Kong CEO and co-founder Augusto Marietti has touted the company’s platform as an “air traffic control to manage, broker, and hold APIs.”
The product uses a Kubernetes orchestration framework. It supports on-premises storage devices and cloud storage from Amazon, Microsoft, Google, Digital Ocean, Wasabi, and Scality’s software-defined storage platform Ring.
Token Ring, in its original form, was clearly a superior technology. For instance, because of the token passing capabilities, it could make use of more than 90% of the available bandwidth. In contrast, Ethernet systems, particularly early Ethernet systems used a true “single wire” broadcast domain. The Fiber Distributed Data Interface (FDDI), is like Token Ring in many ways.
Although Tier 1 operators are leading the way with NFV, the research firm says that it believes smaller operators will begin to see the benefits as well.
SD-WAN 2.0 takes into account the new requirements of IT and new enterprise communication patterns to spread SD-WAN across multiple locations and clouds, says Nuage CEO Sunil Khandekar.
With this release, NSX-T 2.3 continues to enable VMware’s vision of delivering consistent, pervasive connectivity and intrinsic security for applications and data across any environment. These new advancements help customers implement a more secure, end-to-end software-based network architecture – a Virtual Cloud Network – that supports their multi-cloud enterprises and advanced security in new and compelling ways.
NSX-T Data Center 2.3 extends advanced multi-cloud networking and security capabilities to AWS, in addition to Microsoft Azure and on-premises environments, and adds support for bare metal hosts as well.
Here are a few highlighted features among what’s new in this release.
NSX-T Data Center 2.3 introduces support for bare metal hosts, in addition to hypervisor and container environments. This includes Linux-based workloads running on bare-metal servers, as well as containers running on bare-metal servers without a hypervisor. To support this new capability, NSX-T leverages the Open vSwitch, allowing any Linux host to be an NSX-T transport node.
Bare-Metal Server Support
This release introduces support for Bare-Metal native compute workloads running RHEL 7.4, 7.5, CentOS 7.4, and Ubuntu 16.0.4 operating systems that allows users to network Bare-Metal compute Continue reading
On today’s Datanauts podcast, we break down what it takes to build out a private cloud on your premises. Our guest is Rita Younger, National Practice Lead SDDC / SDN and Technical Innovation Group at CDW.
The post Datanauts 147: What’s Your Private Cloud Strategy? appeared first on Packet Pushers.
McAfee says Presidents Trump and Obama have malware campaigns named after them. Tenable discloses a flaw that could affect hundreds of thousands of security cameras globally.
IT staffing budgets are shrinking and consequently many organizations are forgoing having strong engineering talent on staff. In this episode we explore the dynamics of staffing good engineers and whether or not it’s possible to remove that cost in modern networks.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 35 – Do You Really Need Good Engineers? appeared first on Network Collective.
The modern service provider is embracing technologies that were once used only by enterprise IT.
Tune into Gabe Rivas’s most recent course release, Network Foundation Protection: Management Plane, the second in a series of eight CCNA security courses.
Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data plane. In this Course we will focus on the management plane functionality and we will look at ways to protect and secure management access to network devices. We will compare the Pros and Cons of using an in-band vs an out-of-band management network and we will learn how to use network management protocols such as SNMP, NTP, SCP, RADIUS, TACACS+, Telnet, SSH, HTTP, and HTTPS to name a few. We will also learn the difference between the Cisco ACS and ISE servers and configure TACACS+ on ISE and an IOS device to provide with AAA for device administration. As a bonus, we will look at commonly used tools that can help you determine Cisco product vulnerabilities, best recommended software, and how to search bugs.
If this was a single course covering the entire CCNA Security blueprint, the pre-requisite would have been the CCENT Certification or equivalent knowledge. Since this is Continue reading

Last week, the Internet Society together with our Kyrgyz chapter and the wider local community held discussions about Internet connectivity in remote areas in Bishkek, Kyrgyzstan. Approximately 35% of the Kyrgyz population use the Internet (ITU data, 2017) and most users are located in cities and urban areas.
In cooperation with its Kyrgyz chapter, the Internet Society is piloting the community networks approach in the village of Suusamyr, located some 150 kilometers south of the capital city Bishkek. We had an opportunity to visit this village of about 4000 people, tucked away in a wide valley surrounded by high mountains. The economic activity revolves around farming, horse and cattle keeping, and tourism.
While the final phase of the Suusamyr community network is still under implementation, we can already draw some lessons learnt from the preparatory and testing phases.
Partnerships
As a starting point, the Internet Society Kyrgyz chapter consolidated a partnership with the government, Internet Service Providers (ISP), and the local community in Suusamyr. The Kyrgyz government saw the opportunity for local economic development. Two ISPs agreed to lease their existing backbone infrastructure to connect the last mile. And most importantly, the local community embraced this initiative with a Continue reading