Oracle beefs up cloud sales team with 1,000 EMEA openings

Oracle is the latest legacy software vendor looking to reorganise its sales teams to be more focused on cloud services, as it announces 1,000 job openings in EMEA.Oracle is targeting "people from diverse backgrounds and profiles with between two to six years work experience", the official press release states.This follows some positive financial results for Oracle, as it posted a 66 percent year-on-year growth in cloud revenues for Q4 2016. That figure comes in at $1.4 billion and includes PaaS, IaaS and SaaS, which has been boosted by the recent NetSuite acquisition. By comparison AWS posted revenues of $3.66 billion in its latest results back in April.To read this article in full or to leave a comment, please click here

An Introduction to oVirt Ansible Roles

Today I would like to share with you some of the integration work with Ansible 2.3 that was done in the latest oVirt 4.1 release. The Ansible integration work was quite extensive and included Ansible modules that can be utilized for automating a wide range of oVirt tasks, including tiered application deployment and virtualization infrastructure management.

While Ansible has multiple levels of integrations, I would like to focus this article on oVirt Ansible roles. As stated in the Ansible documentation: “Roles in Ansible build on the idea of include files and combine them to form clean, reusable abstractions – they allow you to focus more on the big picture and only dive into the details when needed.”

We used the above logic as a guideline for developing the oVirt Ansible roles. We will cover three of the many Ansible roles available for oVirt:

For each example, I will describe the role's purpose and how it is used.

oVirt Infra

The purpose of this role is to automatically configure and manage an oVirt datacenter. It will take a newly deployed- but not yet configured- oVirt engine (RHV-M for RHV users), hosts, and storage and Continue reading

2 reasons to migrate off of Microsoft Exchange Server

A few weeks back, I wrote that “choosing Microsoft Windows for your organization should get you fired.”It’s a statement that, while certainly a bit on the inflammatory side, I completely stand by—mostly due to the known insecure nature of running Windows as a server operating system.What I didn’t do was give specific examples of what to move your existing Windows-based infrastructure to. Sure, the obvious answer for most SysAdmins is simply “migrate the servers over to Linux.” But what about specific server applications that your organization might already rely upon? That’s a whole other can of worms.To read this article in full or to leave a comment, please click here

2 reasons to migrate off of Microsoft Exchange Server

A few weeks back, I wrote that “choosing Microsoft Windows for your organization should get you fired.”It’s a statement that, while certainly a bit on the inflammatory side, I completely stand by—mostly due to the known insecure nature of running Windows as a server operating system.What I didn’t do was give specific examples of what to move your existing Windows-based infrastructure to. Sure, the obvious answer for most SysAdmins is simply “migrate the servers over to Linux.” But what about specific server applications that your organization might already rely upon? That’s a whole other can of worms.To read this article in full or to leave a comment, please click here

Get $100 off Amazon Echo When You Buy 2 Right Now – Deal Alert

Put 2 Echo devices in your cart and Amazon will credit you back $100 right now, effectively pricing each one at $129.99 vs. the typical $179.99 list price. But you'll have to use a special code at checkout, to activate the discount: ECHO2PACK. Amazon Echo is a hands-free speaker you control with your voice. Echo connects to the Alexa Voice Service to play music, provide information, news, sports scores, weather, and more—instantly. All you have to do is ask. Echo has seven microphones and beam forming technology so it can hear you from across the room—even while music is playing. Echo is also an expertly tuned speaker that can fill any room with 360° immersive sound. When you want to use Echo, just say the wake word “Alexa” and Echo responds instantly. If you have more than one Echo or Echo Dot, Alexa responds intelligently from the Echo you're closest to with ESP (Echo Spatial Perception), so it makes a lot of sense to pick up 2 right now with this discount.  See the Amazon Echo on Amazon.To read this article in full or to leave a comment, please click here

The Trials And Tribulations Of IBM Systems

IBM is a bit of an enigma these days. It has the art – some would say black magic – of financial engineering down pat, and its system engineering is still quite good. Big Blue talks about all of the right things for modern computing platforms, although it speaks a slightly different dialect because the company still thinks that it is the one setting the pace, and therefore coining the terms, rather than chasing markets that others are blazing. And it just can’t seem to grow revenues, even after tens of billions of dollars in acquisitions and internal investments over

The Trials And Tribulations Of IBM Systems was written by Timothy Prickett Morgan at The Next Platform.

Docker Spearheads OCI Release of v1.0 Runtime and Image Format Specifications

Today marks an important milestone for the Open Container Initiative (OCI) with the release of the OCI v1.0 runtime and image specifications – a journey that Docker has been central in driving and navigating over the last two years. It has been our goal to provide low-level standards as building blocks for the community, customers and the broader industry. To understand the significance of this milestone, let’s take a look at the history of Docker’s growth and progress in developing industry-standard container technologies.

