Kubernetes Unpacked 038: The Kubernetes Dev Experience In 2023

On today's Kubernetes Unpacked podcast, Michael and Kristina catch up with Arsh Sharma, Developer Experience Engineer at Okteto. Arsh dives into the key aspects to consider for incorporating a proper developer experience for Kubernetes and the overall cloud-native ecosystem.

The post Kubernetes Unpacked 038: The Kubernetes Dev Experience In 2023 appeared first on Packet Pushers.

IPB137: Running IPv6 At An Internet Exchange

On today's IPv6 Buzz, we talk with Jason Gintert of the Ohio Internet Exchange about what's involved with running an IX and where IPv6 fits in to the picture. We also discuss Jason's work with the US Networking User Association, a group that brings together network engineers to share knowledge and learn from one another.

IPv6 Buzz 137: Running IPv6 At An Internet Exchange

On today's IPv6 Buzz, we talk with Jason Gintert of the Ohio Internet Exchange about what's involved with running an IX and where IPv6 fits in to the picture. We also discuss Jason's work with the US Networking User Association, a group that brings together network engineers to share knowledge and learn from one another.

The post IPv6 Buzz 137: Running IPv6 At An Internet Exchange appeared first on Packet Pushers.

Nokia to cut 14,000 jobs in an attempt to salvage falling profit

Telecom giant Nokia has announced it will be cutting up to 14,000 jobs, a decision it blamed on the slowing demand for 5G equipment.On Thursday, the company reported that its third-quarter net sales declined by 20% year-on-year, with profit over the same period dropping by 69%. Nokia said that as a result, it will be implementing cost-cutting measures to try and save between $842 million and $1.2 billion by 2026, eliminating $422 million worth of costs in 2024 and a further $316 in 2025.“The most difficult business decisions to make are the ones that impact our people. We have immensely talented employees at Nokia and we will support everyone that is affected by this process,” said President and CEO Pekka Lundmark in a statement. “Resetting the cost base is a necessary step to adjust to market uncertainty and to secure our long-term profitability and competitiveness. We remain confident about opportunities ahead of us.”To read this article in full, please click here

Nokia to cut 14,000 jobs in an attempt to salvage falling profits

Telecoms giant Nokia has announced it will be cutting up to 14,000 jobs, a decision it blamed on the slowing demand for 5G equipment.On Thursday, the company reported that its third-quarter net sales declined by 20% year-on-year, with profit over the same period dropping by 69%. Nokia said that as a result, it will be implementing cost-cutting measures to try and save between $842 million and $1.2 billion by 2026, eliminating $422 million worth of costs in 2024 and a further $316 in 2025.“The most difficult business decisions to make are the ones that impact our people. We have immensely talented employees at Nokia and we will support everyone that is affected by this process,” said President and CEO Pekka Lundmark in a statement. “Resetting the cost base is a necessary step to adjust to market uncertainty and to secure our long-term profitability and competitiveness. We remain confident about opportunities ahead of us.”To read this article in full, please click here

Upcoming Class: How the Internet Really Works

Join me for How the Internet Really Works on the 27th! This four hour live webinar on Safari Books Online:

… de-mystifies the overall structure and “moving parts” of the global Internet. The class begins with a user connecting to a web site, and the process of translating the name of the service the user is seeking to a logical location (a server) where the service is actually located. From there, the path of the packets between the user and the server is traced, exposing each of the different kinds of providers that carry the packet along the way.

Register here.

Security startup Airgap Networks brings telco technologies to the LAN

AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here

Security startup Airgap Networks brings telco technologies to the LAN

AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here

Security startup Airgap Networks brings telco technologies to the LAN

AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.“Even though they’re deploying the same routers, switches, and firewalls, there’s something fundamentally different about telco networks that shields them from many threats to enterprise LANs,” Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.To read this article in full, please click here

Internet Governance in 2023

In 2005 the UN-sponsored World Summit on the Information Society (WSIS) eventually agreed on a compromise approach that deferred any determination on the matter of the governance of the Internet and instead decided to convene a series of meetings on the underlying policy principles relating to Internet Governance. Hence, we saw the inauguration of a series of Internet Governance Forum (IGF) meetings. These forums were intended to be non-decisional forums for all stakeholders to debate the issues. Eighteen later this is still going on. After so long is there anything left to talk about?

D2C216: Implementing Private AI Architecture With VMware (Sponsored)

The goal of private AI is to bring AI models and compute to where your data is stored to ensure privacy and control. On today's Day Two Cloud, sponsored by VMware, we dig more deeply into private AI, major use cases, and the kinds of data that get fed into a private AI system. We also discuss the infrastructure required to build out a private AI platform, how to connect to your data stores, and  VMware's role in virtualizing GPUs to maximize efficiency.

Day Two Cloud 216: Implementing Private AI Architecture With VMware (Sponsored)

The goal of private AI is to bring AI models and compute to where your data is stored to ensure privacy and control. On today's Day Two Cloud, sponsored by VMware, we dig more deeply into private AI, major use cases, and the kinds of data that get fed into a private AI system. We also discuss the infrastructure required to build out a private AI platform, how to connect to your data stores, and  VMware's role in virtualizing GPUs to maximize efficiency.

The post Day Two Cloud 216: Implementing Private AI Architecture With VMware (Sponsored) appeared first on Packet Pushers.

Juniper delivers distributed data-center security protection, firewalls

Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources.The central piece of the expanded portfolio is the new Juniper Connected Security Distributed Services Architecture. It’s implemented in a new version of the vendor’s core Junos operating system (version 23.4) and enables a variety of security features from zero trust policy enforcement to intrusion detection and prevention across distributed data center networks.Since Junos runs across Juniper’s entire product family, including QFX Series Switches, MX Series Universal Routers, SRX Series firewalls and more, all of those systems can be included in the Distributed Services Architecture. This enables customers to set up universal protection and policies for networks, data, and applications, and it’s all controlled by the vendor’s Security Director Cloud for setting and managing security policies.To read this article in full, please click here

Juniper delivers distributed data-center security protection, firewalls

Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources.The central piece of the expanded portfolio is the new Juniper Connected Security Distributed Services Architecture. It’s implemented in a new version of the vendor’s core Junos operating system (version 23.4) and enables a variety of security features from zero trust policy enforcement to intrusion detection and prevention across distributed data center networks.Since Junos runs across Juniper’s entire product family, including QFX Series Switches, MX Series Universal Routers, SRX Series firewalls and more, all of those systems can be included in the Distributed Services Architecture. This enables customers to set up universal protection and policies for networks, data, and applications, and it’s all controlled by the vendor’s Security Director Cloud for setting and managing security policies.To read this article in full, please click here

BackBox adds network vulnerability management to automation platform

BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.“Common vulnerability management tools focus on endpoints and are designed for security teams rather than network teams,” says Josh Stephens, CTO of BackBox. “BackBox’s vulnerability management capabilities have been specifically engineered for network operations teams in the way that they operate and to accelerate their path toward network automation.”To read this article in full, please click here

BackBox adds network vulnerability management to automation platform

BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.“Common vulnerability management tools focus on endpoints and are designed for security teams rather than network teams,” says Josh Stephens, CTO of BackBox. “BackBox’s vulnerability management capabilities have been specifically engineered for network operations teams in the way that they operate and to accelerate their path toward network automation.”To read this article in full, please click here