Day Two Cloud 111: Infrastructure As Software With Kris Nóva

Kris Nóva, Senior Principal Software Engineer at Twilio, claims that managing infrastructure using tools like Terraform isn't that far away from just writing your own code to do the job yourself. Kris joins co-hosts Ned Bellavance and Ethan Banks to challenge the notion that ops folks can't become developers. Kris says they can.

The post Day Two Cloud 111: Infrastructure As Software With Kris Nóva appeared first on Packet Pushers.

Marvell buys Innovium for cloud data-center expertise

Network-acceleration processors are becoming as popular as CPUs, and the latest big buy is Marvell Technology acquiring Innovium, a provider of networking solutions for cloud and edge data centers.Marvell already has an extensive portfolio of Ethernet-switching processors, and it recently acquired Inphi, a developer of dedicated high radix, performance-optimized switch silicon to help move vast amounts of data around data centers. Now comes the Innovium purchase.Innovium’s Teralynx switching architecture is said to deliver ultra-low latency, high performance, power-optimized telemetry--critical in cloud-scale data centers. The Teralynx family of switches range from 1T/s to 25.6T/s of programmable switches with support for 10G to 800G while offering lower latency and the largest on-chip buffers, resulting in the best application performance.To read this article in full, please click here

How To Become A Mentor In Your Career Field

Becoming a mentor doesn’t just help others. It enables you to enhance your professional development too. That is because it is a mutually beneficial partnership that helps both parties involved, i.e., the mentor and mentee. 

If you are looking to become a mentor, you are in the right place. Here are the top tips that will help you in how to become a mentor in your career field. 

1. Find A Mentee 

You can use your organization or professional network to find a mentee. However, many of the best mentoring relationships develop organically without you having to try. If you feel there is a junior in your organization that you offer advice to, you can always become their mentee. 

Mentoring programs inside the organization are an excellent way to engage the staff, retain employees, and pass expertise. So, if you have such a program in your organization, you will find a mentee in no time. 

2. Set Expectations 

Once you have found a mentee in your organization, it is time to set expectations. That is because establishing guidelines help maintain a good working relationship. Your mentee will know what you expect and vice versa. Continue reading

5 things you need to know about pay-per-use hardware

Pay-per-use hardware models such as HPE GreenLake and Dell Apex are designed to deliver cloud-like pricing structures and flexible capacity to on-premises data centers. And interest is growing as enterprises look for alternatives to buying equipment outright for workloads that aren’t a fit for public-cloud environments.The concept of pay-per-use hardware has been around for more than a decade, but the buzz around it is growing, said Daniel Bowers, a former senior research director at Gartner. “There’s been a resurgence of interest in this for about four years, driven a lot by HPE and its GreenLake program.”To read this article in full, please click here

5 things you need to know about pay-per-use hardware

Pay-per-use hardware models such as HPE GreenLake and Dell Apex are designed to deliver cloud-like pricing structures and flexible capacity to on-premises data centers. And interest is growing as enterprises look for alternatives to buying equipment outright for workloads that aren’t a fit for public-cloud environments.The concept of pay-per-use hardware has been around for more than a decade, but the buzz around it is growing, said Daniel Bowers, a former senior research director at Gartner. “There’s been a resurgence of interest in this for about four years, driven a lot by HPE and its GreenLake program.”To read this article in full, please click here

5 things you nee to know about pay-per-use hardware

Pay-per-use hardware models such as HPE GreenLake and Dell Apex are designed to deliver cloud-like pricing structures and flexible capacity to on-premises data centers. And interest is growing as enterprises look for alternatives to buying equipment outright for workloads that aren’t a fit for public-cloud environments.The concept of pay-per-use hardware has been around for more than a decade, but the buzz around it is growing, said Daniel Bowers, a former senior research director at Gartner. “There’s been a resurgence of interest in this for about four years, driven a lot by HPE and its GreenLake program.”To read this article in full, please click here

5 things you nee to know about pay-per-use hardware

Pay-per-use hardware models such as HPE GreenLake and Dell Apex are designed to deliver cloud-like pricing structures and flexible capacity to on-premises data centers. And interest is growing as enterprises look for alternatives to buying equipment outright for workloads that aren’t a fit for public-cloud environments.The concept of pay-per-use hardware has been around for more than a decade, but the buzz around it is growing, said Daniel Bowers, a former senior research director at Gartner. “There’s been a resurgence of interest in this for about four years, driven a lot by HPE and its GreenLake program.”To read this article in full, please click here

5 things to know about pay-per-use hardware

Pay-per-use hardware models such as HPE GreenLake and Dell Apex are designed to deliver cloud-like pricing structures and flexible capacity to on-premises data centers. And interest is growing as enterprises look for alternatives to buying equipment outright for workloads that aren’t a fit for public-cloud environments.The concept of pay-per-use hardware has been around for more than a decade, but the buzz around it is growing, said Daniel Bowers, a former senior research director at Gartner. “There’s been a resurgence of interest in this for about four years, driven a lot by HPE and its GreenLake program.”To read this article in full, please click here

