The post Worth Reading: Micromanaging Compute appeared first on 'net work.
Open Networking Foundation has this nice and crisp definition of SDN:
[SDN is] The physical separation of the network control plane from the forwarding plane, and where a control plane controls several devices.
Using this definition it was easy to figure out whether certain architecture complies with ONF definition of SDN. It was also easy to point out why it was ridiculous.
Read more ...Startup Rubrik tackles VM backups with an integrated appliance that offers premises and cloud-based storage, and offers deuplication and replication. It can back up to Amazon S3 or OpenStack private clouds.
The post Startup Radar: Rubrik Rethinks VM Backups appeared first on Packet Pushers.
To understand risk exposure, security pros gather and digest intelligence feeds about vulnerabilities, indications of compromise (IOCs) and other machine-readable data all the time. But real-time insight into what adversaries are seeing in underground forums, the dark web, social media and other sharing sites is hard to come by. Yet it is precisely this attacker’s eye view you need to gain a clear picture of your risk profile, to prioritize which threats are likely – even imminent – versus others.
With 411 breaches so far this year exposing 17,678,050 records, according to the Identity Theft Resource Center report, there is a growing need to use this insight to better inform and tune defenses. However, it takes more than downloading the TOR browser bundle or devising a good underground cover identity to access these sources and gather actionable intelligence. What can you do to avoid wasting time, keep your employers out of trouble with the law and make a difference in anticipating risk? It starts with understanding the intelligence gap that exists between you and your adversaries.
To read this article in full or to leave a comment, please click here
Welcome to Technology Short Take #53. In this post, I’ve gathered links to posts about networking, virtualization, Docker, containers, Linux, configuration management, and all kinds of other cool stuff. Here’s hoping you find something useful!
pyeapi
on the switches directly, so the Ansible configuration remains clean (instead of having to use a local connection for the switches but SSH for everything else). Of course, I’m sure there are trade-offs each way.