Nvidia Arms Up Server OEMs And ODMs For Hybrid Compute

The one thing that AMD’s return to the CPU market and its more aggressive moves in the GPU compute arena have done, as well as Intel’s plan to create a line of discrete Xe GPUs that can be used as companions to its Xeon processors, has done is push Nvidia and Arm closer together.

Nvidia Arms Up Server OEMs And ODMs For Hybrid Compute was written by Timothy Prickett Morgan at The Next Platform.

Go Notes: Variables

There are a number of methods to define variables in Go. Considerations Variable names must begin with a letter or a number When a variable is declared but not yet assigned it has a default value for its type A variable that is declared must be used Constants can only be assigned at the...

Test coverage of Python packages in Cisco NSO

In most of the Python projects I’m working with Pytest is used to test the code, and Coverage is used to check what lines that the tests validate. For this to work, Coverage must take part in the execution of the Python code. While this isn’t a problem for most projects working with NSO poses a challenge since the actual Python code for each NSO package gets executed in a separate Python virtual machine. The goal of this article is to show you how you can overcome this obstacle and gain some insight into your test coverage for your NSO Python packages. Continue reading

IBM Kicks Up Kubernetes Compatibility With Open Source

IBM unveiled new open source projects Kui and Iter8, along with advancements to existing Tekton and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Buys CloudSimple, Challenges VMware Cloud on AWS

Google first started working with the startup earlier this year, and its VMware partnership uses...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Linux who command tells who’s logged in and a lot more

Did you ever wonder who is logged into a Linux system but not know how to find out? This two-minute tip can solve the problem with an introduction to the who command in this 2-minute Linux Tip by Network World blogger Sandra Henry-Stocker.The who command can tell you who is logged in to the network, count them and give a list of them on a single line. It can also show when a system was last booted as well as the run state that the system is in.For those who don’t want to use the formal commands for the various who functions, it’s possible to create aliases that are more intuitive than the commands as written for Linux.To read this article in full, please click here

Packet, EdgeConneX, Sprint Bring Edge Compute, IoT to Detroit

The edge computing partnership allows local enterprises — specifically the automotive sector and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tech Bytes: The Whys And How Of Decrypting Internal Traffic With ExtraHop (Sponsored)

ExtraHop is our sponsor for today's sponsored Tech Bytes conversation on traffic decryption. Packet data is a source of truth, and it's vital for security and operations teams to have that truth to find threats and get essential visibility into security and performance. We explore how ExtraHop's Reveal(x) NDR platform uses a variety of decryption techniques to bring visibility to encrypted data center traffic.

Tech Bytes: The Whys And How Of Decrypting Internal Traffic With ExtraHop (Sponsored)

ExtraHop is our sponsor for today's sponsored Tech Bytes conversation on traffic decryption. Packet data is a source of truth, and it's vital for security and operations teams to have that truth to find threats and get essential visibility into security and performance. We explore how ExtraHop's Reveal(x) NDR platform uses a variety of decryption techniques to bring visibility to encrypted data center traffic.

The post Tech Bytes: The Whys And How Of Decrypting Internal Traffic With ExtraHop (Sponsored) appeared first on Packet Pushers.

T-Mobile US Taps Sievert to Replace Legere As CEO

The move marks the end of John Legere’s run at the company, which began in September 2012.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cumulus Linux 4.0 Supports New Mellanox, Broadcom Chips and Facebook Minipack

Cumulus Linux 4.0 widens its hardware support to 134 platforms across 14 ASICs including new...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Fortinet CEO: Network and security technologies give rise to security-driven networking

The network and security industries both continue to evolve at a rate never seen before.  Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals.However, that is changing as businesses rely on their networks to operate. It’s fair to say that today, for many companies, the network is the business. As this happens, network and security technologies need to be more closely aligned giving rise to the concept of security-driven networking.[Get regularly scheduled insights by signing up for Network World newsletters.] In this post, ZK Research had a chance to sit down with the co-founder and CEO of Fortinet Ken Xie to discuss the future of networking and security. To read this article in full, please click here

Fortinet CEO: Network and security technologies give rise to security-driven networking

The network and security industries both continue to evolve at a rate never seen before.  Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals.However, that is changing as businesses rely on their networks to operate. It’s fair to say that today, for many companies, the network is the business. As this happens, network and security technologies need to be more closely aligned giving rise to the concept of security-driven networking.[Get regularly scheduled insights by signing up for Network World newsletters.] In this post, ZK Research had a chance to sit down with the co-founder and CEO of Fortinet Ken Xie to discuss the future of networking and security. To read this article in full, please click here

AWS Absorbs More of Nokia’s 5G-Focused Software Platform

The engineering collaboration focuses on 5G platforms like mobile core, network and service...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Containers and VMs and Bare Metal, Oh My!

Discover the operational items that will significantly affect the effectiveness of your cloud...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Continuous Improvements in Ansible and Kubernetes Automation

blog_ansible-and-kubernetes-deep-dive

Ansible is an ideal tool for managing many different types of Kubernetes resources. There are four key features that really help:

  • Modules and plugins for creating, updating, removing and obtaining information about Kubernetes resources
  • Templating of Kubernetes resource definitions
  • Powerful inventory system
  • Secrets management 

Together these combine to help enable repeatable deployment and management of applications and multiple Kubernetes clusters in a single role for every resource.

Since the last blog post on Kubernetes features for Ansible Engine 2.6, there have been a number of improvements to Ansible's Kubernetes capabilities. Let’s go over some of the improvements to the modules and libraries and other new features that have been added in the last year, and also highlight what is in the works.

 

New features

Better change management through apply mode

The k8s module now accepts an apply parameter, which approximates the behavior of kubectl apply. When apply is set to True, the k8s module will store the last applied configuration in an annotation on the object. When the object already exists, instead of just sending the new manifest to the API server, the module will now do a 3-way merge, combining the existing cluster state, the Continue reading