In this final episode of the Ansible For Network Automation course, Josh VanDeraa explores how to gather network information, setting up Meraki VLANs with Ansible, and creating and deleting Meraki SSIDs. You can find the full playlist with all the videos in the course on the Packet Pushers’ YouTube channel. You can subscribe to the […]
The post Ansible For Network Automation Lesson 11: Ansible For Meraki – Video appeared first on Packet Pushers.
Course instructor Josh VanDeraa provides more detail on roles in Ansible, and then shows a practical example by configuring and verifying QoS settings on network devices by taking advantage of roles. You can find the full playlist with all the videos in the course on the Packet Pushers’ YouTube channel. You can subscribe to the […]
The post Ansible For Network Automation Lesson 10: Ansible Configuration And Verification – Video appeared first on Packet Pushers.
The following post is sponsored by Palo Alto Networks. SASE, or Secure Access Service Edge, doesn’t require new skills for network engineers so much as a new mindset. You don’t learn a new routing protocol or encryption tunnel. You do need to embrace diverse connectivity options, hybrid work, and supporting applications that are on premises […]
The post Why SASE Requires A New Way Of Thinking appeared first on Packet Pushers.
Kubernetes is hard. Regardless of what tech marketing says, DevOps teams are still trying to implement and figure out this whole Kubernetes thing. With multi-cloud, hybrid cloud, and on-prem Kubernetes implementations, how can teams start their journey and have an impact? Michael Levan catches up with Jeff Smith, Ops Director and author, to talk about his journey into Kubernetes for his team and what other teams should think about when implementing Kubernetes.
The post Kubernetes Unpacked 006: The Impact Of Kubernetes On DevOps Teams appeared first on Packet Pushers.
Practically all data sent over the Internet today is at risk in the future if a sufficiently large and stable quantum computer is created. Anyone who captures data now could decrypt it.
Luckily, there is a solution: we can switch to so-called post-quantum (PQ) cryptography, which is designed to be secure against attacks of quantum computers. After a six-year worldwide selection process, in July 2022, NIST announced they will standardize Kyber, a post-quantum key agreement scheme. The standard will be ready in 2024, but we want to help drive the adoption of post-quantum cryptography.
Today we have added support for the X25519Kyber512Draft00 and X25519Kyber768Draft00 hybrid post-quantum key agreements to a number of test domains, including pq.cloudflareresearch.com.
Do you want to experiment with post-quantum on your test website for free? Mail [email protected] to enroll your test website, but read the fine-print below.
If you enroll your website to the post-quantum beta, we will add support for these two extra key agreements alongside the existing classical encryption schemes such as X25519. If your browser doesn’t support these post-quantum key agreements (and none at the time Continue reading
The pro and con's of having preferred supplier for IT technology ? You can save time and effort, simplify purchasing and move quicker but are you getting the best solution and support. We discuss different perspectives on going down the path and point out the subscription pricing moves towards vendor lockin.
The post HS029 Do You Want A Strategic Vendor ? appeared first on Packet Pushers.