Site Reliability Engineering (SRE) is the topic for the latest Full Stack Journey podcast. Guest Michael Kehoe explores SRE, its relationship w/ DevOps, essential skills, and more.
The post Full Stack Journey 022: Site Reliability Engineering (SRE) With Michael Kehoe appeared first on Packet Pushers.
HPE also added more software-defined storage to its edge devices. This enables use cases like AI, video analytics, or databases at the edge.
Minorisa’s main reason for switching from Cisco and MikroTik to 6WIND and white box hardware was the higher throughput and the ability to transition to SDN.
As IT managers grapple with the growing volumes of unstructured data, object storage has emerged as a way to address the resulting challenges.
EE's current 5G trial plans include just London, while Vodafone's plans include trials in seven markets by year-end.
Microsoft buys GitHub, and most of the press has been pretty positive, even from those you might not expect.
But , of course there’s the usual herp-derp comments, and a big spike in moving repos to Gitlab
We're seeing 10x the normal daily amount of repositories #movingtogitlab https://t.co/7AWH7BmMvM We're scaling our fleet to try to stay up. Follow the progress on https://t.co/hN0ce379SC and @movingtogitlab
— GitLab (@gitlab) June 3, 2018
Most of those repositories will be inconsequential single-user repos, but it is still so much wasted effort. If your knee-jerk reaction is to immediately stop doing real work, and move your code somewhere else, you haven’t been paying attention. The world has moved on.
Back in 2014 I wrote Keep an Open Mind:
I get frustrated because these people aren’t paying attention to what Microsoft has been doing. They have come a very long way since the 2002 Bill Gates email setting security as the top priority. It’s a big ship to turn, and it took time. Their overall security model and practices are far better than they were, and stability is no longer an issue. Their business strategy is very different now too.
But poor Continue reading
Data centers need to be able to handle an increasing amount of data traffic. Lenovo works with clients make sure they have sufficient bandwidth and reliability in their data centers.
The performance monitoring company deployed cloud vantage points into every region of the top three cloud providers: Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
A vast majority of the nodes were hosted inside of Amazon Web Services with 55 percent hosted in an AWS U.S. Region. Some of the other clouds hosting open nodes included Alibaba, Microsoft Azure, and Digital Ocean.
Of course they blamed the network.
AWS security issues show up in tech news fairly often. Today, we talk with someone who wrote about AWS services other than S3 that were found exposed to the public. Could that be some of your services?
Could be. The numbers are pretty impressive. Stay tuned, and find out how to determine whether or not your EBS snapshots, RDS snapshots, AMIs, or ElasticSearch clusters are accidentally public.
Our guest is Scott Piper, an AWS security consultant for Summit Route. You can follow him on Twitter at @0xdabbad00.
We start by exploring the types of AWS resources that can be unintentionally exposed to the public Internet, how to find them, and how to lock them down.
Then we talk about general practices such as vulnerability scanning, how to minimize human error when configuring AWS services, and drill into options such as CloudMapper and Security Monkey, open-source tools to help administrators find and control AWS resources.
Scott Piper’s blog – Duo.com
Scott Piper on GitHub – GitHub
Beyond S3: Exposed Resources on AWS – Duo.com
CloudMapper – GitHub
CloudTracker – GitHub
Netflix Security Monkey – GitHub
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Dave Crocker – Email – Part 2 appeared first on Network Collective.