Event-Driven Ansible: Driving Innovations at the Edge

Across every industry, automation at the edge is enabling emerging use cases, helping organizations drive the next wave of innovation as they explore and execute digital transformation initiatives. The introduction of Event-Driven Ansible is especially exciting when considering the impacts to edge environments. 

 

Event-Driven Ansible at the edge

The edge can bring new challenges of limited or no IT staffing in remote locations such as branches, stores, warehouses, or plant floors. These remote edge facilities are often more focused on Operational Technology (OT), or small form factor IT devices.   

Having a single platform to enable manually and automatically initiated actions across an entire technology landscape – from data center to cloud to edge – is critical to facilitating IT/OT convergence, a necessity in order to maintain competitiveness.  

Ansible Automation Platform does not require an agent to be present on a target system receiving an automated action, which is convenient and ideal for technologies that cannot host an agent, such as an edge device or network router. This feature makes Event-Driven Ansible a simpler solution to deploy and more capable of handling automation at the edge.  

 

Where do you start? Think big, Continue reading

Now on sale at Bed Bath & Beyond: One slightly used data center

With Bed Bath & Beyond filing for bankruptcy last month, it’s liquidation-sale time. That doesn’t mean just  blankets and cookware; it also includes its data center in North Carolina. Not just its servers but the whole facility.The data center in Claremont, N.C., was built in 2013 with a total of 47,500 square feet, 9,500 feet of which is raised floor space, with the ability to double the amount of raised floor space and boost the total power from 1MW to 3.5MW.It is rated a Tier III on the data-center ranking scale of I through IV. Tier III data centers have redundant components and infrastructure for power and cooling, with a guaranteed 99.982% availability.To read this article in full, please click here

Now on sale at Bed Bath & Beyond: One slightly used data center

With Bed Bath & Beyond filing for bankruptcy last month, it’s liquidation-sale time. That doesn’t mean just  blankets and cookware; it also includes its data center in North Carolina. Not just its servers but the whole facility.The data center in Claremont, N.C., was built in 2013 with a total of 47,500 square feet, 9,500 feet of which is raised floor space, with the ability to double the amount of raised floor space and boost the total power from 1MW to 3.5MW.It is rated a Tier III on the data-center ranking scale of I through IV. Tier III data centers have redundant components and infrastructure for power and cooling, with a guaranteed 99.982% availability.To read this article in full, please click here

Dealing with Cisco ACI Quirks

Sebastian described an interesting Cisco ACI quirk they had the privilege of chasing around:

We’ve encountered VM connectivity issues after VM movements from one vPC leaf pair to a different vPC leaf pair with ACI. The issue did not occur immediately (due to ACI’s bounce entries) and only sometimes, which made it very difficult to reproduce synthetically, but due to DRS and a large number of VMs it occurred frequently enough, that it was a serious problem for us.

Here’s what they figured out:

Dealing with Cisco ACI Quirks

Sebastian described an interesting Cisco ACI quirk they had the privilege of chasing around:

We’ve encountered VM connectivity issues after VM movements from one vPC leaf pair to a different vPC leaf pair with ACI. The issue did not occur immediately (due to ACI’s bounce entries) and only sometimes, which made it very difficult to reproduce synthetically, but due to DRS and a large number of VMs it occurred frequently enough, that it was a serious problem for us.

Here’s what they figured out:

BrandPost: The role of network access control in Zero Trust security

By: Eve-Marie Lanza, Senior Security Solutions Marketing Manager, HPE Aruba Networking.An advertising campaign from the 1980s posited that peanut butter and chocolate were, “two great tastes that taste great together.” While confectionary tastes may vary, there’s no denying that some things just work better together. When it comes to IT security, network access control, and Zero Trust security are like peanut butter and chocolate—great on their own, undeniably better together.Network access control vs. Zero Trust securityNetwork access control and Zero Trust security are not the same, but they are related.To read this article in full, please click here

FCC’s latest spectrum move rewards satellite providers

The FCC’s latest spectrum policy announcement, which preserves 500MHz of the 12GHz band for satellite use while designating another 500MHz for terrestrial radios, is a recognition that satellite internet providers like Starlink are being heard, according to experts.The commission’s latest notice of proposed rulemaking, posted May 18, reflects a more even-handed approach than has been adopted in the past. In carving up the airwaves for C-band usage, substantial amounts of spectrum were taken away from incumbent satellite users and handed off to terrestrial operators, most notably major telecom providers.To read this article in full, please click here

Ethernet turns 50, but its voyage has only begun

You’d be hard pressed to find another technology that has been as useful, successful, and ultimately influential as Ethernet, and as it celebrates its 50th anniversary this week, it is clear that Ethernet’s journey is far from over.Since its invention by Bob Metcalf and David Boggs back in 1973, Ethernet has continuously been expanded and adapted to become the go-to Layer 2 protocol in computer networking across industries.To read this article in full, please click here

Tech Bytes: Pica8 NOS Enables Multi-Vendor Networking To Solve Campus Supply Chain Problems (Sponsored)

Today on the Tech Bytes podcast we speak with sponsor Pica8 about how whitebox networking gives engineers the flexibility to choose the hardware and software that best meets their campus needs. Because Pica8’s network OS can run on multiple hardware platforms, engineers can overcome challenges including supply chain disruptions, end-of-life hardware, and security events.

Tech Bytes: Pica8 NOS Enables Multi-Vendor Networking To Solve Campus Supply Chain Problems (Sponsored)

Today on the Tech Bytes podcast we speak with sponsor Pica8 about how whitebox networking gives engineers the flexibility to choose the hardware and software that best meets their campus needs. Because Pica8’s network OS can run on multiple hardware platforms, engineers can overcome challenges including supply chain disruptions, end-of-life hardware, and security events.

The post Tech Bytes: Pica8 NOS Enables Multi-Vendor Networking To Solve Campus Supply Chain Problems (Sponsored) appeared first on Packet Pushers.

Network Break 431: Juniper NAC Emerges From The Mist; New Google TLDs Are A Bad Idea

This week's Network Break looks at a new Network Access Control (NAC) offering from Juniper, plus a ChatGPT integration with Juniper's Marvis. Google debuts new Top-Level Domains that have security experts worried, Cisco reports a robust Q3, Broadcom tries to assuage EU regulators about its VMware acquisition, and more tech news.

The post Network Break 431: Juniper NAC Emerges From The Mist; New Google TLDs Are A Bad Idea appeared first on Packet Pushers.

5G network slices could be vulnerable to attack, researchers say

5G promises increased speed, lower latency, and support for a significantly larger number of connected devices. But the growth in devices and in new applications that will ensue also will expand the attack surface, offering new opportunities for malicious actors to take advantage of security gaps.Plus, as with any new technology, there is a great deal of potential for misconfigurations, errors, and unpatched vulnerabilities while companies are still learning how to deploy and secure 5G at scale.About 75% of communication service providers worldwide said that they had experienced up to six security breaches of 5G networks within the past year, according to a November 2022 survey by GlobalData and Nokia. Half of the respondents said that they experienced an attack that resulted in the leakage of customer data, and nearly three quarters said that an attack had caused a service outage.To read this article in full, please click here

Recapping Developer Week

Recapping Developer Week
Recapping Developer Week

Developer Week 2023 is officially a wrap. Last week, we shipped 34 posts highlighting what has been going on with our developer platform and where we’re headed in the future – including new products & features, in-depth tutorials to help you get started, and customer stories to inspire you.

We’ve loved already hearing feedback from you all about what we’ve shipped: