Hands-on Learning Opportunities at DockerCon EU

 

The value of attending a conference is measured by how much you can learn and who you will meet. While DockerCon has you covered on both fronts. We know that everyone learns differently so the conference provides three options for you.

Workshops: Starting this year at DockerCon San Francisco, we introduced a track dedicated to workshops where technical experts deliver 2-hour deep dive sessions with hands-on tutorials to deepen your understanding of Docker technology, Kubernetes, Isito and solutions from our ecosystem partners. Included as part of your conference pass, you must pre-register for workshops to save your seat.  

Hands on Labs: I instructor-led isn’t your thing, check out the self-paced Hands-On Labs. Also included with our conference pass, Hands-On Labs are available at any time throughout the conference. Drop in between sessions or anytime – grab a seat and launch a tutorial. Docker moderators will be on hand to help answer questions.

Training: In addition, you can add official Docker training courses to your DockerCon schedule at a discounted rate. Come early to Barcelona for a 2 day training course led by Docker authorized instructors and designed specifically for your role in using containers. Each course features a variety Continue reading

The Ultimate Guide to Networking & Security Sessions & Activities at VMworld Europe

At VMworld 2017, we took the NSX show on the road and demonstrated our expanded capabilities and support for new use cases, locations, and clouds.

But a lot has changed in a year.

Earlier in 2018, we announced the expansion of the NSX family of products to include NSX Data Center (formerly NSX), NSX Cloud, AppDefense, NSX SD-WAN by VeloCloud, and NSX Hybrid Connect. With the new portfolio, we’ve delivered on the Virtual Cloud Network vision of connecting and protecting applications and data, regardless of where they sit – from the data center, to the cloud, and the edge.

VMworld Europe

To help you learn about this vision, and the products that underpin it, we have a huge VMworld 2018 in store for you. There are over 50 dedicated networking and security sessions covering everything from the basics to super-technical deep dives.

Be sure to attend the showcase sessions:

As a bonus, you can hear from real customers about their experiences in the Customer Panel on NSX Data Center.

Below is a guide to all things Networking and Security at Continue reading

Open Switch Hardware’s Journey into the Linux and Kernel Community

You have read, heard and seen us talk about the benefits of Linux, open source and community. Here, here, and here… and I am pretty sure everywhere. This blog walks you through our journey of pushing Linux open switch ASICs into the Linux kernel and ecosystem. Before we begin, let me tell you that it has and continues to be a fun ride!

 

A quick historical recap on Linux networking

The Linux kernel has been doing network hardware offloads and acceleration for decades (Nics, smart-nics, wireless AP’s and many other places). Because of this, the kernel has had the infrastructure and the right abstractions to recognize and register a networking hardware device for decades. And this infrastructure has matured over time.

For hardware vendors, enabling their networking hardware for Linux just made it easier to take their hardware to new customers, objectives and industries. Today Linux enablement is the best way to get faster adoption of your hardware or faster marketing for your hardware. It has become a norm for hardware vendors to get their hardware ready for Linux first: getting their drivers in the upstream kernel and getting hardware tools ready for the Linux ecosystem.

Continue reading

We need to talk… about the state of internet governance

Pre IGF Speed Dating

In about a month, some of the key stakeholders in internet governance will come together in Paris and talk about the public policy challenges facing the internet in 2018 and beyond. They will do so at the Internet Governance Forum, a UN-supported platform that will meet for the thirteenth time this year.

The IGF traditionally brings different groups of stakeholders into a large conference centre, and provides for the opportunity for these different stakeholders to discuss: the idea being that understanding, consensus and collaboration will emerge between these different communities.

Join us for a pre-IGF stakeholder networking event on Tuesday, 16 October in Brussels.  Learn more and register!

Multistakeholderism: a vivid term with many meanings

The IGF model of multistakeholderism is one of a plethora of different approaches to engaging with actors beyond states in questions of global governance. Some rely more on governments, other processes rely on technical expertise, others have come and gone. Others, like the Internet Society, tend to refer to multistakeholder approaches, rather than one model.

Many observers tend to think this concept was invented by the internet community, but shaping (global) policy through direct engagement with stakeholders has been an integral Continue reading

Indigenous Connectivity Summit 2018: Training Day

True to its location in Festival City – also known as Edmonton, Alberta – the 2018 Indigenous Connectivity Summit’s training day crackled with the energy of community networking advocates from around the world.

Held at the Faculty of Extension at the University of Alberta, the event began with a smudging ceremony led by Dr. Lana Whiskeyjack from Saddle Lake Cree Nation. Lana spoke about the role of smudging to ground ourselves through ceremony. Herman Many Guns from Piikani First Nation then said a prayer and thanked our Treaty 6 hosts for allowing us to host the event on their territories.

Returning to the main venue, Jane Coffin from the Internet Society stressed that community networks are not “pirate” initiatives but rather efforts by communities to support community development through locally-owned and operated broadband. They aim at long-term sustainability and are driven by cooperation and innovation: “They inspire us to think differently and to solve problems together.” Jane also pointed to the barriers these initiatives face, including inappropriate licensing and permits, high taxes and fees on equipment, limited access to financing and funding, and restricted spectrum. Governments and regulatory agencies play an important part in addressing these issues.

Next, I Continue reading

Infrastructure life cycle costs: How ITAD and TPM can save you money

I was recently reading some responses to a question posted on the Spiceworks community forum that asked, “How do you dispose of old hard drives?" While there were some typically humorous responses, such as use them as target practice, smash them with a hammer, or drill a hole through them, I assume those comments were in jest. If not, those respondents are missing out on a great opportunity to get money back for their used equipment.It also reminds me of the need for safe, secure IT asset disposition (ITAD) services. It’s imperative to find an ITAD provider that offers data sanitization and destruction services that protect your company’s data integrity and privacy, handles your gear in an environmentally responsible way, and can also save your company money.To read this article in full, please click here

ICANN’s internet DNS security upgrade apparently goes off without a glitch

So far, so good. That’s the report from Internet Corporation for Assigned Names and Numbers (ICANN) as it rolled out the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS) on Oct. 11.The change is central to ICANN’s project to upgrade the top pair of cryptographic keys used in the Domain Name System Security Extensions (DNSSEC) protocol — commonly known as the root zone key signing key (KSK) — which secures the internet's foundational servers. This so-called root KSK rollover from the 2010 KSK to the 2017 KSK was supposed to take place almost a year ago but was delayed until Oct. 11 of this year because of concerns it might disrupt internet connectivity to significant numbers of web users.To read this article in full, please click here