Enterprise Solution Offerings: Ensuring Success Across Your Entire Application Portfolio

This week at DockerCon 2019, we shared our strategy for helping companies realize the benefits of digital transformation through new enterprise solution offerings that address the most common application profile in their portfolio. Our new enterprise solution offerings include the Docker platform, new tooling and services needed to migrate your applications. Building on the success and the experience from the Modernize Traditional Applications (MTA) program and Docker Enterprise 3.0, we are excited to expand our solutions and play an even greater role in our customers’ innovation strategy by offering a complete and comprehensive path to application containerization.

Application Profiles

When you hear about different application profiles, you may think about different languages or frameworks or even different application architectures like microservices and monoliths. But one of the benefits of containerization is that all application dependencies are abstracted away and what you have is a container that can be deployed consistently across different infrastructure.

In our work with many enterprise organizations, we’ve validated that the successful adoption of a container strategy is just as much about the people and processes as it is about the technology. There are 3 behavioral patterns that matter and that is dependent on what Continue reading

Allied Telesis turns its networking focus to the U.S. market

I recently had the opportunity to talk to Mark Wutzke, chief solution architect with Allied Telesis, to learn about the company’s smart networking offerings. Perhaps you, like me, don’t know much about this networking company, though it’s been in business since 1987. That might be because the global company, until recently, has focused its efforts outside the U.S. However, that focus is beginning to change, so I wanted to learn what the company brings to the table that enterprises would be interested in.First, a little background on the company. Allied Telesis is headquartered in both Japan and the U.S. The company has global R&D centers and manufactures its own products. Among the products are intelligent switches and stackable chassis, industrial switches, wireless solutions, firewalls and routers, optics, NICs and media converters—basically end-to-end solutions from edge to core for LAN, WLAN and WAN. In addition, Allied Telesis writes its own operating system software for its equipment, as well as the network management software that provides many of the smart networking features the company is touting today.To read this article in full, please click here

IPv6 Buzz 025: Teaching IPv6 With Instructor And Author Rick Graziani

College instructor and author Rick Graziani stops by the IPv6 Buzz podcast to talk about teaching IPv6, including the differences between teaching college students and training IT professionals, how networking and IT are taught in universities and community colleges, and more.

The post IPv6 Buzz 025: Teaching IPv6 With Instructor And Author Rick Graziani appeared first on Packet Pushers.

Register for AfPIF 2019

Join us in Balaclava, Mauritius for the 10th Africa Peering and Interconnection Forum (AfPIF) from 20-22 August 2019.

AfPIF attracts ISPs, content providers, governments, and IXP’s for three days of learning, sharing, and building business in Africa.

Why should you attend AfPIF-2019? Have a look through the AfPIF 2018 Summary Report, which contains briefs of presentations, emerging discussions, speakers, and sponsors.

Sponsorship opportunities are available to promote your business to these key audiences. Find out more about these opportunities here: https://www.afpif.org/afpif-10/sponsorship-brochure/

Register now to secure your place – and remember to check your visa requirements for travel to Mauritius.

Don’t miss Africa’s premier peering event – celebrating its 10-year anniversary this year!

The post Register for AfPIF 2019 appeared first on Internet Society.

Unit Testing Workers, in Cloudflare Workers

Unit Testing Workers, in Cloudflare Workers
Unit Testing Workers, in Cloudflare Workers

We recently wrote about unit testing Cloudflare Workers within a mock environment using CloudWorker (a Node.js based mock Cloudflare Worker environment created by Dollar Shave Club's engineering team). See Unit Testing Worker Functions.

Even though Cloudflare Workers deploy globally within seconds, software developers often choose to use local mock environments to have the fastest possible feedback loop while developing on their local machines. CloudWorker is perfect for this use case but as it is still a mock environment it does not guarantee an identical runtime or environment with all Cloudflare Worker APIs and features. This gap can make developers uneasy as they do not have 100% certainty that their tests will succeed in the production environment.

In this post, we're going to demonstrate how to generate a Cloudflare Worker compatible test harness which can execute mocha unit tests directly in the production Cloudflare environment.

