Today on the Tech Bytes podcast, sponsored by Palo Alto Networks, we discuss a new ChatOps feature in Palo Alto’s Prisma SD-WAN. Engineers and administrators can query the SD-WAN controller from a chat app such as Microsoft Teams and get a meaningful response. Sutapa Bansal, Director of Product Management at Palo Alto Networks, joins us to discuss how it works, use cases, and implementation.
The post Tech Bytes: Bringing ChatOps Into SD-WAN To Simplify Operations (Sponsored) appeared first on Packet Pushers.
Do you need new hardware to cloud enable your infrastructure ? Should you strategise products on new hardware/greenfield basis or enable your existing brownfield infrastructure ? In this episode we discuss value of enabling existing infrastructure Beware of the vendor goldfield that Greenfield represents Whether supply chain impacts your decisions ? The value of federated […]
The post HS014 Software Defined Infrastructure – New Build or Not ? appeared first on Packet Pushers.
This week's Network Break asks whether Broadcom's acquisition of AppNeta, which offers SaaS-based digital experience monitoring, is a good fit. We look at new features in the SONiC network OS, dive into a new firewall service available from Cloudflare, and more IT news.
The post Network Break 363: Broadcom Buys AppNeta For Experience Monitoring; Cloudflare Offers New Firewall Service appeared first on Packet Pushers.
The Internet is a dynamic place. Websites are constantly changing as technologies and business practices evolve. What was front-page news is quickly moved into a sub-directory. To ensure website visitors continue to see the correct webpage even if it has been moved, administrators often implement URL redirects.
A URL redirect is a mapping from one location on the Internet to another, effectively telling the visitor's browser that the location of the page has changed, and where they can now find it. This is achieved by providing a virtual ‘link’ between the content’s original and new location.
URL Redirects have typically been implemented as Page Rules within Cloudflare, up to a maximum of 125 URL redirects per zone. This limitation meant customers with a need for more URL redirects had to implement alternative solutions such Cloudflare Workers to achieve their goals.
To simplify the management and implementation of URL redirects at scale we have created Bulk Redirects. Bulk Redirects is a new product that allows an administrator to upload and enable hundreds of thousands of URL redirects within minutes, without having to write a single line of code.
Mail forwarding is a product offered by postal Continue reading
The way enterprises design, build and run applications has changed significantly over the past several years with the evolution of microservices and containers. No longer are applications built using a monolithic architecture—evenly stacked and centrally organized in a way that made it easy to manage and secure. Today’s modern applications are spread out in thousands of microservices across data centers and the cloud—able to be spun up and down wherever users log in.
While microservices provide reusable elements to accelerate software development, the software supply chain itself could become an attack vector. In an effort to enable business agility without putting the enterprise at risk, organizations need to infuse security directly into DevOps processes and throughout the software supply chain at large. This makes security everyone’s responsibility—whether they are a user, a developer or a platform owner—to protect the applications that are consumed for work and for life.
The Rise (and Risk) of Kubernetes
Microservices applications need Kubernetes as an orchestrator to handle scheduling of containers in a cluster of servers, load balancing those containers, managing permissions and access control and many other Day 2 concerns. Kubernetes wasn’t the first orchestrator, but its rapid adoption makes it a defecto standard today for running scalable and resilient containerized applications. According Continue reading
When you hear the word “entrepreneur” what do you think? Do you imagine a successful businessman or woman, like Steve Jobs or Mark Zuckerberg, who founded and is running their own company? Or maybe someone who has an online business that they run from home. Well, these are both examples of entrepreneurial success stories. But not everyone can be as lucky as those two! There are many people out there who have started their own businesses with no experience in entrepreneurship whatsoever. So how did they become so successful? Let’s take a look at 5 students who became successful entrepreneurs to find out!
Benelab Technologies is an online business that specializes in selling CBD products. It was started by Jack Kim when he was just 15 years old, after his parents were diagnosed with cancer and needed to use the medicinal benefits of cannabinoids for pain relief. Now at 20 years old, this young entrepreneur has turned Benelab into a multi-million dollar company.
Jack is perhaps the most well-known student entrepreneur in this list, with his story being featured everywhere from Forbes to CNET News. However, he isn’t the only young person on our list Continue reading
The world is strange today. Despite the Covid-19 crisis all over the world, most ISPs are fighting a battle to deliver more bandwidth on a daily basis.
All pushed ISPs to their bandwidth limits, leaving ISP’s no option but to look for upgrades, for everlasting bandwidth demands. There, they are having another set of problems, facing them in this completely new and strange world. Chip shortage, logistic and labor health issues caused higher prices and no stock availability. Here in IP ArchiTechs, we are spending lot of our time finding a good solution for our customers and to help them overcome these hard times. Whether that is our regular Team meeting or just a chat with our colleagues in almost any occasion someone mentions something about new solution to improve capacity and performance for our customers.
Starting with a thought, what is available as a platform today, and of course it’s ready to be shipped immediately after you checkout and pay one thing obviously was just in front of me. X86 server, dozens of them. They are left from the time when we were buying new hardware just because new generation Continue reading
Setting up a network automation development environment is an interesting task:
Now imagine having to do that for a dozen networking engineers and software developers working on all sorts of semi-managed laptops. Containers seem to be one of the sane solutions1.
Setting up a network automation development environment is an interesting task:
Now imagine having to do that for a dozen networking engineers and software developers working on all sorts of semi-managed laptops. Containers seem to be one of the sane solutions1.
Hello my friend,
Recently I was talking to a colleague from the network automation area, and during the discussion we touched a topic of NAPALM, and which role it plays today, and what may be its future. This discussion triggered me to think more about this topic and I decided to share thoughts with you.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
No, it won’t. Actually, it is quite opposite. It will be becoming even more important and it will be taking even more complicated forms, such as integration with Artificial Intelligence and Machine Learning (AI/ML) to help companies to reduce amounts and durations of downtimes. It doesn’t mean that traditional network technology knowledge are less important: they absolutely are. However, the automation is unavoidable and you have to know it in order to stay in the profession. And pretty much, like with network technology you start with fundamentals of protocols before starting configuring them, in the Continue reading
On today's Heavy Networking we discuss a Nautobot, an open-source software tool that can serve as a source of truth for network automation. We explore how Nautobot works, what it's used for, how it ties in with Python and Ansible, major features, and more.
The post Heavy Networking 610: Network Automation With Nautobot appeared first on Packet Pushers.
Building a corporate network is hard. We want to enable IT teams to focus on exploring and deploying cutting edge technologies to make employees happier and more productive — not figuring out how to add 100 Mbps of capacity on the third floor of a branch office building.
And yet, as we speak to CIOs and IT teams, we consistently hear of the challenge required to manage organization connectivity. Today, we’re sharing more about how we’re solving connectivity challenges for CIOs and IT teams. There are three parts to our approach: we’re making our network more valuable in terms of the benefit you get from connecting to us; we’re expanding our reach, so we can offer connectivity in more places; and we’re further reducing our provisioning times, so there’s no more need to plan six months in advance.
Cloudflare delivers security, reliability, and performance products as a service, all from our global network. We’ve spent the past week talking about new releases and enhanced functionality — if you haven’t yet, please check out some exciting posts on how to replace your hardware firewall, managing third party tools in the cloud, and protecting your web pages Continue reading