An update on some players in the once-hot software-defined networking space.
The Cisco Continuing Education Program is a brilliant initiative from Cisco. It is not widely known about but Cisco recently announced a new program to help you re-certify your CCIE without taking the written exam. Continuing Education Program – How does it work? The concept is very simple, you have to obtain 100 credits […]
The post CCIE Recertification Continuing Education Program appeared first on Network Automation.
2G is still the most common deployed mobile access technology. It is hard to believe but as per my discussions with probably more than twenty Mobile Operators, 2G , especially GSM is the most common mobile access technology. Almost all those twenty Mobile operators deployed 3G and LTE and some of them deployed LTE Advanced as well, […]
The post 2G is still the most common Mobile network technology appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Here’s a common scenario I’m encountering on Ansible-related forums:
Q: I cannot connect to network devices with my Ansible network modules. I keep getting these weird error messages…
Me: Are you sure you have the device SSH keys in known_hosts file?
Q: How did you know?
Read more ... NetApp and Pure Storage are reportedly shopping themselves.
Victims of identity theft will tell you the experience is like having your personal life broken into, tossed around, and thrown out onto the street. It is a violation that is indescribable. Then, you could discover that strangers are impersonating you, carrying out crimes under your name, and destroying your reputation. Unraveling the mess that follows is a long, painful and never-ending process – all this because someone else was careless or willfully negligent with your data.
Even if your data was not exposed in the Equifax breach, you should be both concerned and angry. This is a potentially catastrophic breach: roughly 143 million individuals (approximately 45% of the US population) now face the prospect of identity theft.
As a society, we need to seriously rethink why and how we identify people. How did the social security number become the default identifier, especially for non-governmental functions such as credit reporting? When the Social Security Administration first issued SSNs in 1936, their “sole purpose” was to track the earning history of workers for benefits. In fact, Kaya Yurieff points out that until 1972, the bottom of the card read: “FOR SOCIAL SECURITY PURPOSES — NOT FOR IDENTIFICATION.”
Social security numbers Continue reading
With the rising popularity of containers, it seems that containers and networking interact more and more frequently. Amongst all the excitement, there is also terminology and technical complexity. And because of this, I’m super grateful for Cumulus in the Cloud. As a Sr. Consulting Engineer, part of my job is ensuring I am deeply familiar with the technologies and methodologies our customers are using. I’ve recently been playing with Cumulus in the Cloud to better learn how Mesos’s Marathon and Mesosphere interoperate with Cumulus Linux and NetQ.
Let me start off by saying that if you’re interested in container networking but want more information on how to do it right, we’re hosting a webinar with Mesosphere that you should most definitely check out. Our co-founder, JR Rivers, will also be hosting, and, I promise you, he’s always an engaging speaker. Of course if you’re already familiar with container networking, or you would like to learn about it in a more hands-on atmosphere, then please read on!
I’m a networking veteran, but working at Cumulus has pushed the boundaries of my networking knowledge as I’ve had to learn more about integrating networking solutions with application functionality. When I have to talk Continue reading
It is hard to remember that for decades, whether a system was large or small, its storage was intricately and inescapably linked to its compute.
Network attached storage, as pioneered by NetApp, helped break those links between compute and storage in the enterprise at the file level. But it was the advent of storage area networks that allowed for storage to still be reasonably tightly coupled to servers and work at the lower block level, below file systems, while at the same time allowing that storage to scale independently from the number of disks you might jam into a single …
The Ascendancy Of Ethernet Storage Fabrics was written by Timothy Prickett Morgan at The Next Platform.
High performance computing, long the domain of research centers and academia, is increasingly becoming a part of mainstream IT infrastructure and being opened up to a broader range of enterprise workloads, and in recent years, that includes big data analytics and machine learning. At the forefront of this expanded use is MasterCard, a financial services giant that is looking to drive the real-time business benefits of HPC.
As MasterCard has learned, however, alongside business value come additional needs around data protection. As HPC systems are more likely to hold customer-facing and other compliance related data, such infrastructure has the potential …
With Machine Learning, Can HPC Be Self Healing? was written by Timothy Prickett Morgan at The Next Platform.
It now runs major OpenStack clouds and works with AWS and Microsoft Azure.
It supports AWS, with Rovius Cloud for Google and Microsoft Azure available later this year.