Is Kubernetes Ready to Replace OpenStack and VMware?
CNCF Executive Director Dan Kohn said the group is focused during the second-half of this year on seeing if Kubernetes can take on a greater role in shaping the future of cloud architecture.
CNCF Executive Director Dan Kohn said the group is focused during the second-half of this year on seeing if Kubernetes can take on a greater role in shaping the future of cloud architecture.
Since the advent of AWS Lambda in 2014, the Function as a Service (FaaS) programming paradigm has gained a lot of traction in the cloud community. At first, only large cloud providers such as AWS Lambda, Google Cloud Functions or Azure Functions provided such services with a pay-per-invocation model, but since then interest has increased for developers and entreprises to build their own solutions on an open source model.
The maturation of container platforms such as Docker EE has made this process even easier, resulting in a number of competing frameworks in this space. We have identified at least 9 different frameworks*. In this study, we start with the following six: OpenFaaS, nuclio, Gestalt, Riff, Fn and OpenWhisk. You can find an introduction (including slides and videos) to some of these frameworks in this blog post from the last DockerCon Europe.
These frameworks vary a lot in feature set, but can be generalized as having several key elements shown in the following diagram, from the Serverless Architecture from CNCF Serverless Working Group whitepaper:

IPv6 Buzz is back with a new episode on how SDN could change how we think about the role IPv6 plays in the enterprise. Our guest is Tim Martin.
The post IPv6 Buzz 002: SDN And IPv6 With Tim Martin appeared first on Packet Pushers.
There is no shortage of data in the life sciences. Every talk about bioinformatics and genomics has to include the now ubiquitous hockey stick growth graph of digital DNA. …
What Data Deluge In Life Sciences Means For Exascale And Clouds was written by James Cuff at .
For the past several years, Teuto.net, a small public and private cloud provider in Germany, has used the open source Ceph software as the backbone of its storage infrastructure. …
Cloud Provider Embraces NVMesh To Lower Storage Latencies was written by Jeffrey Burt at .
Virtual Routing and Forwarding (VRF) is a ubiquitous concept in networking, first introduced in the late 1990s as the control and data plane mechanism to provide traffic isolation at layer 3 over a shared network infrastructure. VRF for Linux is an excellent blog that describes the technology behind VRFs, especially as it pertains to the Linux kernel. With the introduction of support for leaking of routes, VRFs get to enjoy their isolation while also having the nous to mix and mingle.
You have a valid question there. That was certainly the initial use case for VRFs. Each VRF was intended to represent a customer of a service provider and isolation was a fundamental tenet. Each VRF had its own routing protocol sessions and IPv4 and IPv6 routing tables and route computation as well as packet forwarding was independent from other VRFs. All communication stayed within the VRF other than specific scenarios such as reaching the Internet. Hershey’s wouldn’t want to get too chatty with Lindt, right? No, VRFs weren’t meant to be gregarious.
As VRFs moved outside the realm of the service provider and started finding application elsewhere, such as in the Continue reading
Course Duration: 1hr 45min
About the Course
The modern accessibility of public, private and hybrid cloud environments has led rise to a bastion of cloud-centric practices. One of the most notable is the idea of QA and Testing in the cloud. This course will describe the concepts, methodologies and implementations of testing in a cloud environment. We will go through the full software QA lifecycle and describe where and how each component of that lifecycle can be offloaded into the cloud and further describe methods and mechanisms on how to do so effectively.
As you might know, Red Hat Ansible Tower supports SAML authentication (both N and Z) by default. This document will guide you through the steps for configuring both products to delegate the authentication to RHSSO/Keycloak (Red Hat Single Sign-On).
Requirements:
Unless you have your own certificate already, the first step will be to create one. To do so, execute the following command:
openssl req -new -x509 -days 365 -nodes -out saml.crt -keyout saml.key
Now we need to create the Ansible Tower Realm on the RHSSO platform. Go to the "Select Realm" drop-down and click on "Add new realm":

Once created, go to the "Keys" tab and delete all certificates, keys, etc. that were created by default.
Now that we have a clean realm, let's populate it with the appropriate information. Click on "Add Keystore" in the upper right corner and click on RSA:

Click on Save and create your Ansible Tower client information. It is recommend to start with the Tower configuration so that you can inject the metadata file and customize a few of the fields.
Log in as the admin user Continue reading
InfoVista’s VNF will be added to Huawei’s open SD-WAN service to support application monitoring and delivery capabilities, WAN optimization, and analytics.
Similar to the earlier Spectre and Meltdown bugs the new security flaw could allow access to sensitive data through a side channel. Intel ranks it as a “moderate” vulnerability.
In this interview, Karl Brown, senior director of product management for the Citrix NetScaler SD-WAN platform, talks about Citrix’s approach to SD-WAN.
In this episode of the History of Networking, we sit with Steve Crocker to discuss the history of email. This was a long session, so we split it up into two episodes; the next episode should be published next week.
Hello from San Francisco! Tuesday we kicked off the first day of DockerCon with general session jam packed with inspiration, demos and customer guest speakers.
Steve Singh, our CEO and Chairman opened the session with Docker’s promise to ensure freedom of choice, agility in development and operations and pervasive security in a container platform that can help unlock the potential for innovation in every company. Docker will deliver an integrated toolset with a delightful user experience that needs innovators like you.

Day one also featured three demos of new technologies capabilities for both Docker Desktop and Docker Enterprise Edition. These features are not yet generally available but released and those interested in the beta can sign up here to be notified.
This latest specification means that operators can deploy 5G without being dependent upon an underlying 4G LTE network.
Virtuosys' software relies on containers to support and secure applications. That use is similar to a cloud deployment using VMs for greater efficiency, but uses containers because VMs were considered too "heavy" to work at the edge.