Archive

Category Archives for "Networking"

Cisco opens DNA Center network control and management software to the DevOps masses

ORLANDO – Cisco made a bold move this week to broaden the use of its DNA Center by opening up the network controller, assurance, automation and analytics system to the community of developers looking to take the next step in network programming.Introduced last summer as the heart of its Intent Based Networking initiative, Cisco DNA Center features automation capabilities, assurance setting, fabric provisioning and policy-based segmentation for enterprise networks.[ Now see What is quantum computing [and why enterprises should care.] David Goeckeler, executive vice president and general manager of networking and security at Cisco told the Cisco Live customer audience here that DNA Center’s new open platform capabilities mean all its powerful, networkwide automation and assurance tools are available to partners and customers. New applications can use the programmable network for better performance, security and business insights, he said.To read this article in full, please click here

Tool: Oracle Internet Intelligence

New tool from Oracle for monitoring high level traffic and BGP transitions on the Internet – Oracle Internet Intelligence Map Oracle’s Internet Intelligence team is dedicated to reporting and covering issues such as country-level connectivity statistics, transit shifts, and security threats that impact the performance of the global internet. Oracle’s Dyn division is a managed DNS service […]

Automation for Reliability

Statistics says, the more often you do something, the higher the chances of a negative event occurring when you do it.

Applying this revelation, if you fly regularly, the chances increase of a delayed flight, or being involved in an incident or accident. A somewhat macabre reference perhaps.

Let’s take something real which happened to me this week (11th June 2018). Whilst working out of one of Juniper’s regional offices, I returned back to the hotel room to carry on working whilst putting my feet up. Something felt strange in the room but I couldn’t put my finger on the weirdness. After a couple of hours, I realised that all of my belongings were gone from the room. Everything! Thanks to a mix-up with the house keeping system, the maids threw my collection of travel items in to some bags ready for disposal. Thanks to a procedure that the hotel operates, for my items to be thrown to the garbage, a manager is required to sign off on the request. A process saved my belongings and I’m thankful that the managers knew this process and also knew where my stuff was likely to be. Before my items were returned, I Continue reading

Considerations Regarding Encryption and Exceptional Access Briefing

On June 12, 2018, the Internet Society hosted a briefing for Congressional staff on encryption and lawful access. Considerations Regarding Encryption and Exceptional Access offered an opportunity for participants to learn more about the technical aspects of encryption, risks associated with creating back doors, and other technical means for lawful access.

Before beginning the conversation, participants were given a primer on encryption, which offered high-level explanation of different kinds of encryption and exceptional access, and shown a video on end-to-end encryption, which used colors to explain how encryption keys are exchanged. Encryption experts, including Christine Runnegar (Senior Director, Internet Trust, Internet Society), Robyn Greene (Policy Counsel and Government Affairs Lead, Open Technology Institute), and Maurice Turner (Senior Technologist, Center for Democracy and Technology), then engaged in a two-hour, in-depth conversation with participants, answering questions and discussing global norms and policies.

The panelists emphasized that encryption is currently the most robust security tool in existence, but just as it gets more sophisticated, so too do hackers. Sooner or later this security tool will likely be bypassed and new tools will need to be created. Weakening encryption by creating keys for “backdoor” access that can evade its security measures makes any Continue reading

Federated Application Management in Docker Enterprise Edition

Today at DockerCon, we demonstrated new application management capabilities for Docker Enterprise Edition that will allow organizations to federate applications across Docker Enterprise Edition environments deployed on-premises and in the cloud as well as across cloud-hosted Kubernetes. This includes Azure Kubernetes Service (AKS), AWS Elastic Container Service for Kubernetes (EKS), and Google Kubernetes Engine (GKE).

A Single Control Plane for Multi-Cloud Deployments

Most enterprise organizations have a hybrid or multi-cloud strategy and the rise of containers has helped to make applications more portable. However, when organizations start to adopt containers as their default application format, they start to run into the challenges of managing multiple container environments, especially when each of them has a different set of access controls, governance policies, content repositories and operational models. For common hybrid and multi-cloud use cases like bursting applications to the cloud for additional capacity or migrating them from one site to another for availability or compliance reasons, organizations start to realize the need for a singular control plane for all containerized applications – no matter where it will be deployed.

Docker Enterprise Edition is the only enterprise-ready container platform that can deliver federated application management with a secure supply chain. Not only Continue reading

Extending Kubernetes to Windows Server with Docker Enterprise Edition

Docker and Microsoft have been working together since 2014 to bring containers to Windows and .NET applications. Today at DockerCon, we share the next step in this partnership with the preview and demonstration of Kubernetes on Windows Server with Docker Enterprise Edition.

Docker and Microsoft Advance Windows Containers

Docker and Microsoft brought container technology into Windows Server 2016, ensuring consistency for the same Docker Compose file and CLI commands across both Linux and Windows. Windows Server ships with a Docker Enterprise Edition engine, meaning all Windows containers today are based on Docker. Recognizing that most enterprise organizations have both Windows and Linux applications in their environment, we followed that up in 2017 with the ability to manage mixed Windows and Linux clusters in the same Docker Enterprise Edition environment, enabling support for hybrid applications and driving higher efficiencies and lower overhead for organizations. Using Swarm orchestration, operations teams could support different application teams with secure isolation between them, while also allowing Windows and Linux containers to communicate over a common overlay network.

Since then, Docker has seen the rapid rise of Windows containers as organizations recognize the benefits of containerization and want to apply them across their entire application Continue reading

Rackspace introduces data center colocation services

The effort around data center reduction has been to draw down everything, from hardware to facilities. Rackspace has an interesting new twist, though: Put your hardware in our data centers.The company announced a new data center colocation business this week, offering space, power, and network connectivity to customers who provide their own hardware. The facilities are in 10 locations around the world.It’s not a bad idea. The servers are the cheapest expense compared to facility costs, such as the physical building, power, and cooling.[ Learn how server disaggregation can boost data center efficiency and how Windows Server 2019 embraces hyperconverged data centers. | Get regularly scheduled insights by signing up for Network World newsletters. ] 'Lift and shift' to the cloud The new business, dubbed Rackspace Colocation, is positioned as a way for enterprises to kick off their cloud journey by getting out of their self-managed data center to lower their expenses as they move to the cloud.To read this article in full, please click here