When you aren’t the size of Netflix, you may not be guaranteed dedicated infrastructure within a data center; you have to share. Even in larger organizations, multitenancy may be required to solve regulatory compliance issues. So what is multitenancy, how does it differ from other forms of resource division, and what role do networks play?
Gartner Inc. defines multitenancy as “a reference to the mode of operation of software where multiple independent instances of one or multiple applications operate in a shared environment. The instances (tenants) are logically isolated, but physically integrated.” This is basically a fancy way of saying “cutting up IT infrastructure so that more than one user/department/organization/and so on can share the same physical IT infrastructure, without being able to see one another’s data.”
That “without being able to see one another’s data” is the critical bit. Allowing multiple users to use a single computer has been possible for decades. Multi-user operating systems, for example, can allow multiple users to log in to a single computer at the same time. While this approach does allow multiple users to share a physical piece of IT infrastructure, it isn’t multitenancy.
In a multi-user OS, the multiple users Continue reading
Robin Gilijamse deployed a 10000 user remote working VPN in about 4 weeks. We briefly discuss the design and some lessions learned from the project.
The post BiB090 – Deploying a 10000 user VPN in a Month appeared first on Packet Pushers.
As COVID-19 spreads around the globe, so has misinformation about the virus. Log into any social media account and it’s easy to get confused by friends and family sharing contradictory messages on anything from infection rates, to local preventative measures, and what to do if we feel a dreaded cough coming on.
Truth matters – especially when public health is involved – and we often rely on journalists and news sources around the world to help us separate fact from fiction. And, whether we realize it or not, there’s a digital security tool that is a critical factor in the trust equation: encryption.
In a period that has seen various governments and law enforcement representatives propose laws that would weaken it, the pandemic is an important reminder of the role encryption plays to protect both journalists, their sources, and general news integrity.
End-to-end (E2E) encryption is a tool that keeps digital communications private by scrambling content so that only the sender and receiver have the keys to unscramble and read it.
This is crucial for journalists.
Journalists often rely on secure communication services like E2E messaging apps to connect with sources in a trustworthy way. With COVID-19 spreading, many organizations Continue reading
I am an engineer that loves docs. Well, OK, I don’t love all docs but I believe docs are a crucial, yet often neglected element to a great developer experience. I work on the developer experience team for Cloudflare Workers focusing on several components of Workers, particularly on the docs that we recently migrated to Gatsby.
Through porting our documentation site to Gatsby I learned a lot. In this post, I share some of the learnings that could’ve saved my former self from several headaches. This will hopefully help others considering a move to Gatsby or another static site generator.
Prior to our migration to Gatsby, we used Hugo for our developer documentation. There are a lot of positives about working with Hugo - fast build times, fast load times - that made building a simple static site a great use case for Hugo. Things started to Continue reading
A lot of people are confused about the roles of network layers (some more than others), the interactions between MAC addresses, IP addresses, and TCP/UDP port numbers, the differences between routing and bridging… and why it’s so bad to bridge across large distances (or in large networks).
I tried to explain most of those topic in How Networks Really Work webinar (next session coming on April 2nd), but as is usually the case someone did a much better job: you MUST READ the poetic and hilariously funny World in which IPv6 was a good design by Avery Pennarun.
Now that all Cisco employees work remotely, it sees more than 170,000 remote network connections...
Tier-1 operators backed new TIP specifications; Juniper VP shared security strategy to make...
Tyler Champion joins SDxCentral as the Director of Client Success. Here are his thoughts on client...
The promise of 5G hinges on adoption of cloud-native technologies and specifically Kubernetes as...
With the development of new 5G hardware, many vendors are shifting their focus to more flexible...
Converged IT and OT security platforms are one way that service providers and security vendors are...
For every positive associated with low-, mid-, and high-band spectrum, there are just as many...
The transponder, which is developed by Deutsche Telekom, NTT, Telefónica, Telia, and Vodafone, is...
Both firms’ market reports echo similar findings of vendors spending billions to build or expand...