Hedge 178: Defined Trust Transport with Kathleen Nichols

The Internet of Things is still “out there”—operators and individuals are deploying millions of Internet connected devices every year. IoT, however, poses some serious security challenges. Devices can be taken over as botnets for DDoS attacks, attackers can take over appliances, etc. While previous security attempts have all focused on increasing password security and keeping things updated, Kathleen Nichols is working on a new solution—defined trust transport in limited domains.

Join us on for this episode of the Hedge with Kathleen to talk about the problems of trusted transport, the work she’s putting in to finding solutions, and potential use cases beyond IoT.

download

You can find Kathleen at Pollere, LLC, and her slides on DeftT here.

Video: Kubernetes Container Networking Interface (CNI)

Ready for more Kubernetes details? How about Container Networking Interface (CNI) described by Stuart Charlton as part of Kubernetes Networking Deep Dive webinar?

Notes:

Video: Sample Kubernetes SDN Implementations

Read for more Kubernetes details? How about Container Networking Interface (CNI) described by Stuart Charlton as part of Kubernetes Networking Deep Dive webinar?

Notes:

Taking advantage of the grep command’s many options

The grep command makes it easy to find strings in text files on Linux systems, but that's just a start. It can be used to search through these files for multiple strings or regular expressions at the same time. It can also ignore case when needed, and it can count the lines in the resulting output for you. This post shows how to use grep in all these ways.Basic grep The simplest grep command looks like the one shown below. This "find string in file" command will show all the lines in the file that contain the string, even when that string is only part of a longer one.$ grep word story The wording suggests there was more to the story than anyone wanted to admit. The sword had been left behind the shed. It was several days before it was Finding multiple strings There are a number of ways to search for a group of strings in a single command. In the command below, the '|' character serves as an "or" function. The command will display any lines in the file that contain the word "xray", the word "tape" or both.To read this article in full, Continue reading

Taking advantage of the grep command’s many options

The grep command makes it easy to find strings in text files on Linux systems, but that's just a start. It can be used to search through these files for multiple strings or regular expressions at the same time. It can also ignore case when needed, and it can count the lines in the resulting output for you. This post shows how to use grep in all these ways.Basic grep The simplest grep command looks like the one shown below. This "find string in file" command will show all the lines in the file that contain the string, even when that string is only part of a longer one.$ grep word story The wording suggests there was more to the story than anyone wanted to admit. The sword had been left behind the shed. It was several days before it was Finding multiple strings There are a number of ways to search for a group of strings in a single command. In the command below, the '|' character serves as an "or" function. The command will display any lines in the file that contain the word "xray", the word "tape" or both.To read this article in full, Continue reading

Multivendor 5G network slicing test claims 70% gain in deployment speeds

A group of about a dozen vendors announced this week that a test program for 5G network slicing had achieved 70% gains in the time required to programmatically create a network slice, marking a major step forward in the development of private 5G for enterprise users.A network “slice,” as it’s called, is essentially a logically distinct subnetwork in a 5G deployment that can be used for a variety of purposes to maximize bandwidth use and provide on-demand 5G services to users. The basic idea is that automation in the 5G core can apply a layer of virtualization to wireless networks, letting a service provider “slice” off parts of its available spectrum and provide them to a customer as a discrete network.To read this article in full, please click here

When Push Comes To Shove, Google Invests Heavily In GPU Compute

A year ago, at its Google I/O 2022 event, Google revealed to the world that it had eight pods of TPUv4 accelerators, with a combined 32,768 of its fourth generation, homegrown matrix math accelerators, running in a machine learning hub located in its Mayes County, Oklahoma datacenter.

When Push Comes To Shove, Google Invests Heavily In GPU Compute was written by Timothy Prickett Morgan at The Next Platform.

Tigera named as one of Forbes America’s Best Startup Employers in 2023

We are proud to announce that we have been named one of America’s Best Startup Employers 2023 by Forbes!

