Microsoft’s SONiC May Spell Disaster for Switch Makers, or Not
Analysts disagree on whether Arista should be worried.
Analysts disagree on whether Arista should be worried.
The post Worth Reading: SSL, TLS, and difficult privacy appeared first on 'net work.
Companies have struggled for years on how to allow third parties access to specific systems that they manage or support? These systems and access requirements range from HVAC and phones systems to full IT outsourcing or development.
The problem has always been twofold; one, how to provide secure access into the datacenter, and two, how do you secure the third party access to only the systems they require access to. Basically, how do you limit the hop to hop once they are inside your datacenter.
In the paper, I show you how leveraging VMware’s NSX and VMware Horizon products, you now have two different deployment modules that will allow you to control third party access and restrict that user’s inter-datacenter hopping abilities.
Here you will find the full paper: https://communities.vmware.com/docs/DOC-31415
Hadar
The post Securing Access to and from your Jump Box and VDI with VMware NSX appeared first on The Network Virtualization Blog.
Can’t figure out how to pay for that IT training? Here are six steps for getting your company to foot the bill.
I have been talking about the value of well designed interfaces in network monitoring tools for a few years because the current generation is badly designed. I'm wasting a lot of time getting through the pain barrier before the software becomes useful.
The post Repsonse: Design in Tech Report 2016 appeared first on EtherealMind.
I had a sweet problem with ipSpace.net webinars for quite a while: there are way more ideas than available time. However, a few days ago I stumbled upon a great tip on Trello blog and immediately decided to use it.
Result: list of future ipSpace.net webinars as a Trello board.
Read more ...A growing number of vendors offer affordable alternatives for cloud-managed wireless networking.
Sustainability is now a requirement for tech companies. Find out which are as green as the Irish countryside.
mkdir sflow-rtAdd the following contents to Dockerfile:
cd sflow-rt
vi Dockerfile
FROM centos:centos6Build the project:
RUN yum install -y java-1.7.0-openjdk
RUN rpm -i http://www.inmon.com/products/sFlow-RT/sflow-rt-2.0-1072.noarch.rpm
EXPOSE 8008 6343/udp
CMD /etc/init.d/sflow-rt start && tail -f /dev/null
docker build -t sflow-rt .Run the service:
docker run -p 8008:8008 -p 6343:6343/udp -d sflow-rtAccess the API at http://docker_host:8008/ to verify that the service is running.
While talking with customers over the past couple of weeks during a multi-country/multi-continent trip, one phrase that kept coming up is “lock-in”, as in “we’re trying to avoid lock-in” or “this approach doesn’t have any lock-in”. While I’m not a huge fan of memes, this phrase always brings to mind The Princess Bride, Vizzini’s use of the word “inconceivable,” and Inigo Montoya’s famous response. C’mon, you know you want to say it: “You keep using that word. I do not think it means what you think it means.” I feel the same way about lock-in, and here’s why.
Lock-in, as I understand how it’s viewed, is an inability to migrate from your current solution to some other solution. For example, you might feel “locked in” to Microsoft (via Office or Windows) or “locked in” to Oracle (via their database platform or applications), or even “locked in” to VMware through vCenter and vSphere. Although these solutions/platforms/products might be the right fit for your particular problem/need, the fact that you can’t migrate is a problem. Here you are, running a product or solution or platform that is the right fit for your needs, but because you may not be able Continue reading
I’m happy to be given the opportunity to speak once more at Interop Vegas in 2016. No workshop for me this year, but I will be putting on three individual talks, all focusing on topics that have been very near and dear to me over the past year.
Last year I was very focused on putting the theory behind network automation into practical terms, and making it “real”. Over the past year I’ve seen rapid growth in adoption of these ideas, and I was happy to be just one very small part of helping to make that happen.
Since the last Interop, my career has steered me towards a more direct approach to network automation, specifically through software development. So I’d like to spend some time providing an overview of my sessions at the upcoming Interop Vegas 2016, which are all inspired by the last year of my career.
http://info.interop.com/lasvegas/scheduler/session/the-network-revolution-is-a-lie
I am running the other two talks as an independent - just happy to participate
In case you are planning on attending Interop in Las Vegas this year, I’d like to let you know about my Continue reading
Citrix announced CloudBridge Enterprise Edition, an appliance family that integrates SD-WAN and WAN optimization into a single device with one management interface.
The post Citrix Combines SD-WAN, WAN Optimization In Single Appliance appeared first on Packet Pushers.
Citrix announced CloudBridge Enterprise Edition, an appliance family that integrates SD-WAN and WAN optimization into a single device with one management interface.
The post Citrix Combines SD-WAN, WAN Optimization In Single Appliance appeared first on Packet Pushers.