CloudHealth CTO and co-founder Joe Kinsella says VMware plans to target managed service providers with its new multi-cloud management product line.
The company views WiFi as instrumental in providing the necessary in-building coverage and capacity for 5G deployments.
Innovium considers switch chip programmability to be relevant for niche applications and as an insurance policy for future needs.
Zabbix began as a hobby project, but evolved into a network monitoring software for system administrators to monitor IT infrastructure that has a user base of 300,000 across 75 countries.
SDxCentral Weekly Wrap for October 5, 2018. AT&T contributed its white box router specifications to the Open Compute Project.
We built Access to solve a problem here at Cloudflare: our VPN. Our team members hated the slowness and inconvenience of VPN but, that wasn’t the issue we needed to solve. The security risks posed by a VPN required a better solution.
VPNs punch holes in the network perimeter. Once inside, individuals can access everything. This can include critically sensitive content like private keys, cryptographic salts, and log files. Cloudflare is a security company; this situation was unacceptable. We need a better method that gives every application control over precisely who is allowed to reach it.
Access meets that need. We started by moving our browser-based applications behind Access. Team members could connect to applications faster, from anywhere, while we improved the security of the entire organization. However, we weren’t yet ready to turn off our VPN as some tasks are better done through a command line. We cannot #EndTheVPN without replacing all of its use cases. Reaching a server from the command line required us to fall back to our VPN.
Today, we’re releasing a beta command line tool to help your team, and ours. Before we started using this feature at Cloudflare, curling a server required me to Continue reading
By now the story and resulting controversy is as much about media credibility as it is about cyber — and national — security.
Because the threat landscape continues to evolve rapidly, organizations are having a hard time keeping pace with the evolving cybersecurity skills required to manage their complex environments.
On today’s Packet Pushers Weekly Show, we discuss how the broadcast media industry leverages IP networks, the initiatives behind the standards and protocols, and why it all matters to data networking professionals.
The post Weekly Show 410: Broadcast Media Using IP Networks appeared first on Packet Pushers.
The update allows for the management of glass of credentials using both Kubernetes and secure socket shell for multiple infrastructure environments.
Dell Technologies applies to list shares on NYSE; AT&T names new preliminary 5G markets; Google launches tools for its Kubernetes Engine.
MEF is pleased to announce the titles of nearly 20 Proof of Concept (PoC) Showcase demonstrations that will be presented at the MEF18 global networking event.
Have you ever tried to implement something new and run into others who are resistant to that change? In this Short Take, Russ explores the validity of the commonly used “It’s always been done that way” excuse for avoiding change.
The post Short Take – It’s Always Been Done That Way appeared first on Network Collective.

Security is a field of questions. We find ourselves asking
all kinds of them all the time. Who is trying to get into my network? What are
they using? How can I stop them? But I feel that the most important question is
the one we ask the least. And the answer to that question provides the
motivation to really fix problems as well as conserving the effort necessary to
do so.
If you’re someone with kids, imagine a conversation like
this one for a moment:
Your child runs into the kitchen with a lit torch in their hands and asks “Hey, where do we keep the gasoline?”
Now, some of you are probably laughing. And some of you are
probably imagining all kinds of crazy going on here. But I’m sure that most of
you probably started asking a lot of questions like:
Usually, the rest of the Five Ws follow Continue reading
Get ready to explore the different methods of automating technical and business challenges with Azure in James Rudley’s new course; Automation With Microsoft Azure.
In this course you will learn a range of azure features including:
Ready to master Azure? You can buy this course in streaming or downloadable format here.