Nexenta and Redapt are helping Rancher flesh out Linux-container infrastructure.
I noticed on Facebook during this horrible tragedy in Paris that there was some worry because not everyone had checked in using Safety Check. So I thought people might want to know a little more about how Safety Check works.
If a friend or family member hasn't checked-in yet it doesn't mean anything bad has happened to them. Please keep that in mind. Safety Check is a good system, but not a perfect system, so keep your hopes up.
This is a really short version, there's a longer article if you are interested.
How it works:
If you are in an area impacted by a disaster Facebook will send you a push notification asking if you are OK.
Tapping the “I’m Safe” button marks that your are safe.
All your friends are notified that you are safe.
Friends can also see a list of all the people impacted by the disaster and how they are doing.
How do you build the pool of people impacted by a disaster in a certain area? Building a geoindex is the obvious solution, but it has weaknesses.
People are constantly moving so the index will be stale.
A geoindex of 1.5 billion Continue reading
For anyone interested in running a testbed with Kubernetes and OpenContrail on AWS i managed to boil down the install steps to the minimum:
The setup script will:
Please let me know if you run into any glitch… the “setup.sh” script can be rerun multiple times (the ansible provisioning is designed to be idempotent).
Next, I need to wrap this up with a Jenkins CI pipeline. And build permutations for:
The fun never stops !
Azure is letting users kick the tires on virtual machine scale sets while A10 debuts a new security offering.
In this post I’m going to share with you an OS X graphical application I found that makes it easier to work with RESTful APIs. The topic of RESTful APIs has come up here before (see this post on using cURL to interact with RESTful APIs), and RESTful APIs have been a key part of a number of other posts (like my recent post on using jq
to work with JSON). Unlike these previous posts—which were kind of geeky and focused on the command line—this time around I’m going to show you an application called Paw, which provides a graphic interface for working with APIs.
Before I start talking about Paw, allow me to first explain why I’m talking about working with APIs using this application. I firmly believe that the future of “infrastructure engineers”—that is, folks who today are focused on managing servers, hypervisors, VM, storage, networks, and firewalls—lies in becoming the “full-stack engineer,” someone who has knowledge and skills across multiple areas, including automation/orchestration. In order to gain those skills in automation/orchestration, it’s pretty likely that you’re going to end up having to work with APIs. Hence, why I’m talking about this stuff, and why Continue reading
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Companies are securing more users who are accessing more applications from more places through more devices than ever before, and all this diversity is stretching the current landscape of identity and access management (IAM) into places it was never designed to reach. At the same time, security has never been more paramount—or difficult to ensure, given today’s outdated and overly complex legacy identity systems. I call this the “n-squared problem,” where we’re trying to make too many hard-coded connections to too many sources, each with its own protocols and requirements.
To read this article in full or to leave a comment, please click here
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Virtualization is a mature technology but if you don’t have a virtualization wizard on staff managing the environment can be a challenge. Benefits such as flexibility, scalability and cost savings can quickly give way to security risks, resource waste and infrastructure performance degradation, so it is as important to understand common virtual environment problems and how to solve them.
The issues tend to fall into three main areas: virtual machine (VM) sprawl, capacity planning and change management. Here’s a deeper look at the problems and what you can do to address them:
To read this article in full or to leave a comment, please click here
Wright's vision for NFV, and the key role of open source from his perspective.
Code writing is hard, but defining the scope of the project may be even harder.
Whether they are cloud or premise based, not all vCPE elements are identical. Learn more during the December 9th webinar with Brocade.
Last night, Plexxi received the Product of the Year Award from the New Hampshire High Tech Council. More than 200 people, including New Hampshire Governor Maggie Hassan, were on hand as we received the award for our Switch 2 solution. We’re proud to be recognized by an organization that values the advancement of innovation throughout the state of New Hampshire. Plexxi is committed to growing the local tech economy by producing dynamic solutions and hiring the best talent the state has to offer. Congratulations to all of the finalists and companies that are dedicated to shaping an ecosystem for technology companies to grow and succeed in New Hampshire.
Pictured Left to Right: Peter Antoinette, co-founder, president and CEO of Nanocomp Technologies, and prior Product of the Year Award winner; Paul Mailhot, VP of Business Operations at Dyn and chairman of the Council’s board of directors; Michael Welts, VP of Marketing at Plexxi; Toral Cowieson, Senior Director of Internet Leadership at the Internet Society and the Council’s vice chair; and Matt Cookson, president of Cookson Strategies and the Council’s Executive Director.
Our CEO Rich Napolitano penned a byline this week in ITProPortal that chronicles the past three “eras” of IT, and Continue reading
Executing a winning strategy.