Did you feel like you missed any of our great blogs or podcasts this month? We had a lot of great ones to choose from in our March content roundup and on top of that, we had a lot of great industry articles and videos we shared that you can easily access below too! Spend a minute or two, or maybe even sixty to digest it all and increase your overall knowledge. Happy trails!
From Cumulus Networks:
Cumulus Networks is excited to announce being the first to power Facebook’s next generation, open modular platform, Minipack: With this news being announced at the recent OCP Summit 2019, we provided this helpful blog with links to everything you need to know about the announcement including data sheets etc.
Kernel of Truth season 2 episode 3: Storage solutions: Ask & you shall receive! A question asking “what are middle-tier customers doing for storage” came across our path & we thought hey, let’s tap a couple of experts to answer this one. Listen as David Iles from Mellanox Technologies discusses this with our own Peter Lumbis & host Brian O’Sullivan here.
The multicloud we need, but not the one we deserve: How can you take advantage of multi-cloud deployments without completely ditching Continue reading
By freeing up more spectrum during the next five years, the U.S. wireless industry could add $391...
According to reports, Intel is making the cuts as it consolidates IT operators under a single...
The build process enables “any-to-any” integration — the capability to integrate analog,...
The Indian government’s Department for Promotion of Industry and Internal Trade has released a draft of the National e-Commerce Policy for public comments by 29 March 2019. The CCAOI, with support from the Internet Society India Delhi Chapter, organized a webinar to discuss the draft policy on 18 March. The objective of the discussion was to inform various stakeholders of the provisions of the draft policy and highlight issues of concern. Watch the recording here.
The session was moderated by Subhashish Panigrahi and myself. It was attended by over 45 participants from different stakeholder communities across the country. The speakers that participated in the session were Devika Aggarwal from NASSCOM, Ankit Anand from Reliance Jio, Nikhil Pahwa from MediaNama, Parminder Singh from IT for Change, and Dr. Mahesh Uppal from ComFirst (India) Private Limited.
To kick off the webinar, Smitha Krishna Prasad of the Centre for Communication Governance at the National Law University presented an overview of the draft policy, following which the speakers shared their perspectives on the draft policy. Towards the end of the webinar, speakers answered questions from the participants in a lively and interactive Q&A session.
Some of the key issues discussed were on the Continue reading
Aruba’s core focus is around networking, but the company also enhanced its security capabilities...
This is the year of the service mesh. Service mesh solutions like Istio are popping up everywhere faster than you can say Kubernetes. Yet, with the exponential growth in interest also comes confusion. These are a few of the questions I hear out there:
These are all excellent and valid questions. I will try to answer them at the end of the post, but to get there let’s first understand what each solution is trying to achieve and place both on the OSI layer to bring more clarity to this topic.
*Note – I focused this post on NSX-DC and Istio, to prevent confusion, Istio is an open source service mesh project, while NSX-SM is a VMware service delivering enterprise-grade service mesh, while it is built on top of Istio, it brings extensive capabilities beyond those that are offered by the Istio Open Source project.
Before we start, in a nutshell, what is Istio?
Istio (https://istio.io/) Is an Open Source service mesh project led by Google that addresses Continue reading
TLDR: MSTP is generally the right choice unless you know why you shouldn’t. Here's why.
The post Blessay: Should I Use PVST or MSTP ? And Why. appeared first on EtherealMind.
Pulumi is a tool for building cloud-native infrastructure as code using general-purpose programming languages. Luke Hoban, CTO of Pulumi, joins Scott Lowe on the Full Stack Journey podcast to chat about the tool and how it differs from existing approaches to infrastructure as code.
The post Full Stack Journey 030: Building Cloud-Native Infrastructure As Code With Pulumi appeared first on Packet Pushers.
OpenConfig is an effort amongst many cooperative network operators to define vender-neutral data models for configuring and managing networks programatically. In this episode we talk with Anees Shaikh and Rob Shakir about the roots of the OpenConfig project and where it’s at currently.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
Continue reading "Juniper Lightboard Series – Intro to Juniper Routing – Part 2"
The operational makeover comes after Chef posted its most successful quarter in terms of bookings...
The new release enables planning for “what-if” scenarios — things like determining the impact...
Last August, Arista made its first acquisition, Mojo Networks, to transform the future of WiFi and campus networks. Just as Arista disrupted the datacenter with important architectural and technology-based innovations, I believe this is a similar pioneering step for the campus. Over the past two decades, the industry has deployed a WiFi controller-based architecture. This stagnant “WLC” approach for wireless connectivity has not evolved to address costly operational dilemmas such as:
The post Finding MAC addresses using Flexible NetFlow appeared first on Noction.
This is a guest blog post by Andrea Dainese, senior network and security architect, and author of UNetLab (now EVE-NG) and Route Reflector Labs. These days you’ll find him busy automating Cisco ACI deployments.
Following the Ivan’s post about Firewall Ruleset Automation, I decided to take a step forward: can we always have up-to-date and clean firewall policies without stale rules?
We usually configure and manage firewalls using a process like this:
Read more ...