It all started with a new twist on an old idea, that of a lightweight software container running inside Linux that would house applications and make them portable. And now Docker is coming full circle and completing its eponymous platform by opening up the tools to allow users to create their own minimalist Linux operating system that is containerized and modular above the kernel and that only gives applications precisely what they need to run.
The new LinuxKit is not so much a variant of Linux as a means of creating them. The toolkit for making Linuxes, which was unveiled …
Docker Completes Its Platform With DIY Linux was written by Timothy Prickett Morgan at The Next Platform.
Moat will remain an independent platform.
The post Worth Reading: Game of nodes appeared first on rule 11 reader.
Thoughts from the Content Marketing Institute for budding podcasters were shared here. Here’s my response to the points that stood out to me.
“At first, format trumps talent.” And then later…“Avoid the race to the bottom of simply booking the biggest guests in your niche and meandering through an unplanned episode. Instead, find your format.”
Response. To record an effective show people will listen to, you need a plan, agreed. However, the article cites an example of a 15 minute long episode carved into blocks of minutes and seconds.
Perhaps that’s what you need when working against an ultra-tight timeline. However, an outline that provides structure should be adequate. Overly structuring a podcast is burdensome and can serve to stifle interesting conversation. Freedom is one of the benefits of podcasting.
Podcasting is NOT a digital regurgitation of radio, although many try to shoehorn podcasts into a radio format, because the radio business is what they understand. However, podcast content is different. Distribution is different. Listener consumption is different. Monetization is different.
And perhaps most importantly, timelines are fluid. 15 minute long podcasts are being created under an artificial time constraint that begs the question…why?
On the other hand, Continue reading
Riverbed acquires enterprise WiFi technology that it will integrate into its SD-WAN product.
Harman is demonstrating the technology at IBM's Watson IoT headquarters in Munich.
Xirrus' access points provide Riverbed with data from the edge.
Currently, networking on AWS occurs at the host level, not at the container level.
Scaling the performance of machine learning frameworks so they can train larger neural networks – or so the same training a lot faster – has meant that the hyperscalers of the world who are essentially creating this technology have had to rely on increasingly beefy compute nodes, these days almost universally augmented with GPUs.
There is a healthy rivalry between the hyperscalers over who has the best machine learning framework and the co-designed iron to take the best advantage of its capabilities. At its F8 developer conference, Facebook not only rolled out a significantly tweaked variant of the open source …
Machine Learning Gets An InfiniBand Boost With Caffe2 was written by Timothy Prickett Morgan at The Next Platform.
It's a 'Swiss Army Knife' for federal cloud security compliance.
With the release of NSX for vSphere® 6.3, VMware has not only introduced several key security features such as Application Rule Manager and Endpoint Monitoring, which provide deep visibility into the application, and enable a rapid zero-trust deployment, but has also achieved Corporate Firewall Certification in independent testing performed by ICSA labs, a leading third-party testing and certification body and independent division of Verizon.
VMware NSX for vSphere 6.3 has been tested against an industry-accepted standard to which a consortium of firewall vendors, end users and ICSA labs contributed, and met all the requirements in the Baseline and Corporate module of the ICSA Module Firewall Certification Criteria version 4.2.
NSX is the only true micro-segmentation platform to achieve ICSA Firewall certification — with the NSX Distributed Firewall providing kernel-based, distributed stateful firewalling, and the Edge Services Gateway providing services such as North-South firewalling, NAT, DHCP, VPN, load balancing and high availability. VMware NSX provides security controls aligned to the application and enables a Zero-Trust model, independent of network topology.
The ICSA Firewall Certification criteria focus on several key firewall aspects, including stateful services, logging and persistence. ICSA also validates Continue reading