This week's Network Break looks at who takes a haircut in Avaya's Chapter 11 restructuring, GoDaddy's ongoing security issues, new photonics from Nokia, a huge quarter for Arista and more tech news.
The post Network Break 418: Avaya Goes Chapter 11 Again; Cisco, Arista See Revenues Rise appeared first on Packet Pushers.
Authentication is a key technology that underpins large portions of the online world, and so it's worth exploring in a bit more detail. In this episode of the Full Stack Journey podcast, Scott talks with Dan Moore of FusionAuth about all things authentication.
The post Full Stack Journey 075: Authentication’s Role In The Online World appeared first on Packet Pushers.
It might be curmudgeon day. Johna and Greg ask what are mistakes that we have seen in technology strategies.
The post HS040 Top Mistakes Technology Strategists Make appeared first on Packet Pushers.
Efficiency, scalability, and security are critical for modern telco networks. Operating modern 5G network infrastructure requires the ability to manage complex network operations across large-scale multi-cloud and edge environments while also meeting complex security requirements.
The VMware Telco Cloud Platform was built from the ground up to help Communications Service Providers (CSPs) meet these challenges. It combines the capabilities of VMware’s cloud infrastructure and network virtualization software (VMware vSphere, vSAN, and NSX) with a set of networking, security, and management tools built for the telco industry. The platform helps CSPs deploy and manage virtualized network functions and containerized network functions (VNFs and CNFs), reduce costs, and enhance network security while enabling new revenue-generating services.

At MWC 2023, the VMware team will demonstrate four key use cases for the VMware Telco Cloud Platform.
Networking and Security performance acceleration powered by Data Processing Units (DPUs) enables a telco-grade virtualized 5G infrastructure. VMware is announcing the General Availability of DPU-based acceleration for NSX Continue reading


Over the last few years the topic of cyber security has moved from the IT department to the board room. The current climate of geopolitical and economic uncertainty has made the threat of cyber attacks all the more pressing, with businesses of all sizes and across all industries feeling the impact. From the potential for a crippling ransomware attack to a data breach that could compromise sensitive consumer information, the risks are real and potentially catastrophic. Organizations are recognizing the need for better resilience and preparation regarding cybersecurity. It is not enough to simply react to attacks as they happen; companies must proactively prepare for the inevitable in their approach to cybersecurity.
The security approach that has gained the most traction in recent years is the concept of Zero Trust. The basic principle behind Zero Trust is simple: don't trust anything; verify everything. The impetus for a modern Zero Trust architecture is that traditional perimeter-based (castle-and-moat) security models are no longer sufficient in today's digitally distributed landscape. Organizations must adopt a holistic approach to security based on verifying the identity and trustworthiness of all users, devices, and systems that access their networks and data.

Ish wrote an interesting comment on my Network Automation Expert Beginners blog post. He started with:
[Our network has] about 40 sites, but we don’t do total refresh cycles in bulk, just as needed. Everything we do is sporadic, and I’m trying to see the ROI on learning automation for things that are done once in a while that don’t take much time to do manually anyway.
There are two aspects to this part of his comment:
Ish wrote an interesting comment on my Network Automation Expert Beginners blog post. He started with:
[Our network has] about 40 sites, but we don’t do total refresh cycles in bulk, just as needed. Everything we do is sporadic, and I’m trying to see the ROI on learning automation for things that are done once in a while that don’t take much time to do manually anyway.
There are two aspects to this part of his comment:
It’s been almost 25 long years since I started my bachelor’s degree, some 17 years since I began my master’s degree, and around 15 years since I decided to leave a Ph.D. scholarship behind and go back to full-time professional work. Many things have changed, yet one thing has remained the same: the race among […]
The post 12 Practical Tips for Entry-level Job Seeker and Interns in Tech appeared first on Packet Pushers.
They say you should work smarter, not harder. We agree, which is why we’ll be showcasing work at MWC 2023 that brings efficiency and intelligence to modern networking designed to help businesses thrive in the digital era through telco-friendly, smarter networking solutions.
Keep reading for a preview of what to expect from the VMware Networking and Security team at the event – and join us in person in Hall 3, stand 3M11, to check out the latest innovations in cloud networking and security for yourself.
The overall vision that we’ll be displaying in Barcelona at Mobile World Congress from February 27 to March 2 focuses on two key concepts – increasing network efficiency and generating value through smart networking solutions.
Specifically, we’ll be displaying: