Come join Brocade for their DemoFriday on October 16th at 10:00am PT to discover a new and easy way to manage application growth that can significantly reduce your current cost structures.
Cisco ACI offers an elegant new approach to microsegmentation that makes it a powerful tool for security or network administrators.
Co-founder Umesh Mahajan takes the CSO role as the L4-7 startup braces for growth.
Join major industry thought leaders for an exciting conversation surrounding some of the hottest topics in SDN.
Reportedly Uber has grown an astonishing 38 times bigger in just four years. Now, for what I think is the first time, Matt Ranney, Chief Systems Architect at Uber, in a very interesting and detailed talk--Scaling Uber's Real-time Market Platform---tells us a lot about how Uber’s software works.
If you are interested in Surge pricing, that’s not covered in the talk. We do learn about Uber’s dispatch system, how they implement geospatial indexing, how they scale their system, how they implement high availability, and how they handle failure, including the surprising way they handle datacenter failures using driver phones as an external distributed storage system for recovery.
The overall impression of the talk is one of very rapid growth. Many of the architectural choices they’ve made are a consequence of growing so fast and trying to empower recently assembled teams to move as quickly as possible. A lot of technology has been used on the backend because their major goal has been for teams to get the engineering velocity as high as possible.
After a understandably chaotic (and very successful) start it seems Uber has learned a lot about their business and what they really need to Continue reading
Network Break 53 bites into Apple's latest announcements, wonders at Intel abandoning a science competition, ponders FireEye's reaction to vulnerability research, and opines on OpenFlow's rise in the network.
The post Network Break 53: Apple At Work, OpenFlow Rising appeared first on Packet Pushers.
Learn why CSPs should architect NFV implementation to maximize agility and profit while minimizing cost and risk.
Applications are a vital component of your business…but are your applications and data safe? Have you considered implementing a Zero Trust model at your organization to protect your vital resources? Join this hour-long webcast on Tuesday, September 29, 2015 at 11:00 AM PST / 2:00 PM EST to find out how to leverage micro-segmentation to build a true Zero Trust data center network.
Join our guest speaker, John Kindervag, VP and Principal Analyst at Forrester Research, as he discusses the results of the August 2015 commissioned research study, “Leverage Micro-segmentation To Build A Zero Trust Network”, conducted on behalf of VMware. Kindervag will cover Forrester’s three key findings from the study:
Protecting your data doesn’t have to be difficult! Reserve your spot for this webcast today.
And to learn more about how other leading organizations are using micro-segmentation to build a Zero Trust Model, watch the video below from David Giambruno, CIO of Continue reading
I was teaching a class last week and mentioned something about privacy to the students. One of them shot back, “you’re paranoid.” And again, at a meeting with some folks about missionaries, and how best to protect them when trouble comes to their door, I was again declared paranoid. In fact, I’ve been told I’m paranoid after presentations by complete strangers who were sitting in the audience.
Okay, so I’m paranoid. I admit it.
But what is there to be paranoid about? We’ve supposedly gotten to the point where no-one cares about privacy, where encryption is pointless because everyone can see everything anyway, and all the rest. Everyone except me, that is—I’ve not “gotten over it,” nor do I think I ever will. In fact, I don’t think any engineer should “get over it,” in terms of privacy and security. Even if you think it’s not a big deal in your own life, engineers should learn to treat other people’s information with the utmost care.
In moving from the person to the digital representation of the person, we often forget it’s someone’s life we’re actually playing with. I think it’s time for engineers to take security—and privacy—personally. It’s time Continue reading
The post Worth Reading: Open Source Medicine appeared first on 'net work.
This post will introduce a new type of DMVPN – FlexVPN, unofficially called “DMVPN phase 4″ . We will go through the basic building blocks of Cisco FlexVPN DMVPN and some of the design best practices for a typical enterprise WAN network. FlexVPN Introduction FlexVPN is a configuration framework (a collection of CLI/API commands) aimed to […]
The post Cisco FlexVPN DMVPN, Part 1 – Overview and Design appeared first on Packet Pushers.