Recently, we released our new “Calico Certified Operator: AWS Expert” course. You can read more about why we created this course and how it can benefit your organization in the introductory blog post.
This blog post is different; it’s an opportunity for you, the potential learner, to get a glimpse of just a few interesting parts of the course. You won’t learn all the answers here, but you’ll learn some of the questions!
If you find that you already know the answers, then you’re all set to grab yourself a shiny badge. If not, consider taking some time to invest in your personal development and pick up some new knowledge in AWS and container networking—really current and relevant knowledge.
Let’s take a sneak peek at what the “Calico Certified Operator: AWS Expert” course has to offer.
There are several ways to build a Kubernetes cluster in AWS. There is no single “right” way. What are the considerations your organization should have in mind, and how can you help your organization make an informed choice?
You will review, amongst many other things, how to decide:
Like many other languages, Crystal has a few methods of controlling a programs flow of execution. if/elsif/else if and elsif conditions are evaluated on being truthy or falsy unless unless can be though if as a synonym for if not. case/when case/when blocks are usually...continue reading
Crystal has a set of looping structures similar to what can be found in other languages. Each An each loop is similar to a for loop in other languages. Times times allows you to iterate for N number of iterations. While/Loop while and loop have similar behaviour and start an...continue reading
Method A Method in Crystal is like a fuction in other languages. Overloading Methods in Crystal can be overloaded. This means that methods with the same name but different signatures are treated as different methods. Default Parameters Methods can have default parameters. Splat ...continue reading
Method A Method in Crystal is like a fuction in other languages. Overloading Methods in Crystal can be overloaded. This means that methods with the same name but different signatures are treated as different methods. Default Parameters Methods can have default parameters. Splat ...continue reading

We talk a lot of about telemetry in the networking world, but generally as a set of disconnected things we measure, rather than as an entire system. We also tend to think about what we can measure, rather than what is useful to measure. Dinesh Dutt argues we should be thinking about observability, and how to see the network as a system. Listen in as Dinesh, Tom, And Russ talk about observability, telemetry, and Dinesh’s open source network observability project.

The Hedge is over 90 episodes now … I’m a little biased, but I believe we’re building the best content in network engineering—a good blend of soft skills, Internet policy, research, open source projects, and relevant technical content. You can always follow the Hedge here on Rule 11, of course, but it’s also available on a number of services, including—
I think it’s also available on Amazon Music, but I don’t subscribe to that service so I can’t see it. You can check the Podcast Directory for other services, as well. If you enjoy the Hedge, please post a positive rating so others can find it more easily.
Today's Day Two Cloud podcast dives into Cloud Development Kits (CDKs). How do CDKs differ from tools such as Terraform? What are the selling points for CDKs for infrastructure and development professionals? Our guest is Michael Levan, Researcher and Consultant at GigaOM.
The post Day Two Cloud 108: Putting The Dev In DevOps appeared first on Packet Pushers.
How do you measure IT Security ? Specifically, how do you decide to allocate budget and justify the underlying reasoning. Most companies allocate a percentage of IT Budget, but Johna argues differently.
The post HS 009 The Metrics of IT Security appeared first on Packet Pushers.

As a policymaker or executive, do you worry about your data getting stolen or intercepted? Or your website suffering an attack? Or your services being shut down? Today on the MANRS blog, we’re introducing new primers that explain why you should care about routing security and simple steps you can take to decrease routing security […]
The post New MANRS Routing Security Primers for Decision-makers appeared first on Internet Society.