Oracle is not the first name in cloud computing, but never let it be said Larry and company don’t try. It is making a big push with its Oracle Cloud Infrastructure (OCI) by offering Arm processor instances and new initiatives with the open-source community.The new instances are powered by Altra, Ampere’s 64-bit Arm processor, and are priced at 1 cent per core hour, which Oracle claims is the lowest price/performance available when compared to any x86 instance on a per-core basis.To read this article in full, please click here
African economies are making bold moves to speed up digitalization and transformation. We want women to play a key part in that. In a new partnership agreement, we are committing to closing the digital gender gap and helping women embrace technology to drive change. Africa’s growing Internet economy has the potential to contribute nearly $180 […]
Here’s a typical scenario they mentioned: a bunch of servers, randomly connected to multiple leaf switches, is offering a service on the same IP address (that’s where anycast comes from).
Here’s a typical scenario they mentioned: a bunch of servers, randomly connected to multiple leaf switches, is offering a service on the same IP address (that’s where anycast comes from).
A trip down memory lane on how things have changed in labbing from using prehistoric switches bought on eBay through emulators that took longer to configure than the labs to the present day solutions that can programmatically build a multi-vendor lab in minutes. Kids today don’t know they are born…..
The perfect service mesh implementation wouldn’t use a general-purpose proxy, but would instead use a service mesh specific proxy—one that does no more than the mesh needs and that is written in a performant language with strong security guarantees like Rust.
The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.In issuing its CIS Controls V8 this month, the organization sought to present practical and specific actions businesses can take to protect their networks and data. These range from making an inventory of enterprise assets to account management to auditing logs.In part the new version was needed to address changes to how businesses operate since V7 was issued three years ago, and those changes guided the work. “Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics have been central in every discussion,” the new controls document says.To read this article in full, please click here
The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.In issuing its CIS Controls V8 this month, the organization sought to present practical and specific actions businesses can take to protect their networks and data. These range from making an inventory of enterprise assets to account management to auditing logs.In part the new version was needed to address changes to how businesses operate since V7 was issued three years ago, and those changes guided the work. “Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics have been central in every discussion,” the new controls document says.To read this article in full, please click here
JT Olio
JT is the CTO at Storj. He oversees product development and led the re-architecture of Storj’s distributed cloud storage platform. He was previously Director of Engineering at Space Monkey, which was acquired by Vivint in 2014. JT has an MS in Computer Science from the University of Utah and a BS in Computer Science and Mathematics from the University of Minnesota.
Our team at Storj is building a decentralized cloud object storage and when we decided to build it using Go, we thought we’d also utilize
It’s easy to assume automation can solve anything and that it’s cheap to deploy—that there are a lot of upsides to automation, and no downsides. In this episode of the Hedge, Terry Slattery joins Tom Ammon and Russ White to discuss something we don’t often talk about, the Return on Investment (ROI) of automation.
Of the four new Internet traffic exchange points in Latin America, the most advanced is IXP.GT in Guatemala. It started in November 2019 with three participants. A little over a year later it already had 10. Most are Internet service providers (ISPs), plus the university network. “The IXP is the best thing that happened to […]
With DockerCon just a day away, let’s not forget to give a big THANK YOU to all our sponsors.
As our ecosystem partners, they play a central role in our strategy to deliver the best developer experience from local desktop to cloud, and/or to offer best-in-class solutions to help you build apps faster, easier and more securely. Translation: We couldn’t do what we do without them.
So be sure to visit their virtual rooms and special sessions at DockerCon this Thursday, May 27. With more than 20 Platinum, Gold or Silver sponsors this year, you’ll have plenty to choose from.
For example, check out AWS’s virtual room and the session with AWS Principal Technologist Massimo Re Ferrè at 3:15 p.m.-3:45 p.m. PDT.
We're a good ten years into public cloud as an industry, and cloud operations don't seem to be getting any simpler. Why is that? Is it a problem? If so, can clouds become simpler? Guest Brian Gracely stops by the Day Two Cloud podcast to wrestle with these questions.
We're a good ten years into public cloud as an industry, and cloud operations don't seem to be getting any simpler. Why is that? Is it a problem? If so, can clouds become simpler? Guest Brian Gracely stops by the Day Two Cloud podcast to wrestle with these questions.
Durable Objects are an awesome addition to the Workers developer ecosystem, allowing you to address and work inside a specific Worker to provide consistency in your applications. That sounds exciting at a high-level, but if you're like me, you might be wondering "Okay, so what can I build with that?"
There’s nothing like building something real with a technology to truly understand it.
To better understand why Durable Objects matter, and how newer announcements in the Workers ecosystem like WebSockets play with Durable Objects, I turned to a category of software that I've been building in my spare time for a few months now: video games.
The technical aspects of games have changed drastically in the last decade. Many games are online-by-default, and the ubiquity of tools like Unity have made it so anyone can begin experimenting with developing games.
I've heard a lot about the ability of Durable Objects and WebSockets to provide real-time consistency in applications, and to test that use case out, I've built Durable World: a simple 3D multiplayer world that is deployed entirely on our Cloudflare stack: Pages for serving the client-side game, which runs in Unity and WebGL, and Workers as the Continue reading
A cursory look at an IP routing table (or at CCNA-level materials) tells you that the IP routing table contains prefixes and next hops, and that the next hops are IP addresses. How should that work over unnumbered interfaces, and what should we use for the next-hop IP address in that case?
A cursory look at an IP routing table (or at CCNA-level materials) tells you that the IP routing table contains prefixes and next hops, and that the next hops are IP addresses. How should that work over unnumbered interfaces, and what should we use for the next-hop IP address in that case?
“..the best way to guard against error is to design systems with layered and overlapping defenses…like slices of Swiss cheese being layered on top of one another until there were no holes you could see through” - from The Premonition, Michael Lewis Network changes, such as adding a rack, adding...
Juniper Networks is releasing the latest version of its Apstra intent-based networking software that includes new monitoring features and configuration templates as well as better integration with VMware’s NSX virtualization and security platform.In January, Juniper bought Apstra and its Apstra Operating System (AOS), which was developed from the start to support IBN features. Once deployed, AOS—now just called Apstra—keeps a real-time repository of configuration, telemetry and validation information to ensure the network is doing what customers want it to do. Apstra also includes automation features to provide consistent network and security policies for workloads across physical and virtual infrastructures.To read this article in full, please click here
Juniper Networks is releasing the latest version of its Apstra intent-based networking software that includes new monitoring features and configuration templates as well as better integration with VMware’s NSX virtualization and security platform.In January, Juniper bought Apstra and its Apstra Operating System (AOS), which was developed from the start to support IBN features. Once deployed, AOS—now just called Apstra—keeps a real-time repository of configuration, telemetry and validation information to ensure the network is doing what customers want it to do. Apstra also includes automation features to provide consistent network and security policies for workloads across physical and virtual infrastructures.To read this article in full, please click here