Try saying that five times fast.
There’s a concept called idempotency which can be loosely explained as
Make sure it’s like this. If it’s not like this, make it like this. If it’s already like this. Don’t do anything
Essentially, it’s a way to declare the desired configuration state of whatever it is you’re trying to configure. If the configuration state of that server, or switch or router is already in that state, than just leave it alone.
It’s a way to ensure that configuration drift doesn’t happen.
So if there’s some rabbid network administrator with a console cable running around laughing maniacly as they randomly changes things… this will help you keep them in check.

So we’re going to look at the last example here where we did the following:
You know the drill here, Continue reading

The post Worth Reading: The myth of in-memory computing appeared first on 'net work.
Address east-west security by adopting and operationalizing micro-segmentation.
The story is evolving as NFV reaches real-world deployment.
Define Footgun
The post Network Dictionary: Footgun appeared first on EtherealMind.
The Internet of Things is falling short of the hype. We need to focus on truly valuable IoT opportunities.
IT leaders need a well-planned strategy for successful hybrid cloud adoption.
On today's podcast we learn about Riverbed's open source efforts, including its corporate sponsorship of packet analyzer Wireshark, its open APIs that automate performance analysis processes enabled by Wireshark and other solutions, and how security teams can use Wireshark.
The post Show 277: Riverbed’s Role In Wireshark, Security & More (Sponsored)Drew Conry-Murray appeared first on Packet Pushers.
On today's podcast we learn about Riverbed's open source efforts, including its corporate sponsorship of packet analyzer Wireshark, its open APIs that automate performance analysis processes enabled by Wireshark and other solutions, and how security teams can use Wireshark.
The post Show 277: Riverbed’s Role In Wireshark, Security & More (Sponsored) appeared first on Packet Pushers.
Imagine you get a routing outage in your network resulting in three minutes of traffic blackholing. After a few tense minutes it goes away and life is good, but you desperately want to know what went wrong. Can you figure it out? Well, you could if you were using PacketDesign tools, as Cengiz Alaettinoglu explained on Episode 51 of Software Gone Wild.