Directory Setup

Create a new folder for your project, change it to your working directory and run npm init to initialise the package.json file.

Run mkdir -p src && mkdir -p test/lib && mkdir dist to create folders used by the next steps. Your folder should look like this:

.
./dist
./src/worker.js
./test
./test/lib
. Continue reading

Revolutionary data compression technique could slash compute costs

There’s a major problem with today’s money-saving memory compression used for storing more data in less space. The issue is that computers store and run memory in predetermined blocks, yet many modern programs function and play out in variable chunks.The way it’s currently done is actually, highly inefficient. That’s because the compressed programs, which use objects rather than evenly configured slabs of data, don’t match the space used to store and run them, explain scientists working on a revolutionary new compression system called Zippads.The answer, they say—and something that if it works would drastically reduce those inefficiencies, speed things up, and importantly, reduce compute costs—is to compress the varied objects and not the cache lines, as is the case now. Cache lines are fixed-size blocks of memory that are transferred to memory cache.To read this article in full, please click here

Revolutionary data compression technique could slash compute costs

There’s a major problem with today’s money-saving memory compression used for storing more data in less space. The issue is that computers store and run memory in predetermined blocks, yet many modern programs function and play out in variable chunks.The way it’s currently done is actually, highly inefficient. That’s because the compressed programs, which use objects rather than evenly configured slabs of data, don’t match the space used to store and run them, explain scientists working on a revolutionary new compression system called Zippads.The answer, they say—and something that if it works would drastically reduce those inefficiencies, speed things up, and importantly, reduce compute costs—is to compress the varied objects and not the cache lines, as is the case now. Cache lines are fixed-size blocks of memory that are transferred to memory cache.To read this article in full, please click here

BiB 077: Attend Gluware Intent ’19 With The Packet Pushers In NYC On May 14, 2019

Gluware Intent is a live event we're holding in NYC on May 14, 2019. Come hang out with the Packet Pushers, the Gluware team, and customers to learn about practical network automation. Register via https://packetpushers.net/gluware to reserve your seat, hear presentations, and see the Packet Pushers record a Heavy Networking episode live.

The post BiB 077: Attend Gluware Intent ’19 With The Packet Pushers In NYC On May 14, 2019 appeared first on Packet Pushers.

Automation Solution: Find Source of STP Topology Changes

Topology changes are a bane of large STP-based networks, and when they become a serious challenge you could probably use a tool that could track down what’s causing them.

I’m sure there’s a network management tool out there that can do just that (please write a comment if you know one); Eder Gernot decided to write his own while working on a hands-on assignment in the Building Network Automation Solutions online course. Like most course attendees he published the code on GitHub and might appreciate pull requests ;)

Wonder what else course attendees created in the past? Here’s a small sample.

Health care is still stitching together IoT systems

Government regulations, safety and technical integration are all serious issues facing the use of IoT in medicine, but professionals in the field say that medical IoT is movingforward despite the obstacles. A vendor, a doctor, and an IT pro all spoke to Network World about the work involved.To read this article in full, please click here(Insider Story)

Cisco issues critical security warning for Nexus data-center switches

Cisco issued some 40 security advisories today but only one of them was deemed “critical” – a vulnerability in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could let an attacker secretly access system resources.The exposure, which was given a Common Vulnerability Scoring System importance of 9.8 out of 10, is described as a problem with secure shell (SSH) key-management for the Cisco Nexus 9000 that lets a remote attacker to connect to the affected system with the privileges of a root user, Cisco said.To read this article in full, please click here

Cisco issues critical security warning for Nexus data-center switches

Cisco issued some 40 security advisories today but only one of them was deemed “critical” – a vulnerability in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could let an attacker secretly access system resources.The exposure, which was given a Common Vulnerability Scoring System importance of 9.8 out of 10, is described as a problem with secure shell (SSH) key-management for the Cisco Nexus 9000 that lets a remote attacker to connect to the affected system with the privileges of a root user, Cisco said.To read this article in full, please click here