Archive

Category Archives for "Networking"

Hedge 192: Addiction Recovery

Addiction and addiction recovery are not a “normal” Hedge topic, but addiction afflicts many people in Information Technology. We’re all “hard driven” types, who feel failure keenly, and we tend to spend more time working than is probably healthy for us. Brett Lovins has been through addiction and recovery, and joins Tom Ammon, Russ White, and Eyvonne Sharp to talk about this high impact topic.

download

Cisco, Kyndryl step up partnership to cut enterprise security threats

Cisco and Kyndryl have expanded their partnership to offer new services that are aimed at helping enterprise customers better detect and respond to cyber threats.Specifically, Kyndryl will be integrating its own cyber resiliency offering with Cisco’s overarching Security Cloud platform that includes security components such as Cisco’s Duo access control, extended detection and response features, and Multicloud Defense, which orchestrates security and policy across private and public clouds.Security Cloud operates as a layer on top of the infrastructure across a customer’s cloud services – including Azure, AWS, GCP and private data-center clouds – to protect core applications, Cisco said. It features a unified dashboard, support for flexible trust policies, and open APIs to encourage third-party integrators. By correlating data and employing artificial intelligence and machine learning, Cisco Security Cloud can detect and remediate threats quickly throughout an organization, Cisco says.To read this article in full, please click here

Cisco, Kyndryl step up partnership to cut enterprise security threats

Cisco and Kyndryl have expanded their partnership to offer new services that are aimed at helping enterprise customers better detect and respond to cyber threats.Specifically, Kyndryl will be integrating its own cyber resiliency offering with Cisco’s overarching Security Cloud platform that includes security components such as Cisco’s Duo access control, extended detection and response features, and Multicloud Defense, which orchestrates security and policy across private and public clouds.Security Cloud operates as a layer on top of the infrastructure across a customer’s cloud services – including Azure, AWS, GCP and private data-center clouds – to protect core applications, Cisco said. It features a unified dashboard, support for flexible trust policies, and open APIs to encourage third-party integrators. By correlating data and employing artificial intelligence and machine learning, Cisco Security Cloud can detect and remediate threats quickly throughout an organization, Cisco says.To read this article in full, please click here

Carriers vs. aggregators: How to select the optimal mix of network transport providers

Enabled by SD-WAN, internet-first networking strategies are now the order of the day for wide-area connectivity and have been for some time. While MPLS used to be the de facto choice for enterprise-grade network transport, companies today are using internet-based transport technologies such as dedicated internet access, business broadband, cellular broadband as well as other niche network technologies like microwave.Best practices call for companies to work with multiple suppliers to get competitive prices, maximize service coverage, and secure better service delivery performance. But which suppliers should an enterprise select? How do you figure out the best fit for an enterprise’s needs, and what are some of the challenges and gotchas of a multi-supplier portfolio approach?To read this article in full, please click here

Kubernetes Unpacked 033: Platform Engineering And The CNCF White Paper

In today's episode, Michael and Kristina catch up with Saim Safdar to chat about a recent white paper on platform engineering from the Cloud Native Computing Foundation (CNCF). Saim dives into not only the CNCF whitepaper, but how Platform Engineering should be thought about from a Kubernetes perspective in 2023 and beyond.

The post Kubernetes Unpacked 033: Platform Engineering And The CNCF White Paper appeared first on Packet Pushers.

Star your favorite websites in the dashboard

Star your favorite websites in the dashboard
Star your favorite websites in the dashboard

We’re excited to introduce starring, a new dashboard feature built to speed up your workflow. You can now “star” up to 10 of the websites and applications you have on Cloudflare for quicker access.

Star your websites or applications for more efficiency

We have heard from many of our users, particularly ones with tens to hundreds of websites and applications running on Cloudflare, about the need to “favorite” the ones they monitor or configure most often. For example, domains or subdomains that our users designate for development or staging may be accessed in the Cloudflare dashboard daily during a build, migration or a first-time configuration, but then rarely touched for months at a time; yet every time logging in, these users have had to go through multiple steps—searching and paging through results—to navigate to where they need to go. These users seek a more efficient workflow to get to their destination faster. Now, by starring your websites or applications, you can have easier access.