The Forbes list of America’s Best Startup Employers 2023 was compiled by evaluating 2,600 companies with at least 50 employees in the United States. All of the companies considered were founded between 2013 and 2020, from the ground up, and were not spin-offs of existing businesses. Just like other Forbes lists, businesses cannot pay to be considered. Evaluation was based on three criteria: employer reputation, employee satisfaction, and growth.

Great Place to Work™ 2022

Inclusion in Forbes’ list comes after we were proudly certified as a Great Place to Work™ in 2022.

The Great Place to Work Certification recognizes employers that create an exceptional employee experience. The certification process involves surveying employees and the employer, and rankings are based on employee feedback and independent analysis. This means job searchers can rely on the certification to help them determine whether an organization is truly a great place to work.

Go Tigers!

Our core values are the foundation of everything we do. Tigera believes in a collaborative, flexible work environment built on mutual respect and commitment. We are delighted to hear that our Continue reading

Kubernetes Unpacked 025: The Kubernetes Developer Experience

Michael Levan and Calvin Hendryx-Parker talk about their experience using Kubernetes, the pros and cons of the orchestration platform, and its impact on infrastructure engineers and developers. Calvin offers great tips on how to make the developer experience better and what platform engineering teams can do to make everyone’s job flow properly.

The post Kubernetes Unpacked 025: The Kubernetes Developer Experience appeared first on Packet Pushers.

Cisco bets on manufacturing in India amid global supply chain crisis

US networking giant Cisco Systems announced a manufacturing plant in India in an attempt to broaden its global supply chain.The factory is expected to be operational in 12 months and will generate $1 billion in total revenue including exports, said Cisco Chairman and Chief Executive Chuck Robbins.“We are announcing strategic investments in Indian manufacturing capabilities as the next step in delivering cutting-edge technologies to our customers in India and across the globe,” Robbins said in a press conference in New Delhi on Wednesday. “India is a focal point of innovation and business for Cisco, and we remain deeply committed to our partnerships here.”To read this article in full, please click here

MLAG Clusters without a Physical Peer Link

With the widespread deployment of Ethernet-over-something technologies, it became possible to build MLAG clusters without a physical peer link, replacing it with a virtual link across the core fabric. Avaya was one of the first vendors to implement virtual peer links with Provider Backbone Bridging (PBB) transport, and some data center switching vendors (example: Cisco) offer similar functionality with VXLAN transport.

MLAG Clusters without a Physical Peer Link

With the widespread deployment of Ethernet-over-something technologies, it became possible to build MLAG clusters without a physical peer link, replacing it with a virtual link across the core fabric. Avaya was one of the first vendors to implement virtual peer links with Provider Backbone Bridging (PBB) transport, and some data center switching vendors (example: Cisco) offer similar functionality with VXLAN transport.

Extreme moves cloud-based network management to the edge

Extreme Networks has unveiled a cloud-based network management package called ExtremeCloud Edge that lets customers administer their growing edge-based resources regardless of their location.The company also expanded its portfolio of Universal switches with new core and aggregation boxes and released a new power-efficient Wi-Fi 6E access point.The ExtremeCloud Edge package unifies the company’s core ExtremeCloud applications, which include the ExtremeCloud IQ wireless and wired network-management offering, CoPilot AI-based management tool, and SD-WAN. With an integrated package, customers can deploy a variety of management and networking features, from analytics and AI support to edge networks, all via a single cloud-based console.To read this article in full, please click here

Dell pushes security, devops integration in storage updates

Dell’s storage product lineup is set to receive a wide range of updates, including  devops integrations with the Ansible and Terraform tools, compliance with the latest US government security standards, zero trust readiness and more.PowerStore, Dell’s flash-based storage array line, is receiving the lion’s share of the security updates, according to a Dell announcement on Wednesday. Dell said that PowerStore now boasts STIG hardening, meaning that it is compliant with the federal government’s stanadards for its own networks. PowerStore also received secure and immutable snapshot technology, which should make for more reliable and harder-to-compromise recoveries. Multifactor authentication, streamlined file resiliency (which adds more mounted snapshots per system) and direct management of file permissions from within PowerStore are also being added.To read this article in full, please click here