Druva Adds Smart Storage Tiering, Disaster Recovery
Druva added two new cloud services: a multi-tier intelligent data storage technology for AWS and...
Druva added two new cloud services: a multi-tier intelligent data storage technology for AWS and...
It has been a long time coming, and it might have been better if this had been done a decade ago. …
Big Blue Open Sources Power Chip Instruction Set was written by Timothy Prickett Morgan at .
The post DDoS Mitigation and BGP Flowspec appeared first on Noction.
There can be times when you’re working on the AWS Cloud where you need to grant limited access to your account to a third-party. For example:
In each of these cases you likely want to grant the permissions the third-party needs but no more. In other words, no granting of AdministratorAccess policies because it’s easy and just works. Instead, adherence to the principle of least privilege.
This post will describe two methods–IAM users and IAM roles–for proving limited access to third-parties.
The big difference with the IAM user approach vs the role-based approach is the way the credentials for each entity are handed out.
IAM users have long-term credentials that only change by a manual action (either the user or an administrator changes the credentials). Those credentials will continue to provide access to the account until they’re either changed or the user is disabled/deleted.
By contrast, roles Continue reading
In mid-June I started another pet project - a series of webinars focused on networking fundamentals. In the first live session on June 18th we focused on identifying the challenges one has to solve when building an end-to-end networking solution, and the role of layered approach to networking.
Not surprisingly, we quickly went down the rabbit holes of computer networking history, including SCSI cables, serial connections and modems… but that’s where it all started, and some of the concepts developed at that time are still used today… oftentimes heavily morphed by recursive application of RFC 1925 Rule 11.
Read more ...The rapid changes underway in modern datacenters and HPC environment are demanding more compute power from a tech industry that is running into significant barriers to supplying that capacity. …
The View From On High On How To Beat Moore’s Law was written by Jeffrey Burt at .
About a month ago, we published a VMworld security guide with shortlisted 100 to 300 level sessions that best illustrate real-world application of our products. This time, we’ll be focusing on two networking and security keynotes. The first keynote will highlight how VMware’s single-stack, complete networking and security platform can achieve a consistent operational network fabric for hybrid cloud environments, and the second keynote will focus on how users can leverage existing VMware infrastructure to implement a more effective, intrinsic security.
In addition, you will have a shot at winning Bose headphones simply by attending each event. Although chances are slim (1250 times harder to win both as opposed to just one), duplicate winners will be acknowledged so if you are looking for a present for yourself and a significant other, make sure to register and save on your yearly bonus! Winners will be announced at the end of each keynote, so make sure to stay until the end!
There has never been a more exciting and challenging time in the networking space. As the cloud, application developers, IoT, Continue reading
There can be times when you're working on the AWS Cloud where you need to grant limited access to your account to a third-party. For example:
In each of these cases you likely want to grant the permissions the third-party needs but no more. In other words, no granting of AdministratorAccess policies because it's easy and just works. Instead, adherence to the principle of least privilege.
This post will describe two methods—IAM users and IAM roles—for proving limited access to third-parties.

As part of my internship on the Workers Developer Experience team, I set out to polish the Wrangler CLI for Cloudflare Workers. If you're not familiar with Workers, the premise is quite simple: Write a bit of Javascript that takes in an HTTP request, does some processing, and spits out a response. The magic lies in where your Workers scripts run: on Cloudflare's edge network, which spans 193 cities in more than 90 countries. Workers can be used for nearly anything from configuring Cloudflare caching behavior to building entire serverless web applications. And, you don't have to worry about operations at all.
I was excited to focus on Wrangler, because Wrangler aims to make developing and publishing Workers projects a pleasant experience for everyone, whether you're a solo dev working on the next big thing, or an engineer at a Fortune 100 enterprise. The whole point of serverless is about reducing friction, and Wrangler reflects that ethos.
However, when I started at Cloudflare in early June, some parts of the development experience still needed some love. While working on a new WASM tutorial for the Workers documentation, I noticed a storm brewing in my browser…

Wrangler lets you test your Continue reading
Ned Bellavance drops in as guest co-host while Drew takes time off to make craft virtual donuts with an artisan baker in a remote mountain village. Ned and Greg analyze VMware's latest acquisition, discuss why Xirrus has changed hands, explore a new low-cost switch, opine on CloudFlare's forthcoming IPO, and more.
The post Network Break 248: VMware Acquires Veriflow; Xirrus Changes Hands appeared first on Packet Pushers.
The service is an extension of the company's CAF testing offering announced in February.
The jClarity team has been a contributor to the AdoptOpenJDK project that helps users build...
Huawei earned itself another narrow and temporary reprieve from a blanket ban against doing...
SDxCentral spoke with Cisco and F5 Networks about their companies’ complementary approaches and...
We’re watching you: A leaked proposal from U.S. President Donald Trump’s administration would put the Federal Communications Commission in charge of regulating how social media platforms and other websites decide what appears on their pages, CNN reports. Critics said the proposal amounts to censorship.
We’re watching you, part 2: In other U.S. government news, the Trump administration has asked a court to reauthorized a suspended National Security Agency surveillance program, targeting the telephone records of U.S. residents, the New York Times reports. The Trump administration wants to make the controversial phone records collection program permanent.
Not just the U.S. government: The Indian government wants Twitter to block what it deems is fake news by suspending eight Kashmir-based accounts for allegedly spreading rumors, India Today reports. Indian security forces have alleged that groups in Pakistan have attempted to divide the security forces in Jammu and Kashmir, areas controlled by India but claimed by Pakistan.
Even more watching: Technicians from Chinese networking vendor Huawei have reportedly helped government officials in Uganda and Zambia spy on political opponents, TechCrunch reports. News reports have Huawei technicians helping the officials spy on the use of apps like WhatsApp and Skype and Continue reading