A Secure Supply Chain for Kubernetes

The beta release of the Docker Enterprise Edition (Docker EE) container platform last month integrates Kubernetes orchestration, running alongside Swarm, to provide a single container platform that supports both legacy and new applications running on-premises or in the cloud. For organizations that are exploring Kubernetes or deploying it in production, Docker EE offers integrated security for the entire lifecycle of a containerized application, providing an additional layer of security before the workload is deployed by Kubernetes and continuing to secure the application while it is running.

Mike Coleman previously discussed access controls for Kubernetes. This week we’ll begin discussing how Docker EE secures the Kubernetes supply chain.

What is a Software Supply Chain?

When you purchase something from a retail store, there is an entire supply chain that gets the product from raw materials to the manufacturer to you. Similarly, there is a software supply chain that takes an application from code on a developer’s laptop to production.

Every company’s software supply chain may be slightly different; some outsource software development, some have adopted Continuous Integration and Continuous Delivery processes, and some deploy production applications across multiple clouds, some on-premises. Regardless of what the software supply chain consists of, Continue reading

IDG Contributor Network: The future of IoT device management

The Internet of Things (IoT) continues to expand its reach into homes, businesses, social settings, and other environments, as more and more devices are connected with the purpose of gathering and sharing data.Clearly, there are several potential benefits of IoT from a consumer standpoint. Apart from the convenience aspect, smart connected products can lead to increased energy efficiency, improved safety and security, higher product quality, etc.But unfortunately, the current consumer IoT device landscape is still immature. For consumer IoT devices to thrive, device management capabilities need to evolve in a few ways.IoT device management is the process of authenticating, provisioning, configuring, monitoring and maintaining the device firmware and software that provides its functional capabilities. Effective device management is critical to establishing and maintaining the health, connectivity, and security of IoT devices. IoT application vendors typically provide comprehensive device management with their solutions. But all bets are off if that application vendor goes out of business and you would like to use your devices with a similar application from a different vendor. Consumers are increasingly faced with unexpected device obsolescence and landfills are starting to fill up with expensive IoT bricks. What consumer IoT needs is a truly Continue reading

New to the INE video library: CCIE Service Provider v4.1 Exam Review

Last week we added a new exam review course to correlate with the recent Service Provider v4.1 blueprint changes. All Access Pass members can view this exam review by logging into their streaming account. This course is also available for purchase at ine.com.

 

Why Take This Course?

This Course reflects the v4.1 blueprint changes and is the most up to date Service Provider exam review in INE’s video course library. This course provides an overview of blueprint changes, as well as the technologies candidates should know in order to pass their CCIE Service Provider exam.

About the Course

This course is taught by Brian McGahan and includes 27 hours on content. This course is intended for those in the final stages of their CCIE studies preparing to take the CCIE Service Provider Lab Exam. Prior to taking this course, viewers should have a foundational understanding of the blueprint technologies covered in this exam and a working knowledge of Cisco’s IOS interface.

What You’ll Learn

This course will refine your skills and expand your knowledge of the blueprint technologies. You will also learn to change the way you think about problems and how to derive solutions. Last, Continue reading

Sorting list in Python

During my Python studies, I came across something that didn’t make much sense to me so I had to learn and investigate (with the help of experts). What you can usually do in Python is to modify a variable and assign the result to the same variable. Because a piece of code is usually worth much more than an explanation: [crayon-5a96e02e428e1312116645/] When you want to sort a list, that behavior is a bit different: let’s pretend I have a list of ARP entries into my switch: [crayon-5a96e02e428ee971099170/] If I want to sort it and reassign the value of it to the previously used variable I would use this code (Let’s pretend arp_entries is my variable that contains all these entries): [crayon-5a96e02e428f6056918892/] [Read More...]

The post Sorting list in Python appeared first on VPackets.net.

History Of Networking – Alia Atlas – Fast Reroute

We often take dynamic routing protocol failover for granted but there’s a lot of complexity that goes into ensuring resilient loop free alternative paths. In this episode of History of Networking, Alia Atlas joins Network Collective to talk about her contributions to IP fast reroute.


Alia Atlas
Guest
Russ White
Host
Donald Sharp
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Alia Atlas – Fast Reroute appeared first on Network Collective.

Super Bowl LII set football and Wi-Fi network records

Super Bowl LII was played about a month ago, and much to the chagrin of New England Patriots fans, the team lost despite a number of records being set by Tom Brady and his team. In a losing effort, the QB threw for over 500 yards, something that had never been done before. Also, no losing team has ever had as many yards or points. It was certainly one of the most memorable games in recent history, particularly for the long-suffering Philadelphia Eagles fans.Records were also set in the stands with new highs in Wi-Fi network usage. For the fifth consecutive year, Extreme Networks was the Official WiFi Analytics provider of the Super Bowl, and its ExtremeAnalytics (formerly known as Purview) captured all the data transferred over the stadium Wi-Fi network. (Note: Extreme is a client of ZK Research.) The NFL and its individual teams have been using the data to better understand what fans do on their mobile devices during games in hopes of creating an overall better experience. Some of the highlights from the big game are listed below.To read this article in full, please click here

Super Bowl LII set football and Wi-Fi network records

Super Bowl LII was played about a month ago, and much to the chagrin of New England Patriots fans, the team lost despite a number of records being set by Tom Brady and his team. In a losing effort, the QB threw for over 500 yards, something that had never been done before. Also, no losing team has ever had as many yards or points. It was certainly one of the most memorable games in recent history, particularly for the long-suffering Philadelphia Eagles fans.Records were also set in the stands with new highs in Wi-Fi network usage. For the fifth consecutive year, Extreme Networks was the Official WiFi Analytics provider of the Super Bowl, and its ExtremeAnalytics (formerly known as Purview) captured all the data transferred over the stadium Wi-Fi network. (Note: Extreme is a client of ZK Research.) The NFL and its individual teams have been using the data to better understand what fans do on their mobile devices during games in hopes of creating an overall better experience. Some of the highlights from the big game are listed below.To read this article in full, please click here

2018 European Chapters’ Meeting Travel Fellowship

  • This is the application for the Internet Society Travel Fellowship to the European Chapters' Meeting. The objective of the European Chapters' Meeting is to discuss Internet related topics that are relevant to the region, namely questions around the digital economy, local content, education, and how the organization's new campaign model will manifest in terms of regional activities. Fellowships will be awarded through a competitive application process.

    All applicants should be:

    • A member of the Internet Society
    • An individual who has not attended an European Chapters' Meeting in the past
    • Able to present a strong motivation for attending the European Chapters' Meeting

    The working language of the meeting is English. Individuals applying for the Fellowship should be comfortable and able to follow discussions in the English language.

    The 2018 European Chapters' Meeting will be held in Sofia, Bulgaria from 24-26 April.

Application Form
  • As in your passport
  • As in your passport

The Engine Of HPC And Machine Learning

There is no question right now that if you have a big computing job in either high performance computing – the colloquial name for traditional massively parallel simulation and modeling applications – or in machine learning – the set of statistical analysis routines with feedback loops that can do identification and transformation tasks that used to be solely the realm of humans – then an Nvidia GPU accelerator is the engine of choice to run that work at the best efficiency.

It is usually difficult to make such clean proclamations in the IT industry, with so many different kinds of

The Engine Of HPC And Machine Learning was written by Timothy Prickett Morgan at The Next Platform.