Red Hat Summit 2019: RHEL 8 arrives

Red Hat Summit 2019 is off to an exciting start. The conference, running from today until Thursday in Boston, is already tickling attendees’ fancies by announcing some very exciting developments.The first is Red Hat Enterprise Linux (RHEL) 8 — available now for everything from bare-metal servers and Linux containers to public and private clouds. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] RHEL 8 introduces Application Streams, which allow languages, frameworks, and developer tools to be updated frequently without impacting the core resources that have made Red Hat Enterprise Linux an enterprise benchmark. This feature brings quick developer innovation and production stability into the OS.To read this article in full, please click here

Some IT pros say they have too much data

A new survey has found that a growing number of IT professionals have too many data sources to even count, and they are spending more and more time just wrestling that data into usable condition.Ivanti, an IT asset management firm, surveyed 400 IT professionals on their data situation and found IT faces numerous challenges when it comes to siloes, data, and implementation. The key takeaway is data overload is starting to overwhelm IT managers and data lakes are turning into data oceans.[ Read also: Understanding mass data fragmentation | Get daily insights Sign up for Network World newsletters ] Among the findings from Ivanti's survey:To read this article in full, please click here

Some IT pros say they have too much data

A new survey has found that a growing number of IT professionals have too many data sources to even count, and they are spending more and more time just wrestling that data into usable condition.Ivanti, an IT asset management firm, surveyed 400 IT professionals on their data situation and found IT faces numerous challenges when it comes to siloes, data, and implementation. The key takeaway is data overload is starting to overwhelm IT managers and data lakes are turning into data oceans.[ Read also: Understanding mass data fragmentation | Get daily insights Sign up for Network World newsletters ] Among the findings from Ivanti's survey:To read this article in full, please click here

BrandPost: The Practical Road to Intelligent Automation

Frank O. Miller, Chief Technology Officer, Europe, Middle East and Africa, Ciena Big bang OSS transformation projects are slow, expensive, and disruptive. Why not consider taking a ‘brick-by-brick’ approach that delivers value faster and sets you up for future success? asks Frank Miller, CTO, Ciena EMEA.When I’m talking with service providers, network automation is always high on their agenda. As well as dramatically reducing operational costs by automating manual processes, it can help you access bandwidth on demand, and provision new customer services in a fraction of the time it previously took. There are also major benefits in terms of discovering your network resources dynamically. An accurate view of available infrastructure enables you to more holistically plan and implement strategic initiatives that keep you ahead of the traffic demand curve.To read this article in full, please click here

BrandPost: SD-WAN is Critical for IoT

The Internet of Things (IoT) is everywhere and its use is growing fast. IoT is used by local governments to build smart cities. It’s used to build smart businesses. And, consumers are benefitting as it’s built into smart homes and smart cars. Industry analyst first estimates that over 20 billion IoT devices will be connected by 2020. That’s a 2.5x increase from the more than 8 billion connected devices in 2017*. Manufacturing companies have the highest IoT spend to date of industries while the health care market is experiencing the highest IoT growth. By 2020, 50 percent of IoT spending will be driven by manufacturing, transportation and logistics, and utilities.To read this article in full, please click here

Five Functional Facts About AWS Service Control Policies

Following on the heels of my previous post, Five Functional Facts about AWS Identity and Access Management, I wanted to dive into a separate, yet related way of enforcing access policies in AWS: Service Control Policies (SCPs).

SCPs and IAM policies look very similar–both being JSON documents with the same sort of syntax–and it would be easy to mistake one for the other. However, they are used in different contexts and for different purposes. In this post, I’ll explain the context where SCPs are used and why they are used (and even why you’d use SCPs and IAM policies together).

Read on, dear reader!

1 – SCPs scope the permissions an AWS account has

To properly describe SCPs, I need to introduce a new service: AWS Organizations. Organizations is a service that is used to bring multiple AWS accounts together under a common management structure. For example, if you wanted to enforce the use of encryption on S3 buckets across all the AWS accounts used within your company, you could do that via AWS Organizations. Additional benefits of Organizations include consolidated billing, integration with certain services such as AWS CloudTrail, and streamlined sharing of resources between accounts using Continue reading

Building Automation Device Inventory with Open Source Tools

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

One of the common questions we get in the Building Network Automation Solutions online course is “how do I create device inventory if I don’t know (exactly) what devices are in my network?”… prompting one of the guest speakers to reply “could it really be that bad?” (yes, sometimes it is).

Some of the students tried to solve the challenge with Ansible. While that might eventually work (given enough effort), Ansible definitely isn’t the right tool for the job.

What you need to get the job done is a proper toolchain:

Read more ...

Distributed consensus revised – Part I

Distributed consensus revised Howard, PhD thesis

Welcome back to a new term of The Morning Paper! To kick things off, I’m going to start by taking a look at Dr Howard’s PhD thesis, ‘Distributed consensus revised’. This is obviously longer than a standard paper, so we’ll break things down over a few days. As the title suggests, the topic in hand is distributed consensus:

Single-valued agreement is often overlooked in the literature as already solved or trivial and is seldom considered at length, despite being a vital component in distributed systems which is infamously poorly understood… we undertake an extensive examination of how to achieve consensus over a single value.

What makes this much harder than it might at first appear of course, is the possibility of failures and asynchronous communication. In the face of this, an algorithm for consensus must meet three safety requirements and two progress requirements:

  • Non-triviality: the decided value must have been proposed by a participant (so for example, solutions which always choose a fixed pre-determined value are not acceptable)
  • Safety: if a value has been decided, no other value will be decided
  • Safe learning: if a participant learns a value, it must Continue reading

Five Functional Facts About AWS Service Control Policies

Following on the heels of my previous post, Five Functional Facts about AWS Identity and Access Management, I wanted to dive into a separate, yet related way of enforcing access policies in AWS: Service Control Policies (SCPs).

SCPs and IAM policies look very similar—both being JSON documents with the same sort of syntax—and it would be easy to mistake one for the other. However, they are used in different contexts and for different purposes. In this post, I'll explain the context where SCPs are used and why they are used (and even why you'd use SCPs and IAM policies together).

Read on, dear reader!