Spanning tree protocols are used to prevent layer 2 loops in a switched network. There are various forms of spanning tree that have been standardized by the IEEE. The original standards; 802.1D - Legacy Spanning Tree (STP), 802.1w - Rapid Spanning Tree (RSTP) and 802.1s - Multiple...continue reading
Although it was before my time at VMware running the Networking and Security Business Unit, at VMworld 2017 we demonstrated our expanded NSX network virtualization capabilities in the data center, and the start of our journey to bring NSX to the cloud.
A lot has changed in a year.
Earlier in 2018, we announced the expansion of the NSX family of products to include NSX Data Center (formerly NSX), NSX Cloud, AppDefense, NSX SD-WAN by VeloCloud, and NSX Hybrid Connect.
With the new portfolio, we’ve delivered on the Virtual Cloud Network vision of connecting and protecting applications and data, regardless of where they sit – from the data center to the cloud, and the edge.
To help you learn about this vision and the advancements we’ve made in the products that underpin it, we have a huge VMworld 2018 in store for you. With over 70 dedicated networking and security sessions, we’ll cover everything from the basics to super-technical deep dives.
Below is my curated list of can’t-miss networking and security sessions. Make sure you jump onto the content catalog on VMworld.com to reserve your spot before they fill up.
I’m looking forward to joining all of you Continue reading
Hello, and welcome to another Getting Started with Ansible + Windows post! In this article we’ll be exploring what Desired State Configuration is, why it’s useful, and how to utilize it with Ansible to manage your Windows nodes.
So what exactly is Desired State Configuration? It’s basically a system configuration management platform that uses the declarative model; in other words, you tell DSC the “what”, and it will figure out the “how”. Much like Ansible, DSC uses push-mode execution to send configurations to the target hosts. This is very important to consider when delivering resources to multiple targets.
This time-saving tool is built into PowerShell, defining Windows node setup through code. It uses the Local Configuration Manager (which is the DSC execution engine that runs on each node).
Microsoft fosters a community effort to build and maintain DSC resources for a variety of technologies. The results of these efforts are curated and published each month to the Powershell Gallery as the DSC Resource Kit. If there isn't a native Ansible module available for the technology you need to manage, there may be a DSC resource.
DSC Resources are distributed as Continue reading
Big things can often fit into small packages, especially if those packages are tightly bound. …
Bringing Back the Mighty Chiplet was written by Nicole Hemsoth at .
The amusement park’s IT team selected Cohesity's hyperconverged appliance and software-defined storage after a run-off against Rubrik.
The platform has strong backing from Google, Red Hat, and IBM, but lacks official support from AWS and Microsoft.
The company told investors it now has 400,000 cable modems operating in the field with its CableOS network virtualization technology. That’s an increase from 200,000 last quarter.
GE Digital and its Predix IoT platform were once considered key to the future of the company and expected to generate $15 billion in software sales by 2020.
The GSMA announced several additions to the Mobile World Congress Americas event line-up, including new speakers in the conference program, additional participating companies and exhibition experiences, and new programs and events.
“If we can speak up for women today, we can further support other minority groups in future.”
Last year at the Taiwan Internet Governance Forum 2017, we launched TechGIRLs, where we exchanged our life, career, and schooling experience. We all agreed that women in Taiwan enjoy more rights and are more blessed than women in many other countries. But after I attended the Women in ICT session in APNIC 44 and APRICOT 2018, I found there are some differences in Taiwan and other countries, and these problems exist in the whole world. After reviewing ISACA Survey Identifies Five Biggest Barriers Faced by Women in Tech, I agree these are barriers for women, not just in Taiwan, but all over the world:
During the preparation for the Taiwan Internet Governance Forum 2018, I proposed that we discuss these issues in an independent session. We discussed 4 questions:
There has been much written about the potential for FPGAs to take a leadership role in accelerating deep learning but in practice, the hurdles of getting from concept to high performance hardware design are still taller than many AI shops are willing to scale, particularly when GPUs dominate in training and in a pinch, standard CPUs will do just fine for datacenter inference since they involve little developer overhead. …
Intel FPGA Architecture Focuses on Deep Learning Inference was written by Nicole Hemsoth at .
And here we are with an another hot topic that summarizes awesome facts about cyber in 2018. The infographic is re-published with a kind permission of its creator Vasiliii Chekalov and it was originally published on https://www.everycloudtech.com. It is definitely worth to read and I hope you will enjoy it as much as I did.
Awesome cyber security facts
Achieving consistent point-of-sale transactions and cloud application performance over low-speed broadband can be challenging, but finding the right SD-WAN can alleviate some of these difficulties.