If you're upgrading your network, it's worthwhile asking others for input in order to avoid a poor or costly design that doesn't serve the needs of your business.
Don’t forget to watch Keith Bogart’s live CCNA/CCNP Q&A session TODAY at 1pm!
During this live Q&A Keith bogart will answer all of your questions about the Cisco CCNA and CCNP Routing and Switching exams. Check back at 1 pm (EST) to get all of your questions answered by an industry expert.
Here’s something I’ve been working on recently: Ansible modules for Extreme SLX switches & routers. Ansible is a popular automation framework, and with good reason: it has a low barrier to entry. Time to usefulness is short. But you need device-specific modules to work with networking devices. Finally we have some modules for SLX. Read on for how to use them.
This blog is not an intro to Ansible in general. There’s plenty of good intros out there. This is specifically about demonstrating Ansible with SLX switches.
Ansible is an agent-less configuration management system. It uses “playbooks”, written in YAML, to define desired configuration state. “modules” written in Python translate this into whatever is needed to configure the system, application, database or network device.
Ansible has been making great strides in adding network automation capabilities. But we haven’t had any modules for working with ~Brocade~ Extreme devices. That is now changing.
PaulQuack has contributed MLXe (Ironware) modules, which will go GA in Ansible 2.5 (due for release in March 2018). And I’ve been working on modules for the SLX, with my colleagues. These have not yet been merged upstream, but it’s Open Source, so you can grab Continue reading
The beta release of Docker Enterprise Edition has seen incredible activity. The highlight of the upcoming Docker Enterprise Edition (Docker EE) release is the integration of Kubernetes and bringing all of the advanced security, RBAC and management capabilities of Docker EE to Kubernetes. At the same time, we have been working to improve Swarm, delivering the only container platform that allows you to run both orchestrators in the same cluster. In this blog post, we’ll highlight some the key new capabilities around application-layer (Layer 7) routing and load balancing for Swarm-deployed applications. These enhancements come from the new Interlock 2.0 architecture which provides a highly scalable and highly available routing solution for Swarm. The new architecture brings some additional features to the platform, including path-based routing and SSL termination.
Layer 7 load balancing allows traffic going to host domains like acme.com to be distributed across specific containers in your environment. With path-based routing, traffic headed to sub-domains within acme.com (eg. acme.com/app1 or acme.com/app2) can be separately routed to different sets of containers. This can be especially useful for optimizing application performance by driving different requests to different groups of containers.
Read Continue reading
Since the 2013 Snowden revelations of mass surveillance, the level of trust in Internet services has plunged. While discussions around privacy protection have advanced considerably, little progress has been achieved in designing operational tools that can be used on a daily basis by citizens around the world without a need to reconfigure their digital communications or change their behavior online. At the Internet Society, we believe such solutions need to be developed in a collaborative and multistakeholder fashion to be effective.
In July 2017, the Internet Society Switzerland Chapter (ISOC-CH) and the Swiss p≡p foundation teamed up to provide a practical solution, namely to implement privacy-enhancing standards at the basic level of Internet protocols and document them in the work of the Internet Engineering Task Force (IETF), the main organization creating voluntary standards to maintain and improve the usability and interoperability of the Internet.
In the framework of a two-year Beyond the Net project with funding from Internet Society (‘Implementing Privacy via Mass Encryption’), we will formalize and help in standardizing the pretty Easy privacy (p≡p) protocols, which can be deployed automatically via encrypted means in order to provide the user with a secure and trustworthy Continue reading
Do you know what a side channel attack is? Do you know how it relates to you as a Network Engineer? In today’s Network Collective Short Take, Russ White helps explain what a side channel attack is, how it works, and some of the challenges that are inherent in defending against it.
The post Short Take – Side Channel Attack appeared first on Network Collective.
As I discussed in my notes to the community during the last months, at our last board meeting Kathy Brown, ISOC’s (Internet Society’s) President & CEO, informed the Board of Trustees that she will not seek another extension of her contract. Consequently, the board formed a CEO Search Committee, which is a subset of the board. The CEO Search Committee selected Perrett Laver as the search firm that will support the committee and the board during the whole process. Please, read my last note for further background information.
Per our plan, we are launching the Open Call for Candidates today, Friday, 9 March 2018.
The deadline for applications is 23:59 UTC on Friday, 6 April 2018.
If you would like to download the Candidate Pack or apply for the position, please visit the Perrett Laver web site using the following link:
https://candidates.perrettlaver.com/vacancies/726/ceo/
Per the web page above, if you would like to have a conversation with Perrett Laver regarding the role, please email the lead researcher on this search, Daniel Flynn:
The search firm will generate a short list of candidates so that the CEO Search Committee can make a final decision and select one. Continue reading
MeriTalk study highlights the state of federal data center transformation and reveals federal IT managers' concerns.