To win more cloud provider customers Cisco is focusing on helping hyperscalers solve big engineering problems, and it's embracing open networking.
When you think of mortgage companies, you think of paperwork. You probably don’t think agile and responsive to customers. But Franklin American Mortgage wanted to disrupt that model. With their investments in innovation, microservices and Docker Enterprise Edition, they’ve been able to quickly create a platform to make technology core to their success.
Don Bauer, the DevOps lead at Franklin American is part of an innovation team the mortgage company had established last year to challenge the status quo. Franklin American was doing amazing things and transforming their business — all with Docker Enterprise Edition as the foundation.
Don presented at DockerCon 2018 along with Franklin American’s VP of Innovation, Sharon Frazier. They’ve been able to quickly build a DevOps culture around four pillars: Visibility, Simplification, Standardization and Experimentation. Experimentation is key. It lets them fail fast, and fearlessly.
In an interview at DockerCon, Don explained how they use Docker Enterprise Edition to drive innovation.
“Docker has allowed us to fail fearlessly. We can test new things easily and quickly and if they work, awesome. But if they don’t, we didn’t spend weeks or months on it.” – Don Bauer, DevOps Lead
For the company, innovation is about Continue reading
The carrier had been rumored to be looking to offload the data center assets, which followed similar sales by telecom rivals Verizon and CenturyLink.
Peter Welcher provides guidance on managing periodic checks of your network infrastructure.
The lawmakers claim Google is “more willing to support the Chinese Communist Party than the U.S. military.”

Images courtesty of DroneDeploy
When we launched Workers a few months ago, much of the focus was on use cases surrounding websites running on origins that needed extra oomph. With Workers you can easily take a site, introduce a raft of personalization capabilities, A/B test changes or even aggregate a set of API responses around a range of services. In short by layering in Cloudflare Workers we can take origin websites and do transformational things.
One of the joys of a platform, is that you never know where you are going to see the next use case. Enter DroneDeploy

DroneDeploy is a cloud platform that makes it easy to collect and analyze drone imagery and data. Simply install DroneDeploy on your mobile device and connect to a DJI drone. DroneDeploy flies the drone, collects the imagery, then stitches the photos into maps.
The maps can show things like crop conditions & stress, construction project progress, or even thermal temperature ranges across vast solar farms or for search and rescue situations.

Using plant health algorithms applied to drone-generated maps, growers can pinpoint crop stress in their fields and stomp out pests, disease, or irrigation issues.
With Thermal Live Map, it’s possible Continue reading
The Silver Peak security alliance ecosystem enables customer to choose from eight different security offerings.
The company's board of directors named CFO Robert Swan as interim CEO while it searches for a successor.
In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership. One of the participants shared her story.
Denise Williams,Coast Salish from Cowichan Tribes on Vancouver Island, began her career as an ESL teacher, with the idea that she would travel the world teaching English. A chance encounter on a bus – “I’m from a small town so I talk to whoever is in my vicinity,” says Williams – served as an entry point to work as a policy analyst for Indigenous and Northern Affairs Canada, which led to Education Technology work at the First Nations Education Steering Committee. “I learned the way that digital technologies either advance or detract from a community’s ability to nurture curiosity in their youth,” says Williams. “I came from no understanding of networks to it becoming my life’s work. I don’t know if i found it or it found me.”
In 2015, Williams took the reigns of the totally defunded First Nations Technology Council, and through strategic planning and vision, has grown the organization’s programs in talent development, Continue reading
It has been four years since Kirk Bresniker, HPE Fellow, vice president, and chief architect at Hewlett Packard Labs, stood before a crowd of journalists and analysts at the company’s Discover show and announced plans to create a new computing architecture that puts the focus on memory and will eventually use such technologies as silicon photonics and memristors. …
HPE Boots Up Sandbox Of The Machine For Early Users was written by Jeffrey Burt at .

Welcome to another installment of our Windows-centric Getting Started Series! In the prior posts we talked about connecting to Windows machines, gave a brief introduction on using Ansible with Active Directory, and discussed package management options on Windows with Ansible. In this post we’ll talk a little about applying security methodologies and practices in relation to our original topics.
In order to discuss security issues in relation to Ansible and Windows, we’ll be applying concepts from the popular CIA Triad: Confidentiality, Integrity, and Availability.

Confidentiality is pretty self-evident — protecting confidentiality helps restrict private data to only authorized users and helps to prevent non-authorized ones from seeing it. The way this is accomplished involves several techniques such as authentication, authorization, and encryption. When working with Windows, this means making sure the hosts know all of the necessary identities, that each user is appropriately verified, and that the data is protected (by, for example, encryption) so that it can only be accessed by authorized parties.
Integrity is about making sure that the data is not tampered with or damaged so that it is unusable. When you’re sending data across a network you want to make sure that it arrives Continue reading