To date, the open source community has been quite successful in terms of coming up with scalable and reliable implementations for enterprise servers, databases and more. Yet many enterprises remain skittish about implementing open source software, probably no more so than in the networking space.
Part of the reason is that there are so many different implementations of open source software, many of them backed by different entities with different agendas. Having many minds contribute to an open source project can be a good thing – until it comes time to make a decision about something and stick with it, so you can get a working product out the door. Enterprises need practical implementations that they can count on day in and day out to get a job done.
Defining the shades of open source
Open source essentially comes in different shades that are not all created equal. Understanding them will help you determine whether the open source implementation you have in mind has the kind of reliability and stability you need in any enterprise IT tool or application.
At a base level is the “pure” open source community, where like-minded people contribute their time and knowledge to a project. Continue reading
“We are on track to overtake Splunk and be the next SIEM market leader,” says CEO Nir Polak.
Investment firm Blackstone acquired Cloudreach last year, and has bankrolled a number of deals to expand its reach into North America.
The Indian service provider delivers telecommunications services over a telecom network infrastructure reaching more than 1,550 municipalities in India.
Mode uses a mathematically optimal routing system to intelligently move traffic around the network.
The Internet has helped to empower communities of across the globe. However, existing gender disparities, discrimination, and inequalities, especially faced by women living in the Global South, including the least developed countries, has had a considerable impact on the digital gender divide, leading to the digital exclusion of women.
A study “Views & Perspectives on Gender Rights Online, for the Global South”, was undertaken by Amrita Choudhury, CCAOI & Asia Pacific lead for the Internet’s Society SIG Women and Nadira AL Araj, ISOC Palestine and MENA Civil Society activist, to identify the main challenges towards improving the gender access and rights online, especially in the Global South; highlight the best practices which nations or regions have adopted to overcome those challenges; and suggest policy areas which need reforms.
In addition to relying on secondary sources, the opinions of 19 experts from 15 countries and responses of 162 people from 54 countries were sought. The findings were further discussed and validated through a workshop at the Internet Governance Forum (IGF) 2017 “Redefining Rights for a Gender Inclusive Connected Future (WS 102) and then compiled into a report.
The top challenges identified across the Global South hampering the creation Continue reading
In this video, Tony Fortunato uses Wireshark to show you how to get an application to run through a firewall.
When I started the Building Next-Generation Data Centers online course, I didn’t have the automated infrastructure to support it, so I had to go with the next best solution: a reasonably-flexible Content Management System, and Mediawiki turned out to be a pretty good option.
In the meantime, we developed a full-blown course support system, included guided self-paced study (available with most ipSpace.net online course), and progress tracking. It was time to migrate the data center material into the same format.
Read more ...