Blending the needs of DevOps and NetOps best positions companies to deliver the business outcomes...
Imagine you want to create a Jinja2 report that includes only a select subset of elements of a data structure… and want to have header, footer, and element count in that report.
Traditionally we’d solve that challenge with an extra variable, but as Jinja2 variables don’t survive loop termination, the code to do that in Jinja2 gets exceedingly convoluted.
Fortunately, Jinja2 provides a better way: using a conditional expression to select the elements you want to iterate over.
Managed Service Providers (MSPs) are trying to sell SD-WAN services by convincing you that you don't have the staff, training, or competence to operate an SD-WAN. On today's Heavy Networking, Greg Ferro and Ethan Banks pick this argument apart to see if there's anything to it.
The post Heavy Networking 483: SD-WAN Incompetence, Myths, And Fallacies appeared first on Packet Pushers.
When talking about Nornir and Ansible, speed is one of the topics that come up from time to time. A common argument for Nornir is that it performs better when working with either many hosts or lots of data. For some who hear this, it isn’t entirely clear what we mean. This article will look at some numbers. Recently I came across a quote by Kelsey Hightower that stuck with me.
“You haven’t mastered a tool until you understand when it should not be used.”
Let’s see if any of that can be applied here. Continue reading
Today's Tech Bytes podcast explores active and passive monitoring techniques employed by sponsor AppNeta to monitor performance and end user experience on 100Gbps links. Our guests are Adam Edwards, Chief Customer Officer; and Mike Hustler, VP of Engineering at AppNeta.
The post Tech Bytes: Monitoring 100Gbps Circuits With AppNeta (Sponsored) appeared first on Packet Pushers.
Six years ago, VMware pioneered the concept of micro-segmentation to stop the internal, lateral spread of malware. We then launched the NSX Service-defined Firewall, an internal firewall that’s built into the hypervisor, distributed, and application aware. Shortly thereafter we introduced NSX Intelligence to automate security rule recommendations, streamlining the deployment of micro-segmentation.
Now we are announcing that we will be taking internal security to the next level by introducing optional Intrusion Detection and Prevention (IDS/IPS) for our Service-defined Firewall. Built on the same philosophy, the new NSX Distributed IDS/IPS will allow enterprises to fortify applications across private and public clouds.
Intrinsic Security is security that’s built in, not bolted on. And that makes it better.
When security is bolted on, it’s never as good as built-in security. Imagine an apartment building where you add the alarm system, the security cameras, and the fire escape after the fact. It looks awkward and doesn’t work that well, either.
But when you design those things in upfront, the effect is completely different. Everything just works better, as parts of a whole system. The same thing is true for security.
More importantly, when you build in Continue reading
The integrations aim to improve application performance for enterprises using Office 365 and reduce...
Every important measure of financial performance is down, including active accounts, revenue, net...
Volterra’s cloud-native, SaaS-based platform can be deployed across multiple public clouds and...
The preview launch continues the broader industry push to help enterprises deal with “cloud...
Walking away: A Russian law that allows the country to disconnect from the outside Internet in the case of a cyberwar has gone into effect, PC Mag reports. The law allows the government there to serve up its own approved version of the Internet to residents. Some critics say the law could make the entire Internet more open to attacks.
Gone missing: The Internet has lost its soul by pushing commercial interests ahead of the public good, argues Janet Abbate, a professor of science, technology, and society at Virginia Tech in a column at the Washington Post. “Expanding access to the Internet, combined with looser government regulations, ultimately produced a situation no one foresaw or intended,” she writes. “On today’s Internet, conspiracy theories run rampant, identities can be faked and our real-life elections are vulnerable to manipulation. A network designed for spreading truth became a profit-driven industry, a public sphere that threatens to undermine the public good.”
Into middle age: There were a lot of recent articles about an important Internet milestone in late October. Ars Technica notes that the original ARPANET had just four nodes when it launched in 1969. “The first letters transmitted, sent from UCLA to Stanford Continue reading
The latest Network Break covers Fortinet's acquisition of endpoint security company EnSilo, digs into Gigamon's new network detection and response product, covers Extreme Networks' launch of ExtremeCloud IQ, reports on the latest tech financial results, and more.
The post Network Break 259: Fortinet Buys Endpoint Security Company; Arista Shares Squashed By Cloud Titan appeared first on Packet Pushers.