.4, 7.5, CentOS 7.4, and Ubuntu 16.0.4 operating systems that allows users to network Bare-Metal compute Continue reading
On today’s Datanauts podcast, we break down what it takes to build out a private cloud on your premises. Our guest is Rita Younger, National Practice Lead SDDC / SDN and Technical Innovation Group at CDW.
The post Datanauts 147: What’s Your Private Cloud Strategy? appeared first on Packet Pushers.
McAfee says Presidents Trump and Obama have malware campaigns named after them. Tenable discloses a flaw that could affect hundreds of thousands of security cameras globally.
IT staffing budgets are shrinking and consequently many organizations are forgoing having strong engineering talent on staff. In this episode we explore the dynamics of staffing good engineers and whether or not it’s possible to remove that cost in modern networks.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 35 – Do You Really Need Good Engineers? appeared first on Network Collective.
The modern service provider is embracing technologies that were once used only by enterprise IT.
Tune into Gabe Rivas’s most recent course release, Network Foundation Protection: Management Plane, the second in a series of eight CCNA security courses.
Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data plane. In this Course we will focus on the management plane functionality and we will look at ways to protect and secure management access to network devices. We will compare the Pros and Cons of using an in-band vs an out-of-band management network and we will learn how to use network management protocols such as SNMP, NTP, SCP, RADIUS, TACACS+, Telnet, SSH, HTTP, and HTTPS to name a few. We will also learn the difference between the Cisco ACS and ISE servers and configure TACACS+ on ISE and an IOS device to provide with AAA for device administration. As a bonus, we will look at commonly used tools that can help you determine Cisco product vulnerabilities, best recommended software, and how to search bugs.
If this was a single course covering the entire CCNA Security blueprint, the pre-requisite would have been the CCENT Certification or equivalent knowledge. Since this is Continue reading