About a month ago, we published a VMworld security guide with shortlisted 100 to 300 level sessions that best illustrate real-world application of our products. This time, we’ll be focusing on two networking and security keynotes. The first keynote will highlight how VMware’s single-stack, complete networking and security platform can achieve a consistent operational network fabric for hybrid cloud environments, and the second keynote will focus on how users can leverage existing VMware infrastructure to implement a more effective, intrinsic security.
In addition, you will have a shot at winning Bose headphones simply by attending each event. Although chances are slim (1250 times harder to win both as opposed to just one), duplicate winners will be acknowledged so if you are looking for a present for yourself and a significant other, make sure to register and save on your yearly bonus! Winners will be announced at the end of each keynote, so make sure to stay until the end!
There has never been a more exciting and challenging time in the networking space. As the cloud, application developers, IoT, Continue reading
There can be times when you're working on the AWS Cloud where you need to grant limited access to your account to a third-party. For example:
In each of these cases you likely want to grant the permissions the third-party needs but no more. In other words, no granting of AdministratorAccess
policies because it's easy and just works. Instead, adherence to the principle of least privilege.
This post will describe two methods—IAM users and IAM roles—for proving limited access to third-parties.
As part of my internship on the Workers Developer Experience team, I set out to polish the Wrangler CLI for Cloudflare Workers. If you're not familiar with Workers, the premise is quite simple: Write a bit of Javascript that takes in an HTTP request, does some processing, and spits out a response. The magic lies in where your Workers scripts run: on Cloudflare's edge network, which spans 193 cities in more than 90 countries. Workers can be used for nearly anything from configuring Cloudflare caching behavior to building entire serverless web applications. And, you don't have to worry about operations at all.
I was excited to focus on Wrangler, because Wrangler aims to make developing and publishing Workers projects a pleasant experience for everyone, whether you're a solo dev working on the next big thing, or an engineer at a Fortune 100 enterprise. The whole point of serverless is about reducing friction, and Wrangler reflects that ethos.
However, when I started at Cloudflare in early June, some parts of the development experience still needed some love. While working on a new WASM tutorial for the Workers documentation, I noticed a storm brewing in my browser…
Wrangler lets you test your Continue reading
Ned Bellavance drops in as guest co-host while Drew takes time off to make craft virtual donuts with an artisan baker in a remote mountain village. Ned and Greg analyze VMware's latest acquisition, discuss why Xirrus has changed hands, explore a new low-cost switch, opine on CloudFlare's forthcoming IPO, and more.
The post Network Break 248: VMware Acquires Veriflow; Xirrus Changes Hands appeared first on Packet Pushers.
The service is an extension of the company's CAF testing offering announced in February.
The jClarity team has been a contributor to the AdoptOpenJDK project that helps users build...
Huawei earned itself another narrow and temporary reprieve from a blanket ban against doing...
SDxCentral spoke with Cisco and F5 Networks about their companies’ complementary approaches and...
We’re watching you: A leaked proposal from U.S. President Donald Trump’s administration would put the Federal Communications Commission in charge of regulating how social media platforms and other websites decide what appears on their pages, CNN reports. Critics said the proposal amounts to censorship.
We’re watching you, part 2: In other U.S. government news, the Trump administration has asked a court to reauthorized a suspended National Security Agency surveillance program, targeting the telephone records of U.S. residents, the New York Times reports. The Trump administration wants to make the controversial phone records collection program permanent.
Not just the U.S. government: The Indian government wants Twitter to block what it deems is fake news by suspending eight Kashmir-based accounts for allegedly spreading rumors, India Today reports. Indian security forces have alleged that groups in Pakistan have attempted to divide the security forces in Jammu and Kashmir, areas controlled by India but claimed by Pakistan.
Even more watching: Technicians from Chinese networking vendor Huawei have reportedly helped government officials in Uganda and Zambia spy on political opponents, TechCrunch reports. News reports have Huawei technicians helping the officials spy on the use of apps like WhatsApp and Skype and Continue reading
I’m too stupid to unwind and relax over summer - there’s always some janitorial task to be done, and I simply cannot leave it alone. This summer, I decided to migrate our server infrastructure to AWS.
TL&DR: It went smoother than I expected, and figuring out how AWS virtual networks, public IP addresses, and security groups work while creating AWS Networking webinar definitely helped, but it also took way longer than I expected.
