Money Moves: September 2019
Datadog Barks Back to Cisco’s $7B Offer, Fetches $648M in IPO: GitLab Inhales $268M Series E,...
Datadog Barks Back to Cisco’s $7B Offer, Fetches $648M in IPO: GitLab Inhales $268M Series E,...

Whether you’re a security professional looking at automation for the first time, or an ITops veteran tasked to support corporate secops teams, the following blog provides an overview of how Red Hat Ansible Automation can support your security automation program throughout all the different stages of its evolution.
Automation is becoming more and more pervasive across the entire IT stack.
Initially introduced to support ITOps, automation has been a well-established practice for years.
Today, thanks to modern automation platforms like Red Hat Ansible Automation, IT organizations are more capable of coping with the unprecedented scale, and complexity of modern infrastructures and finally have access to a level of flexibility that allows for extending automation practices to entirely new areas.
As an example, Ansible Network Automation enabled network operators to be the next group approaching automation in a structured fashion, to help simplify both maintenance and operations of their ever-growing, multi-vendor, brownfield infrastructures.
The security space started looking at automation in relatively recent times to support the already overwhelmed security teams against modern cyberattacks that are reaching an unparalleled level of speed and intricacy.
In fact, if we factor in the aforementioned scale Continue reading
Last week, we covered some of the questions about container infrastructure from our recent webinar “Demystifying VMs, Containers, and Kubernetes in the Hybrid Cloud Era.” This week, we’ll tackle the questions about Kubernetes, Docker and the software supply chain. One common misperception that we heard in the webinar — that Docker and Kubernetes are competitors. In fact, Kubernetes is better with Docker. And Docker is better with Kubernetes.
We hear questions along this line all the time. Here are some quick answers:

Anti-encryption demands: Government officials from the U.S., U.K., and Australia have asked Facebook to put a hold on its plans to expand encryption on services like Messenger, CNet reports. “We are writing to request that Facebook does not proceed with its plan to implement end-to-end encryption across its messaging services without ensuring that there is no reduction to user safety and without including a means for lawful access to the content of communications to protect our citizens,” says a letter signed by U.S. Attorney General William Barr and other officials.
This law is not fake: A new fake news law in Singapore has taken effect, SPDP Radio says. The law includes penalties of up to US $60,000 and 10 years in prison for people found guilty of spreading what the government considers to be fake news. Web sites could face fines of more than $720,000 for not taking down so-called fake news after being ordered to do so. Free speech advocates have major problems with the law, as you might expect.
The lines are cut: Internet access in most of Iraq was shut down after violent protest in the country, CNet says. Some people were Continue reading
The partnership is focused on ensuring that SD-WAN vendors are developing products that meet the...
On today's sponsored Tech Bytes episode we talk with MidSouth Bank CIO Daniel Hereford about how he's using SD-WAN from Silver Peak to support the bank's transformation to a hybrid cloud model, while also improving network visibility and performance for mission-critical applications.
The post Tech Bytes: MidSouth Bank Invests In Network Performance, Visibility With Silver Peak SD-WAN (Sponsored) appeared first on Packet Pushers.
Vodafone, an early proponent of the Telecom Infra Project’s OpenRAN initiative, says it started...
Register now for Attend Open Source Summit + Embedded Linux Conference Europe held October 28 - 30,...
The technology cocktail can support smart city initiatives without having to rip up streets to...
Today's Network Break analyzes Adtran's entry into the SD-WAN market, a new IBN product from Lumina Networks, the latest software upgrade from NTOP, Google's timeline for blocking HTTP elements in HTTPS sessions in Chrome, plus a couple of detailed follow-ups, and a Tech Bytes show.
The post Network Break 255: Adtran Gets Into SD-WAN; Google Preps Chrome To Block HTTP Mixed With HTTPS appeared first on Packet Pushers.

Don't underestimate engineers. They are smarter than people comprehend.
The post Kill the restructure | The IT Skeptic appeared first on EtherealMind.
Have you ever seen an Ansible playbook where 90% of the code prepares the environment, and then all the work is done in a few template and assemble modules? Here’s an alternative way of getting that done. Is it better? You tell me ;)
150 successful machine learning models: 6 lessons learned at Booking.com Bernadi et al., KDD’19
Here’s a paper that will reward careful study for many organisations. We’ve previously looked at the deep penetration of machine learning models in the product stacks of leading companies, and also some of the pre-requisites for being successful with it. Today’s paper choice is a wonderful summary of lessons learned integrating around 150 successful customer facing applications of machine learning at Booking.com. Oddly enough given the paper title, the six lessons are never explicitly listed or enumerated in the body of the paper, but they can be inferred from the division into sections. My interpretation of them is as follows:
There are way more than 6 good pieces of advice contained within the paper though!
We found that driving true business impact is amazingly hard, plus it is difficult to isolate Continue reading
One of the temptations of IT companies that skate on the cutting edge is that they get enamored with their own inventions, forgetting that customers are a lot more interested in practical solutions than whiz-bang technology. …
Building A File System That’s Primed for the Times was written by Michael Feldman at The Next Platform.
Storage hierarchies just aren’t what they used to be.
In the good old days, you stored files on hard disk or magnetic tape. …
Deepening Storage Hierarchies Spark New Set of Challenges was written by Michael Feldman at The Next Platform.
The storage landscape is being transformed thanks to the introduction of technologies like NVM-Express, and newer types of non-volatile memory (NVM). …
Get Used to the Ever-Expanding Storage Hierarchy was written by Michael Feldman at The Next Platform.

Convincing research that wireless chargers aren't good (yet)
The post How you charge your mobile phone could compromise its battery lifespan appeared first on EtherealMind.