Tech Bytes: The Whys And How Of Decrypting Internal Traffic With ExtraHop (Sponsored)

ExtraHop is our sponsor for today's sponsored Tech Bytes conversation on traffic decryption. Packet data is a source of truth, and it's vital for security and operations teams to have that truth to find threats and get essential visibility into security and performance. We explore how ExtraHop's Reveal(x) NDR platform uses a variety of decryption techniques to bring visibility to encrypted data center traffic.

The post Tech Bytes: The Whys And How Of Decrypting Internal Traffic With ExtraHop (Sponsored) appeared first on Packet Pushers.

T-Mobile US Taps Sievert to Replace Legere As CEO

The move marks the end of John Legere’s run at the company, which began in September 2012.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cumulus Linux 4.0 Supports New Mellanox, Broadcom Chips and Facebook Minipack

Cumulus Linux 4.0 widens its hardware support to 134 platforms across 14 ASICs including new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Fortinet CEO: Network and security technologies give rise to security-driven networking

The network and security industries both continue to evolve at a rate never seen before.  Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals.However, that is changing as businesses rely on their networks to operate. It’s fair to say that today, for many companies, the network is the business. As this happens, network and security technologies need to be more closely aligned giving rise to the concept of security-driven networking.[Get regularly scheduled insights by signing up for Network World newsletters.] In this post, ZK Research had a chance to sit down with the co-founder and CEO of Fortinet Ken Xie to discuss the future of networking and security. To read this article in full, please click here

Fortinet CEO: Network and security technologies give rise to security-driven networking

The network and security industries both continue to evolve at a rate never seen before.  Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals.However, that is changing as businesses rely on their networks to operate. It’s fair to say that today, for many companies, the network is the business. As this happens, network and security technologies need to be more closely aligned giving rise to the concept of security-driven networking.[Get regularly scheduled insights by signing up for Network World newsletters.] In this post, ZK Research had a chance to sit down with the co-founder and CEO of Fortinet Ken Xie to discuss the future of networking and security. To read this article in full, please click here

AWS Absorbs More of Nokia’s 5G-Focused Software Platform

The engineering collaboration focuses on 5G platforms like mobile core, network and service...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Containers and VMs and Bare Metal, Oh My!

Discover the operational items that will significantly affect the effectiveness of your cloud...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Continuous Improvements in Ansible and Kubernetes Automation

blog_ansible-and-kubernetes-deep-dive

Ansible is an ideal tool for managing many different types of Kubernetes resources. There are four key features that really help:

  • Modules and plugins for creating, updating, removing and obtaining information about Kubernetes resources
  • Templating of Kubernetes resource definitions
  • Powerful inventory system
  • Secrets management 

Together these combine to help enable repeatable deployment and management of applications and multiple Kubernetes clusters in a single role for every resource.

Since the last blog post on Kubernetes features for Ansible Engine 2.6, there have been a number of improvements to Ansible's Kubernetes capabilities. Let’s go over some of the improvements to the modules and libraries and other new features that have been added in the last year, and also highlight what is in the works.

 

New features

Better change management through apply mode

The k8s module now accepts an apply parameter, which approximates the behavior of kubectl apply. When apply is set to True, the k8s module will store the last applied configuration in an annotation on the object. When the object already exists, instead of just sending the new manifest to the API server, the module will now do a 3-way merge, combining the existing cluster state, the Continue reading

Cumulus Networks 4th-Generation open, modern networking for applications of the future

The dynamics of IT are changing, especially when it comes to the demands on the network. As many have predicted, big data, mobile and the Internet of Things are putting significant and ever-increasing pressure on the network. Most networks and legacy management tools, therefore, are unprepared for the added stress placed on already-fragile infrastructures while the rest of the data center has sped ahead.

As more and more data is created and transferred between resources, the network must be increasingly resilient, dynamic and agile to adjust to application demands accordingly. As data and applications become increasingly distributed, there is an inherent architectural dependence on the interconnect, which enables these resources to work in concert to deliver application workloads. That interconnect, the network, must undergo its own transformation to meet the new needs of a modern network.

Our founders at Cumulus Networks recognized the challenges that were mounting nearly a decade ago and set out to build a more modern network, one that is modeled from the web-scale giants including Google, Amazon, and Facebook to better address applications of the future.

I’m very happy to announce that Cumulus Networks is now enabling customers to meet modern network challenges with our 4th-Generation Continue reading

The Week in Internet News: Let’s Encrypt Doubles the Number of Secure Websites

A more secure Internet: Let’s Encrypt, the nonprofit certificate authority, has helped the percentage of websites protected with HTTPS encryption jump from 40 percent in 2016 to 80 percent now, TechXplore notes. The free certificate service has “turned the implementation of HTTPS from a costly, complicated process to an easy step that’s within reach for all websites.” Let’s Encrypt has become the world’s largest certificate authority and provides more HTTPS certificates than all other certificate authorities combined.

The right to the Internet: A new study by Merten Reglitz, a lecturer in global ethics at the University of Birmingham, suggests Internet access should be a human right, Vice reports. Internet access is “highly conducive to a multitude of crucial human interests and rights,” the study says. “Internet access is a uniquely effective way for lobbying and holding accountable global players like global governance institutions and multinational corporations.”