The History of Docker Runtime and Image Donations to the OCI

Docker’s image format and container runtime quickly emerged as the de facto standard following its release as an open source project in 2013. We recognized the importance of turning it over to a neutral governance body to fuel innovation and prevent fragmentation in the industry. Working together with a broad group of container technologists and industry leaders, the Open Container Project was formed to create a set of container standards and was launched under the auspices of the Linux Foundation in June 2015 at DockerCon. It became the Open Container Initiative (OCI) as the project evolved that Summer.

Docker contributed runc, a reference implementation for the Continue reading

Demystifying the Open Container Initiative (OCI) Specifications

The Open Container Initiative (OCI) announced the completion of the first versions of the container runtime and image specifications this week. The OCI is an effort under the auspices of the Linux Foundation to develop specifications and standards to support container solutions. A lot of effort has gone into the building of these specifications over the past two years. With that in mind, let’s take a look at some of the myths that have arisen over the past two years.

OCI

Myth #1: The OCI is a replacement for Docker

Standards are important, but they are far from a complete production platform. Take for example, the World Wide Web. It  has evolved over the last 25 years and was built on core dependable standards like TCP/IP, HTTP and HTML. Using TCP/IP as an example, when enterprises coalesced around TCP/IP as a common protocol, it fueled the growth of routers and in particular – Cisco. However, Cisco became a leader in its market by focusing on differentiated features on its routing platform. We believe the parallel exists with the OCI specifications and Docker.

Docker is a complete production platform for developing, distributing, securing and orchestrating container-based solutions. The OCI specification is used Continue reading

Tools for TE with EIGRP

In response to my article about what would cause a directly connected route to be overridden, Matt Love (@showflogi) made a good observation:

What Matt is saying is that longest prefix match (LPM) is a mechanism that can be used to steer traffic around the network in order to meet a technical or business need. This type of traffic steering is called traffic engineering (TE).

LPM refers to how route lookups work on a Layer 3 device: the longest, most-specific match is always chosen. Like I explained in the prior post, if the routing table contains 10.10.10.0/24 and 10.10.10.64/26, the latter route will be used to forward traffic to 10.10.10.100 (as an example) because a /26 is longer (ie, has a longer prefix length) and is therefore more specific. We can use this behavior to direct traffic towards 10.10.10.100 over a specific interface or via a specific path (ie, a path with Continue reading

Nominate a Women Or Girl for an EqualsInTech Award!

Know an amazing woman or girl in tech who’s working for access, skills, or leadership? Why not shine the light on them and nominate them for an EqualsInTech Award!

Equals is an initiative delivered by a committed partnership of ITU, UN Women, GSMA, ITC, and UN University joined by the Internet Society and over 20 corporate leaders, governments, non-profit organizations, communities, and individuals around the world working together to bridge the digital gender divide – by bringing women to tech, and tech to women.

Ms. Joyce Dogniez

Off The Cuff – Engineering In The Enterprise

Is engineering talent disappearing from the enterprise? Our panel thinks so, and has a conversation about the implications for both businesses and individuals. This episode was recorded at Cisco Live 2017 in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Denise Donohue
Guest
Mike Zsiga
Guest
Daniel Dib
Guest
Jeff Fry
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Engineering In The Enterprise appeared first on Network Collective.

Off The Cuff – Engineering In The Enterprise

Is engineering talent disappearing from the enterprise? Our panel thinks so, and has a conversation about the implications for both businesses and individuals. This episode was recorded at Cisco Live 2017 in Las Vegas, NV.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Denise Donohue
Guest
Mike Zsiga
Guest
Daniel Dib
Guest
Jeff Fry
Guest
Jordan Martin
Host

Audio Only Podcast Feed:

The post Off The Cuff – Engineering In The Enterprise appeared first on Network Collective.

Using Geolocation in Firepower Access Control Policies

The use of geolocation is fairly obvious in monitoring networks with Firepower Management Center. What may be less obvious is that Continents and Countries can also be specified as the source or destination of connections in an Access Control Policy. Basically, this geographical information becomes one more match criteria that can be used to identify traffic for a block or allow action.

To get to this capability, open the Access Control Policy that is in use by the Firepower device. Within the policy, open or create an applicable rule. On the network tab (where you configure the source and destination addresses) a Geolocation tab can also be found. Clicking on this tab exposes Continents and Countries. These can be added as sources and/or destinations.

ACPGEO

Note to reader: All Firepower content can be accessed by clicking here (or choosing Firepower from the menu at the top of the page).

As can be seen in the diagram above, I am creating a rule to block traffic to France. Before I save and deploy the policy changes to the device, I will confirm reachability to an IP address that exists in that part of Europe.

Last login: Mon Jul 17 11:48:29 on ttys000
PAULS:~ pauls$  Continue reading