The best enterprise level firewalls: Rating 10 top products

You know you need to protect your company from unauthorized or unwanted access. You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall.To read this article in full, please click here(Insider Story)

3 Customer Stories You Don’t Want to Miss at DockerCon Barcelona 2018

One of the great things about DockerCon is the opportunity to learn from your peers and find out what they’re doing. We’re pleased to announce several of the sessions in our Customer Stories track. In the track, you’ll hear from your peers who are using Docker Enterprise to modernize legacy applications, build new services and products, and transform the customer experience.

These are just a few of the sessions in the catalog today. You can browse the full list of sessions here. We also have a few more we’ll announce over the coming weeks (some customers just like to keep things under wraps for a little longer).

Desigual Transforms the In-Store Experience with Docker Enterprise Containers Across Hybrid Cloud

Mathias Kriegel, IT Ops Lead and Cloud Architect

Joan Anton Sances, Software Architect

We’re particularly excited to have a local company share their story at DockerCon. In this session, find out how Docker Enterprise has helped Desigual, a global $1 billion fashion retailer headquartered in Barcelona, transform the in-store customer experience with a new “shopping assistant” application.

 

Not Because We Can, But Because We Have To: Tele2 Containerized Journey to the Cloud
Dennis Ekkelenkamp, IT Infrastructure Manager
Gregory Bohncke, Technical Architect

How Continue reading

Figuring Out AWS Networking

One of my friends reviewing the material of my AWS Networking webinar sent me this remark:

I'm always interested in hearing more about how AWS network works under the hood – it’s difficult to gain that knowledge.

As always, it’s almost impossible to find out the behind-the-scenes details, and whatever Amazon is telling you at their re:Invent conference should be taken with a truckload of salt… but it’s relatively easy to figure out a lot of things just by observing them and performing controlled experiments.

Read more ...

YANG, OpenAPI, Swagger and Code Generation

Sometimes during exploration or projects, I want to take a YANG model and convert it along with related dependencies to a Swagger format (think OpenAPI if you’re not familiar with this) so I can create a REST or RESTConf API interface. OpenDayLight does something very similar for it’s Swagger based North Bound Interface (NBI), more information here and just being able to look at the model this way is sometimes helpful. If you’re wondering how helpful this could be, think about developing a client. Using this approach, it’s possible to create stub client and server code for a software implementation, leaving just the logic of what to do when a POST is made or a GET is requested etc.

You may be familiar enough with YANG to know that YANG is a modeling language with its own extensible type system. These YANG models are mostly used for modeling how a programmatic interface to control a feature should be on routers and switches. More recently thanks to the wave of automation sweeping across the globe, YANG models are now used for modeling services, which in turn are rendered over one or more nodes by something else. We’re not going to cover Continue reading

Some notes for journalists about cybersecurity

The recent Bloomberg article about Chinese hacking motherboards is a great opportunity to talk about problems with journalism.

Journalism is about telling the truth, not a close approximation of the truth,  but the true truth. They don't do a good job at this in cybersecurity.

Take, for example, a recent incident where the Associated Press fired a reporter for photoshopping his shadow out of a photo. The AP took a scorched-earth approach, not simply firing the photographer, but removing all his photographs from their library.

That's because there is a difference between truth and near truth.

Now consider Bloomberg's story, such as a photograph of a tiny chip. Is that a photograph of the actual chip the Chinese inserted into the motherboard? Or is it another chip, representing the size of the real chip? Is it truth or near truth?

Or consider the technical details in Bloomberg's story. They are garbled, as this discussion shows. Something like what Bloomberg describes is certainly plausible, something exactly what Bloomberg describes is impossible. Again there is the question of truth vs. near truth.

There are other near truths involved. For example, we know that supply chains often replace high-quality expensive components with cheaper, Continue reading

IoT roundup: Content delivery networks make a play for IoT business

It’s a measure of how big and meaningful a particular technology trend is when big companies that weren’t necessarily in on the ground floor start making a major push for relevance in the market. A couple years ago, every tech company in the world couldn’t wait to tell you about how into the cloud they were, and the same thing is happening to IoT. The pivots, they are a-comin’.This month, some of the heavy hitters moving to make themselves more appealing to the burgeoning IoT market are content delivery networks (CDN) like Akamai and Limelight, both of which were eager to trumpet their edge credentials. More on IoT:To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

How we selected 10 hot business continuity startups to watch

The selection process for our business-continuity-startup roundup began with dozens of recommendations and nominations sent via HARO, LinkedIn, Twitter, and subscribers to the Startup50 email newsletter.This roundup, however, was challenging to flesh out because in the IT world, business continuity is a subset of storage.[ Check out 10 hot storage companies to watch. | Get regularly scheduled insights by signing up for Network World newsletters. ] Plenty of vendors pitched DevOps, security, and networking companie but none of those were a good fit for business continuity. You could make a case that all of those things help ensure business continuity, but they all fit better in different categories.To read this article in full, please click here

Reaction: The Importance of Open APIs

Over at CIMI, Tom Nolle Considers whether the open API is a revolution, or a cynical trap. The line of argument primarily relates to accessing functions in a Virtual Network Function (VNF), which is then related to Network Function Virtualization (NFV). The broader point is made in this line:

One important truth about an API is that it effectively imposes a structure on the software on either side of it. If you design APIs to join two functional blocks in a diagram of an application, it’s likely that the API will impose those blocks on the designer.

This is true—if you design the API first, it will necessarily impose information flow between the different system components, and even determine, at least to some degree, the structure of the software modules on either side of the API. For instance, if you decide to deploy a single network appliance vendor, then your flow of building packet filters will be similar across all devices. However, if you add a second vendor into the mix, you might find the way packet filters are described and deployed are completely different, requiring a per-device module that moves from intent to implementation.

While this problem will always Continue reading

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

10 hot business-continuity startups to watch

In the current landscape business continuity is about a lot more than natural disasters: Denial of service attacks, ransomware and even network outages can undermine business continuity, and while moving applications to the cloud might seem like a viable solution, cloud providers aren’t immune to outages.To read this article in full, please click here(Insider Story)

Interview with Juniper Networks Ambassador Jeff Fry

In this first ever Juniper Ambassador interview, I spend time with fellow Juniper Ambassador Jeff Fry at the Juniper NXTWORK 2018 conference in Las Vegas. We discuss his life as an Ambassador, his job at Dimension Data, his recent contribution to the 2018 Juniper Ambassador’s Cookbook, his interest in DevOps and automation, and his contribution …