In the previous video in this series, I described how path discovery works in source routing and virtual circuit environments. I couldn’t squeeze the discussion of hop-by-hop forwarding into the same video (it would make the video way too long); you’ll find it in the next video in the same section.
Curiefense is a new, open source Web application firewall designed for cloud-native environments. Currently a "sandbox" project in the Cloud Native Computing Foundation, Curiefense is now generally available.
Martez Reed, Director of Technical Marketing at Morpheus Data, joins the Day Two Cloud podcast for a discussion. To hear this entire conversation, GO HERE. And hey, have a great day. You’re doing an outstanding job. ? You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. It’s a […]
Lin Sun
Lin is the Director of Open-Source at Solo.io. She has worked on Istio service mesh since 2017 and serves on the Istio Technical Oversight Committee. Previously, she served on the Istio Steering Committee for three years and was a Senior Technical Staff Member and Master Inventor at IBM for 15+ years. She is the author of the book Istio Explained and has more than 200 patents to her name.
This year’s first-ever Istio service mesh connects microservices.
As the conference program co-chair, I had the incredible honor to work with the rest of the program committee to select conference submissions from a diverse range of world-class speakers. I wanted to share my five key takeaways from the show:
2020: A Year of Istio Innovation
I have heard repeatedly from users that Istio is much easier to use thanks to the consolidation of all control plane components into Istiod. The removal of Mixer and the introduction of Web Assembly extensibility capabilities has also been widely lauded by the community. A complete list Continue reading
Combining, or stitching together, open source projects to build something unique for your network is becoming more common. What does this look like in the real world? What are some of the positive and negative aspects of building things this way? How do open source projects interact with the commercial world? Daniel Teycheney joins Tom Ammon, Jett Tantsura, and Russ White to discuss open source software in networking, particularly around network monitoring and management.
Next week, on Thursday March 11th, 2021 (8am PST/5pm CET) we’ll be hosting our next quarterly Docker Community All-Hands. This free virtual event, open to everyone, is a unique opportunity for Docker staff and the broader Docker community to come together for company and product updates, live demos, community presentations and a live Q&A.
As luck would have it, this All-Hands will coincide almost to the day with Docker’s 8th birthday (yay!). To mark the occasion, we’re going to make this event extra special by introducing :
a longer format (ie. 3 hours instead of 1 hour)
lots more content (ie. demos, community lightning talks and workshops)
regional content in French, Spanish and Portuguese!
We’re also really excited about the new video platform we’ll be using that makes it much easier for attendees to engage/connect/share with each other.
Who will be presenting
Members of Docker’s leadership team including Scott Johnston (CEO), Justin Cormack (CTO), Donnie Berkholz (VP of Products) and Jean-Laurent de Morlhon (VP of Engineering)
Members of Docker’s product, engineering and community team
Docker Captains and Community Leaders
What we’ll cover
Company vision and product roadmap for 2021 and beyond
High-level overview of Docker’s technology strategy
We have been working with conntrack, the connection tracking layer in the Linux kernel, for years. And yet, despite the collected know-how, questions about its inner workings occasionally come up. When they do, it is hard to resist the temptation to go digging for answers.
We already know from last time that conntrack is in charge of tracking incoming and outgoing network traffic. By running conntrack -L we can inspect existing network flows, or as conntrack calls them, connections.
So if we spin up a toy VM, connect to it over SSH, and inspect the contents of the conntrack table, we will see…
$ vagrant init fedora/33-cloud-base
$ vagrant up
…
$ vagrant ssh
Last login: Sun Jan 31 15:08:02 2021 from 192.168.122.1
[vagrant@ct-vm ~]$ sudo conntrack -L
conntrack v1.4.5 (conntrack-tools): 0 flow entries have been shown.
I had to use a weird toolchain to get it done – either ansible-inventory to build a complete data model from various inventory sources, or yq to convert YAML to JSON… and just for the giggles jsonschema CLI command requires the JSON input to reside in a file, so you have to use a temporary file to get the job done.
I had to use a weird toolchain to get it done – either ansible-inventory to build a complete data model from various inventory sources, or yq to convert YAML to JSON… and just for the giggles jsonschema CLI command requires the JSON input to reside in a file, so you have to use a temporary file to get the job done.
Phishing attacks have become more prominent and prevalent in recent years. In particular, our research into the cyber threat landscape over the last few months has shown a dramatic increase in the volume of phishing campaigns observed by our customers.
The most basic way to detect phishing is by using blacklists of phishing URLs.However, our research showed that, in many cases, the lifetime of phishing URLs is less than 24 hours, which renders the blacklist approach largely ineffective.
At VMware, we use multiple approaches to detect phishing attacks.The one we’ve found to be the most promising uses visual representation of the website to recognize phishing. In this blog post, we’ll discuss how this approach works in greater detail. If you need an overview of the more general idea behind phishing detection using image similarity, visit our previous blog post.
Not every hash function is a cryptographic hash function
As one part of VMware’s phishing detection, we store information about the visual representation of every analyzed URL:that is, we calculate perceptual hashes of the screenshots Continue reading
Sagar Nangare
Sagar Nangare is technology blogger, focusing on data center technologies (Networking, Telecom, Cloud, Storage) and emerging domains like Edge Computing, IoT, Machine Learning, AI). Based in He is based in Pune, he is currently serving Calsoft Inc. as Digital Strategist.
Despite the service mesh being a fairly new technology, as compared to other cloud native technologies, a March 2020 Cloud Native Computing Foundation report
Microsoft and VMware have taken their well-established relationship up a notch by tying together application and network technologies to help customers support secure WAN access to critical enterprise applications.Specifically, the companies have combined Azure Virtual WAN Hub with VMware's SD-WAN technology so that VMware's SD-WAN customers can link resources using the networking, security, and routing services in Azure WAN Hub. They announced the news at his week's Microsoft Ignite virtual conference.To read this article in full, please click here
Hewlett Packard Enterprise has been building a mainstream and grassroots server business aimed at large enterprises, HPC centers, and academic and government institutions for two decades. …
Global consulting and services giant Deloitte has bold ambitions to lead in enterprise AI transitions, starting with a five-year, billion-dollar investment in everything from vertical-specific technology acquisitions to building personnel and capabilities ranks. …
Engineers are skeptical of vendor marketing, which is typically heavy on buzzwords and light on actual information. But technical marketing tries to change that dynamic by creating collateral to help engineers and practitioners understand a product. We get into this world with guest Martez Reed, Director of Technical Marketing at Morpheus Data.
Engineers are skeptical of vendor marketing, which is typically heavy on buzzwords and light on actual information. But technical marketing tries to change that dynamic by creating collateral to help engineers and practitioners understand a product. We get into this world with guest Martez Reed, Director of Technical Marketing at Morpheus Data.