5 things to know about pay-per-use hardware

Pay-per-use hardware models such as HPE GreenLake and Dell Apex are designed to deliver cloud-like pricing structures and flexible capacity to on-premises data centers. And interest is growing as enterprises look for alternatives to buying equipment outright for workloads that aren’t a fit for public-cloud environments.The concept of pay-per-use hardware has been around for more than a decade, but the buzz around it is growing, said Daniel Bowers, a former senior research director at Gartner. “There’s been a resurgence of interest in this for about four years, driven a lot by HPE and its GreenLake program.”To read this article in full, please click here

Register for the 5th Annual Indigenous Connectivity Summit

Panorama view from above on Ulukhaktok, Northwest Territories, Canada

In its second year as a virtual event, the Indigenous Connectivity Summit will take place on 12-15 October 2021. The COVID-19 pandemic showed us that those who lack connectivity face the effects of starker inequalities. Millions of people across Canada and the United States still can’t take advantage of the benefits of a fast, affordable, […]

The post Register for the 5th Annual Indigenous Connectivity Summit appeared first on Internet Society.

Full Stack Journey 057: Open Policy Agent

What is Open Policy Agent (OPA)? And what can someone do with it? These are some of the questions that episode 57 of the Full Stack Journey podcast tackles. In this episode, Scott is joined by Diego Comas (@diegocomas on Twitter), a user/consumer of OPA, to discuss his direct experience in using OPA in real production environments.

Full Stack Journey 057: Open Policy Agent

What is Open Policy Agent (OPA)? And what can someone do with it? These are some of the questions that episode 57 of the Full Stack Journey podcast tackles. In this episode, Scott is joined by Diego Comas (@diegocomas on Twitter), a user/consumer of OPA, to discuss his direct experience in using OPA in real production environments.

The post Full Stack Journey 057: Open Policy Agent appeared first on Packet Pushers.

6 New Ways to Validate Device Posture

6 New Ways to Validate Device Posture
6 New Ways to Validate Device Posture

Cloudflare for Teams gives your organization the ability to build rules that determine who can reach specified resources. When we first launched, those rules primarily relied on identity. This helped our customers replace their private networks with a model that evaluated every request for who was connecting, but this lacked consideration for how they were connecting.

In March, we began to change that. We announced new integrations that give you the ability to create rules that consider the device as well. Starting today, we’re excited to share that you can now build additional rules that consider several different factors about the device, like its OS, patch status, and domain join or disk encryption status. This has become increasingly important over the last year as more and more people began connecting from home. Powered by the Cloudflare WARP agent, your team now has control over more health factors about the devices that connect to your applications.

Zero Trust is more than just identity

With Cloudflare for Teams, administrators can replace their Virtual Private Networks (VPNs), where users on the network were trusted, with an alternative that does not trust any connection by default—also known as a Zero Trust model.

Customers Continue reading

Musing: Does 802.1x Matter Anymore ?

802.1X has little relevance over time.  As distributed work becomes widespread, laptops and smartphones will not connect to campus or branch networks operated by IT departments. Home broadband, cafes, kids schools, 4G/5g etc. Each user device will have some software mechanism/agent/method to access resources in SaaS, on/off prem DC/cloud and on son There is a market […]

Are you ready for the 3G sunset?

All good things must come to an end, and that includes the 3G network that has been around since the late aughts. Telcos are supporting and building out vastly superior 5G networks, and they don’t want to spend time and money maintaining older technologies that aren’t used much.Removing older 3G towers makes space for 5G equipment and simplifies network management. Plus, some 3G spectrum can be used for 4G data, although 3G can’t be used for 5G, and 4G still has some years left.How to deploy 802.1x for Wi-Fi using WPA3 enterprise Verizon is cutting off 3G on Dec. 31, 2022; AT&T is turning off its 3G network in February 2022; and T-Mobile has multiple dates in 2022 for the various networks it manages since it is a mix of T-Mobile and Sprint legacy networks as a result of their merger.To read this article in full, please click here

How password hashing works on Linux

You may know that passwords are hashed on Linux systems, and the hashes are stored in the restricted access /etc/shadow file. But did you know that you can also determine the hash method that was used and report the number of days since a password was last changed from this file as well?To look at a user record in the /etc/shadow file, run a command like this:$ sudo grep nemo /etc/shadow You should see a line that looks something like this:nemo:$6$FVYIIgcEcObSsUcf$FsSBlV9soVt.Owbd4xnvhlZzjx73ZBQQBT0WMyah6qcdnH91tBf9C4EaYbRtr7jKGETP/TwBNjyrDFqhvK0NV1:18698:7:90:7::: Viewing and configuring password aging on Linux   In spite of how long that line is, it's quite easy to parse. The first two fields in the lines of this colon-separated file store:To read this article in full, please click here