JFK Medical Center Refreshes Dell EMC Storage With NetApp
The community hospital said Dell EMC's environment was a bit complicated.
The community hospital said Dell EMC's environment was a bit complicated.
The U.S. Securities and Exchange Commission could soon crack down on unregulated cryptocurrency trading platforms after the agency sent a strongly worded warning to them this week.
The SEC warned that unregulated online trading platforms may be misleading investors by calling themselves “exchanges,” which implies federal oversight. An SEC-related securities exchange, among other safeguards, has rules designed to prevent fraud and other manipulative practices, the SEC said in an advisory issued Wednesday.
The SEC advisory served as much as a warning to investors using cryptocurrency trading platforms as to the platforms themselves.
“The SEC staff has concerns that many online trading platforms appear to investors as SEC-registered and regulated marketplaces when they are not,” the advisory said. “Many platforms refer to themselves as ‘exchanges,’ which can give the misimpression to investors that they are regulated or meet the regulatory standards of a national securities exchange.”
The SEC does not review the trading protocols used by unregulated trading platforms, it said. “Although some of these platforms claim to use strict standards to pick only high-quality digital assets to trade, the SEC does not review these standards or the digital assets that the platforms select, and the so-called standards should Continue reading
The National Center for Atmospheric Research developed its own container platform.

The Oracle Cloud Infrastructure (OCI) team is proud of the data centers and network we are building for the next generation of cloud users and, in the spirit of transparency, we want to share with our users tools to better evaluate and measure the performance they will experience on our cloud. Today, we are pleased to announce two new network tools available in the Console to help you measure and analyze network performance.
OCI Market Performance is an interactive visualization tool that displays network performance metrics from OCI regions to cities around the globe. Performance is measured over time to a carefully curated set of endpoint IP addresses within the top providers in each market, providing the user with aggregated performance data for markets and providers over the last day, week, month or three months. This latency data from our Phoenix, Ashburn, and Frankfurt regions can help you predict and manage network performance. We will be adding metrics for more of our regions as they come online (including our twelve recently announced regional data centers).

OCI Market Performance can also assist in planning for growth, as you extend your footprint into new global markets. For FastConnect customers, this tool can help to predict performance between an OCI region and a specific Continue reading
Telefónica and China Unicom enter IoT agreement; The Pentagon slashes deal with AWS partner; Dropbox leverages Equinix.
If you're upgrading your network, it's worthwhile asking others for input in order to avoid a poor or costly design that doesn't serve the needs of your business.
Don’t forget to watch Keith Bogart’s live CCNA/CCNP Q&A session TODAY at 1pm!
During this live Q&A Keith bogart will answer all of your questions about the Cisco CCNA and CCNP Routing and Switching exams. Check back at 1 pm (EST) to get all of your questions answered by an industry expert.
Here’s something I’ve been working on recently: Ansible modules for Extreme SLX switches & routers. Ansible is a popular automation framework, and with good reason: it has a low barrier to entry. Time to usefulness is short. But you need device-specific modules to work with networking devices. Finally we have some modules for SLX. Read on for how to use them.
This blog is not an intro to Ansible in general. There’s plenty of good intros out there. This is specifically about demonstrating Ansible with SLX switches.
Ansible is an agent-less configuration management system. It uses “playbooks”, written in YAML, to define desired configuration state. “modules” written in Python translate this into whatever is needed to configure the system, application, database or network device.
Ansible has been making great strides in adding network automation capabilities. But we haven’t had any modules for working with ~Brocade~ Extreme devices. That is now changing.
PaulQuack has contributed MLXe (Ironware) modules, which will go GA in Ansible 2.5 (due for release in March 2018). And I’ve been working on modules for the SLX, with my colleagues. These have not yet been merged upstream, but it’s Open Source, so you can grab Continue reading
Hey, it's HighScalability time:

If you like this sort of Stuff then please support me on Patreon. And I'd appreciate if you would recommend my new book—Explain the Cloud Like I'm 10—to anyone who needs to understand the cloud (who doesn't?). I think they'll learn a lot, even if they're already familiar with the basics.
The beta release of Docker Enterprise Edition has seen incredible activity. The highlight of the upcoming Docker Enterprise Edition (Docker EE) release is the integration of Kubernetes and bringing all of the advanced security, RBAC and management capabilities of Docker EE to Kubernetes. At the same time, we have been working to improve Swarm, delivering the only container platform that allows you to run both orchestrators in the same cluster. In this blog post, we’ll highlight some the key new capabilities around application-layer (Layer 7) routing and load balancing for Swarm-deployed applications. These enhancements come from the new Interlock 2.0 architecture which provides a highly scalable and highly available routing solution for Swarm. The new architecture brings some additional features to the platform, including path-based routing and SSL termination.
Layer 7 load balancing allows traffic going to host domains like acme.com to be distributed across specific containers in your environment. With path-based routing, traffic headed to sub-domains within acme.com (eg. acme.com/app1 or acme.com/app2) can be separately routed to different sets of containers. This can be especially useful for optimizing application performance by driving different requests to different groups of containers.

Read Continue reading