Worth Reading: The venerable, vulnerable firewall
The post Worth Reading: The venerable, vulnerable firewall appeared first on 'net work.
The post Worth Reading: The venerable, vulnerable firewall appeared first on 'net work.

In July, we released Ansible Tower 3. In this blog series, we will take a deeper dive into Tower changes that were all designed to make our product simpler and easier to scale Ansible automation across your environments. In our last post, our Senior Software Engineer Chris Meyers highlights what's new in the Tower 3 installer.
If you’d like to learn more about the release, our Director of Product Bill Nottingham for wrote a complete overview of the Ansible Tower 3 updates.
The most common feedback we have received from existing Tower users concerns usability and the need to improve it. The Ansible Tower UI team was tasked to address this, along with new workflows and features, during the development of Tower 3. This was no small task as the team had to change every single page served to the user.
Tower 2.4.5 and earlier versions offered many ways of doing the same thing, often resulting in inconsistent flows and context switching. The team wanted the new interface to reflect how simple Ansible is. So the goal became offering a common flow for interacting with objects in the app and providing more context where possible.
Palo Alto Networks joins the carrier's VNF options.
The company spent $3 billion to expand its cloud services to Europe.
Huawei's SDN controller, biggest layoffs, AWS-Killing bare metal cloud, and more.
The last post in this series on I2RS argues that this interface is designed to augment, rather than replace, the normal, distributed routing protocol. What sort of use case could we construct that would use I2RS in this way? What about elephant flows in data center fabrics? An earlier post considers how to solve the elephant flow using segment routing (SR); can elephant flows also be guided using I2RS? The network below will be used to consider this question.
Assume that A hashes a long lived elephant flow representing some 50% of the total bandwidth available on any single link in the fabric towards F. At the same time, A will hash other flows, represented by the red flow lines, onto each of the three links towards the core of the fabric in pretty much equal proportion. Smaller flows that are hashed onto the A->F link will likely suffer, while flows hashed onto the other two links will not.
This is a particularly bad problem in applications that have been decomposed into microservices, as the various components of the application tend to rely on fairly fixed delay and jitter budgets over the network to keep everything synchronized and running quickly. Continue reading
From webinars to workshops, meetups to conference talks, check out our list of events that are coming up in October!
Oct 13: Docker for Windows Server 2016 by Michael Friis
Oct 18: Docker Datacenter Demo by Moni Sallama and Chris Hines.
View the full schedule of instructor led training courses here!
Introduction to Docker: This is a two-day, on-site or classroom-based training course which introduces you to the Docker platform and takes you through installing, integrating, and running it in your working environment.
Oct 11-12: Introduction to Docker with Xebia – Paris, France
Oct 19-20: Introduction to Docker with Contino – London, United Kingdom
Oct 24-25: Introduction to Docker with AKRA – Krakow, Germany
Docker Administration and Operations: The Docker Administration and Operations course consists of both the Introduction to Docker course, followed by the Advanced Docker Topics course, held over four consecutive days.
Oct 3-6: Docker Administration and Operations with Azca – Madrid, Spain
Oct 11-15: Docker Administration and Operations with TREEPTIK – Paris, France
Oct 18-21: Docker Administration and Operations with Vizuri – Raleigh, NC
Oct 18-22: Docker Administration and Operations with TREEPTIK – Aix en Provence, France
Oct 24-27: Continue reading