How to get started

Star a website or application

Today, you can star up to 10 items per account. Simply star a website or application you have added to Cloudflare from its Overview page. Once Continue reading

OpenELA group pushes for bug compatibility with RHEL

A dramatic disagreement in the enterprise Linux community has some distributions scrambling to keep their code compatible with Red Hat, as the acknowledged biggest player in the space cracks down on source code distribution.The core issue is the existence of several “downstream” Linux distributions based on Red Hat Enterprise Linux. Those distributions were historically based on CentOS, a free RHEL clone developed originally for the purposes of testing and development. The downstream distributions in question, however, are supported by companies like CIQ and Oracle – which sell support services for their “clones” of RHEL. This has led to a long-running tension between those companies and Red Hat, whose supporters argue that the downstream companies are simply repackaging Red Hat’s work for profit, while detractors say that Red Hat is violating the sprit – if not, technically, the law – of open source.To read this article in full, please click here

OpenELA group pushes for bug compatibility with RHEL

A dramatic disagreement in the enterprise Linux community has some distributions scrambling to keep their code compatible with Red Hat, as the acknowledged biggest player in the space cracks down on source code distribution.The core issue is the existence of several “downstream” Linux distributions based on Red Hat Enterprise Linux. Those distributions were historically based on CentOS, a free RHEL clone developed originally for the purposes of testing and development. The downstream distributions in question, however, are supported by companies like CIQ and Oracle – which sell support services for their “clones” of RHEL. This has led to a long-running tension between those companies and Red Hat, whose supporters argue that the downstream companies are simply repackaging Red Hat’s work for profit, while detractors say that Red Hat is violating the sprit – if not, technically, the law – of open source.To read this article in full, please click here

BGP Labs: The Basics

The first BGP labs are online. They cover the basic stuff (one has to start with the basics, right?):

The labs are supposed to be run on virtual devices, but if you’re stubborn enough it’s possible to make them work with the physical gear. In theory, you could use any system you like to set up the virtual lab (including GNS3 and CML/VIRL), but your life will be way easier if you use netlab – it supports BGP on almost 20 different devices. For more details, read the Installation and Setup documentation.

BGP Labs: The Basics

The first BGP labs are online. They cover the basic stuff (one has to start with the basics, right?):

The labs are supposed to be run on virtual devices, but if you’re stubborn enough it’s possible to make them work with the physical gear. In theory, you could use any system you like to set up the virtual lab (including GNS3 and CML/VIRL), but your life will be way easier if you use netlab – it supports BGP on almost 20 different devices. For more details, read the Installation and Setup documentation.

Introducing the 2023 Intern-ets!

Introducing the 2023 Intern-ets!
Introducing the 2023 Intern-ets!

This year, Cloudflare welcomed a class of approximately 40 interns, hailing from five different countries for an unforgettable summer. As we joined both remotely and in-person across Cloudflare’s global offices, our experiences spanned a variety of roles from engineering, product management to internal auditing and marketing. Through invaluable mentorship, continuous learning, and the chance to make a real-world impact, our summer was truly enriched at every step. Join us, Anni and Emilie, as we provide an insider's perspective on a summer at Cloudflare, sharing snippets and quotes from our intern cohort.

printf(“Hello Intern-ets!”)

You might have noticed that we have a new name for the interns: the Intern-ets! Our fresh intern nickname was born from a brainstorm between us and our recruiter, Judy. While “Cloudies”, “Cloudterns”, and “Flaries” made the shortlist, a company-wide vote crowned "Intern-ets" as the favorite. And just like that, we've made Cloudflare history!

git commit -m “Innovation!”

We're all incredibly proud to have gotten the opportunity to tackle interesting and highly impactful projects throughout the duration of our internships. To give you a glimpse of our summer, here are a few that showcase the breadth and depth of our experiences.

Mia M., Product Continue reading

BrandPost: What do music and multi-cloud networking (MCN) have in common?

By: Nav Chander, Head of Service Provider SD-WAN/SASE Product Marketing at HPE Aruba Networking.In this first of a three-part blog series on SD-WAN, SSE, and multi-cloud networking (MCN), where we will highlight how these three technology areas are analogous to three different musical instruments that can be played separately. However, when these three technologies are “synchronized,” much like a musical ensemble of the three instruments blends the music to create a perfect harmony and an enjoyable listening experience.To read this article in full, please click here

Versa enhances SASE package with AI-based security tools

Versa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.To read this article in full, please click here

Versa enhances SASE package with AI-based security tools

Versa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.To read this article in full, please click here