You must include these apps: The Russian government may require PC and smartphone makers to pre-load Russia apps, ZDNet reports. The Russian parliament is debating a bill to require the pre-loaded apps. If the bill passes, the Russian government would publish a list of electronic devices that will need to comply Continue reading

Facts and Fiction: BGP Is a Hot Mess

Every now and then a smart person decides to walk away from their competence zone, and start spreading pointless clickbait opinions like BGP is a hot mess.

Like any other technology, BGP is just a tool with its advantages and limitations. And like any other tool, BGP can be used sloppily… and that’s what’s causing the various problems and shenanigans everyone is talking about.

Just in case you might be interested in facts instead of easy-to-digest fiction:

Read more ...

Formal foundations of serverless computing

Formal foundations of serverless computing Jangda et al., OOPSLA’19

Jangda et al. won a distinguished paper award at OOPSLA this year for their work on ‘Formal foundations of serverless computing.’ Central to the paper is their observation that the serverless execution environment has a number of unique properties (such as warm starting / reuse of execution environments) that can make it harder to build correct applications. They show the conditions under which a serverless function can safely ignore these peculiarities, and thus become much simpler to reason about. They also introduce a composition language based on arrows for function composition.

Things to be aware of when going serverless

The serverless computing abstraction, despite its many advantages, exposes several low-level operational details that make it hard for programmers to write and reason about their code. For example, to reduce latency, serverless platforms try to reuse the same function instance to process multiple requests. However, this behaviour is not transparent and it is easy to write a serverless function that produces incorrect results or leaks confidential data when reused. A related problem is that serverless platforms abruptly terminate function instances when they are idle…

These first problems are related to Continue reading

Digital Realty jumps into interconnection business

Data center provider Digital Realty Trust isn't resting after its massive EMEA push via the acquisition of Interxion. The company unveiled PlatformDIGITAL, an initiative designed to provide interconnections to customers and manage big data. Digital Realty made the announcement at its MarketplaceLIVE conference. At the heart of the PlatformDIGITAL strategy is Pervasive Datacenter Architecture (PDx), which offers "fit-for-purpose" data center designs meant to solve scale, configuation and connectivity issues faced by enterprise colocation customers.To read this article in full, please click here

Digital Realty jumps into interconnection business

Data center provider Digital Realty Trust isn't resting after its massive EMEA push via the acquisition of Interxion. The company unveiled PlatformDIGITAL, an initiative designed to provide interconnections to customers and manage big data. Digital Realty made the announcement at its MarketplaceLIVE conference. At the heart of the PlatformDIGITAL strategy is Pervasive Datacenter Architecture (PDx), which offers "fit-for-purpose" data center designs meant to solve scale, configuation and connectivity issues faced by enterprise colocation customers.To read this article in full, please click here

Digital Reality jumps into interconnection business

Data center provider Digital Realty Trust isn't resting after its massive EMEA push via the acquisition of Interxion. The company unveiled PlatformDIGITAL, an initiative designed to provide interconnections to customers and manage big data. Digital Realty made the announcement at its MarketplaceLIVE conference. At the heart of the PlatformDIGITAL strategy is Pervasive Datacenter Architecture (PDx), which offers "fit-for-purpose" data center designs meant to solve scale, configuation and connectivity issues faced by enterprise colocation customers.To read this article in full, please click here

White-box switches yield initial savings but pose challenges

Despite the clear cost benefits, white-box switches outfitted with independent network operating systems (NOS) solutions have seen only limited adoption in leading enterprise IT shops.  That’s due to the lack of a clear market leader, implementation challenges and concerns about service and support that have steered IT pros toward traditional, branded-box Ethernet switches instead.[Get regularly scheduled insights by signing up for Network World newsletters.] But maturing technology and new support alliances are making white-box switches an attractive alternative for greenfield deployments and for infrastructure that’s being upgraded to give performance boosts to data centers, campuses and branch offices.To read this article in full, please click here

5 disruptive storage technologies for 2020

For decades, storage technology progress was measured primarily in terms of capacity and speed. No longer. In recent times, those steadfast benchmarks have been augmented, and even superseded, by sophisticated new technologies and methodologies that make storage smarter, more flexible and easier to manage.Next year promises to bring even greater disruption to the formerly staid storage market, as IT leaders seek more efficient ways of coping with the data tsunami generated by AI, IoT devices and numerous other sources. Here's a look at the five storage technologies that will create the greatest disruption in 2020, as enterprise adoption gains ground.To read this article in full, please click here

5 disruptive storage technologies for 2020

For decades, storage technology progress was measured primarily in terms of capacity and speed. No longer. In recent times, those steadfast benchmarks have been augmented, and even superseded, by sophisticated new technologies and methodologies that make storage smarter, more flexible and easier to manage.Next year promises to bring even greater disruption to the formerly staid storage market, as IT leaders seek more efficient ways of coping with the data tsunami generated by AI, IoT devices and numerous other sources. Here's a look at the five storage technologies that will create the greatest disruption in 2020, as enterprise adoption gains ground.To read this article in full, please click here

Digital Reality jumps into interconnection business

Data center provider Digital Realty Trust isn't resting after its massive EMEA push via the acquisition of Interxion. The company unveiled PlatformDIGITAL, an initiative designed to provide interconnections to customers and manage big data. Digital Realty made the announcement at its MarketplaceLIVE conference. At the heart of the PlatformDIGITAL strategy is Pervasive Datacenter Architecture (PDx), which offers "fit-for-purpose" data center designs meant to solve scale, configuation and connectivity issues faced by enterprise colocation customers.To read this article in full, please click here