Read more ...Robust learning from untrusted sources Konstantinov & Lampert, ICML’19
Welcome back to a new term of The Morning Paper! Just before the break we were looking at selected papers from ICML’19, including “Data Shapley.” I’m going to pick things up pretty much where we left off with a few more ICML papers…
Data Shapley provides us with one way of finding and correcting or eliminating low-value (and potentially harmful) data points from a training set. In today’s paper choice, Konstantinov & Lampert provide a way of assessing the value of datasets as a whole. The idea is that you might be learning e.g. a classifier by combining data from multiple sources. By assigning a value (weighting) to each of those data sources we can intelligently combine them to get the best possible performance out of the resulting trained model. So if you need more data in order to improve the performance of your model, ‘Robust learning from untrusted sources’ provides an approach that lets you tap into additional, potentially noisier, sources.
It’s similar in spirit to Snorkel which we looked at last year, and is designed to let you incorporate data from multiple ‘weakly supervised’ (i.e. noisy) Continue reading
If you want for the rapid pace of innovation in datacenter networking to continue, then you had better hope that the hyperscalers and major public cloud builders don’t run out of money. …
The Future Of Networks Depends On Hyperscalers And Big Clouds was written by Timothy Prickett Morgan at .
Technology is continuing to grow by leaps and bounds with artificial intelligence (AI) and smart technologies are leading the way. As technology grows so does the number of new inventions both large and small. Here is a look at some of the new products hitting the market in 2019 and 2020, some of which are still under development in Kickstarter campaigns and others that are already available for purchase online.
5 New Tech-Savvy Products
OraSaifu: This new computerized smart wallet allows you keep all credit cards, membership cards, and cryptocurrency all in one place and accessible with just a swipe of your finger. You can use OraSaifu directly to pay for purchases and it will even unlock your door for you.
InstaDreamer: InstaDreamer is a vibrating bracelet that vibrates while you are sleeping, which will put you into a lucid dream allowing you to dream of visiting exotic places, meet your favorite celebrities in a dream, and experience fantasies while getting a good night’s sleep. This bracelet will even analyze your sleep cycles for you, so you know when you get the best sleep.
Sonic Beer: For those individuals who love the foam head on their beer, Continue reading
Forget in-memory computing for the moment because it requires a complete re-architecting of applications and most of the time the underlying hardware, too. …
Getting Around The Limits Of Memory To Accelerate Applications was written by Timothy Prickett Morgan at .
LuCi is a very popular OpenWrt web interface. For an average user, LuCi is probably one of the main deciding factors between giving OpenWrt a try in the first place, or moving on to another user friendlier firmware like DD-WRT.
If you’re an advanced user however, most of the times you may find yourself adjusting settings either through UCI or by editing the config files manually. In fact at one point you may realize you’re not using LuCi at all and it’s just sitting there idle. Basically a component that’s not only using resources, but also providing an extra attack surface.
Now, one could just disable uHTTPd to address some of these concerns, but LuCi installs too many dependencies, and cluttering a router with things that you’ll hardly ever use, is not the best use of the very limited storage space available in most routers.
Another method that some use to “remove” LuCi, is by issuing:
opkg --autoremove remove luci
This may seem to work, but in reality LuCi packages are not really removed this way and the related files will only be masked by OverlayFS. This is because the packages are built into the firmware itself.
While OpenWrt Continue reading
This blog is now hosted via Netlify, rather than GitHub Pages. It is still built using Jekyll, but I updated the theme to Mediumish.
I looked at switching to Hugo for site generation, but I hit several bugs trying to do the import, and theme setup was a pain. So I stuck with Jekyll, because it’s doing what I need. Using Netlify gives me a few more options around build and deploy, and moves away from Cloudflare.
All URLs and RSS feed should remain the same. Let me know if you see any issues.
This blog is now hosted via Netlify, rather than GitHub Pages. It is still built using Jekyll, but I updated the theme to Mediumish.
I looked at switching to Hugo for site generation, but I hit several bugs trying to do the import, and theme setup was a pain. So I stuck with Jekyll, because it’s doing what I need. Using Netlify gives me a few more options around build and deploy, and moves away from Cloudflare.
All URLs and RSS feed should remain the same. Let me know if you see any issues.
Last fall, supercomputer maker Cray announced that it was getting back to making high performance cluster interconnects after a six year hiatus, but the company had already been working on its “Rosetta” switch ASIC for the Slingshot interconnect for quite a while before it started talking publicly about it. …
How Cray Makes Ethernet Suited For HPC And AI With Slingshot was written by Timothy Prickett Morgan at .