Right around the same time I joined Arista in 2009, Amazon Web Services developed the concept of the Virtual Private Cloud, one of the seminal technologies that became a core construct deployed throughout public clouds enabling enterprise customers to corral and protect resources and provision them into logical groups, align security policies, and simplify their management. Following this, Google developed a model for Virtual Private Clouds that spanned regions allocating one subnet per region by default - creating the first multi-region VPC within a single cloud provider.
Blending the needs of DevOps and NetOps best positions companies to deliver the business outcomes...
Imagine you want to create a Jinja2 report that includes only a select subset of elements of a data structure… and want to have header, footer, and element count in that report.
Traditionally we’d solve that challenge with an extra variable, but as Jinja2 variables don’t survive loop termination, the code to do that in Jinja2 gets exceedingly convoluted.
Fortunately, Jinja2 provides a better way: using a conditional expression to select the elements you want to iterate over.
Managed Service Providers (MSPs) are trying to sell SD-WAN services by convincing you that you don't have the staff, training, or competence to operate an SD-WAN. On today's Heavy Networking, Greg Ferro and Ethan Banks pick this argument apart to see if there's anything to it.
The post Heavy Networking 483: SD-WAN Incompetence, Myths, And Fallacies appeared first on Packet Pushers.
When talking about Nornir and Ansible, speed is one of the topics that come up from time to time. A common argument for Nornir is that it performs better when working with either many hosts or lots of data. For some who hear this, it isn’t entirely clear what we mean. This article will look at some numbers. Recently I came across a quote by Kelsey Hightower that stuck with me.
“You haven’t mastered a tool until you understand when it should not be used.”
Let’s see if any of that can be applied here. Continue reading
Today's Tech Bytes podcast explores active and passive monitoring techniques employed by sponsor AppNeta to monitor performance and end user experience on 100Gbps links. Our guests are Adam Edwards, Chief Customer Officer; and Mike Hustler, VP of Engineering at AppNeta.
The post Tech Bytes: Monitoring 100Gbps Circuits With AppNeta (Sponsored) appeared first on Packet Pushers.
Six years ago, VMware pioneered the concept of micro-segmentation to stop the internal, lateral spread of malware. We then launched the NSX Service-defined Firewall, an internal firewall that’s built into the hypervisor, distributed, and application aware. Shortly thereafter we introduced NSX Intelligence to automate security rule recommendations, streamlining the deployment of micro-segmentation.
Now we are announcing that we will be taking internal security to the next level by introducing optional Intrusion Detection and Prevention (IDS/IPS) for our Service-defined Firewall. Built on the same philosophy, the new NSX Distributed IDS/IPS will allow enterprises to fortify applications across private and public clouds.
Intrinsic Security is security that’s built in, not bolted on. And that makes it better.
When security is bolted on, it’s never as good as built-in security. Imagine an apartment building where you add the alarm system, the security cameras, and the fire escape after the fact. It looks awkward and doesn’t work that well, either.
But when you design those things in upfront, the effect is completely different. Everything just works better, as parts of a whole system. The same thing is true for security.
More importantly, when you build in Continue reading
The integrations aim to improve application performance for enterprises using Office 365 and reduce...
Every important measure of financial performance is down, including active accounts, revenue, net...
Volterra’s cloud-native, SaaS-based platform can be deployed across multiple public clouds and...