As we at The Next Platform have talked about before, the once-clear line of delineation that has run between the hyperscale cloud services providers and the OEMs that for decades has made the systems for enterprise datacenters has faded. …
Everything in ACI is managed as an Object. Each object belongs to a certain Class. As an example, when we create a VLAN Pool, we create an object that belongs to Class VlanInstP. Classes, in turn, are organized in Packages, Class VlanInstP belongs to Package fvns (fv = fabric virtualization, ns namespace). Figure 1-1 illustrates the classes that we are using in this chapter when we create Fabric Access Policies. Lines with an arrow represent Parent-Child structure and dotted lines represent a relationship (Rs) between classes. We will get back to Rs in becoming sections.
Today we are pleased to announce that Docker and Snyk have extended our existing partnership to bring vulnerability scanning to Docker Official and certified images. As the exclusive scanning partner for these two image categories, Snyk will work with Docker to provide developers with insights into our most popular images. It builds on our previous announcement earlier this year where Snyk scanning was integrated into the Docker Desktop and Docker Hub. This means that developers can now incorporate vulnerability assessment along each step of the container development and deployment process.
Docker Official images represent approximately 25% of all of the pull activity on Docker Hub. Docker Official images are used extensively by millions of developers and developer world wide teams to build and run tens of millions of containerized applications. By integrating vulnerability scanning from Snyk users are now able to get more visibility into the images and have a higher level of confidence that their applications are secure and ready for production.
Docker Official images that have been scanned by Snyk will be available early next year.
You can read more about it from Snyk here and you can catch Docker CEO Scott Johnson and Snyk CEO Peter McKay Continue reading
COVID-19 has turned the world inside out, and the impact on infrastructure and operations teams is significant.That's the conclusion of Gartner research vice president Jeffrey Hewitt, who detailed the core infrastructure trends that IT executives can expect to see in the next 12-18 months. Hewitt shared the research at Gartner's IT Symposium/Xpo 2020 Americas event, which is being held virtually this week. (Related story: Gartner's top 9 strategic technology trends for 2021)"The situations created by COVID-19 have had a significant impact on the world," Hewitt said. "This impact is having an influence on almost all of the trends that infrastructure and operations leaders will be facing going forward."To read this article in full, please click here
COVID-19 has turned the world inside out, and the impact on infrastructure and operations teams is significant.That's the conclusion of Gartner research vice president Jeffrey Hewitt, who detailed the core infrastructure trends that IT executives can expect to see in the next 12-18 months. Hewitt shared the research at Gartner's IT Symposium/Xpo 2020 Americas event, which is being held virtually this week. (Related story: Gartner's top 9 strategic technology trends for 2021)"The situations created by COVID-19 have had a significant impact on the world," Hewitt said. "This impact is having an influence on almost all of the trends that infrastructure and operations leaders will be facing going forward."To read this article in full, please click here
Technology is accelerating like crazy, with new tools, services, open-source projects, and processes. If you're trying to make DevOps work in your organization, you might feel like you're perpetually behind. This Day Two Cloud episode is here to say: You're going to be OK. You can still engage with DevOps to move your career and your organization forward. Our guest to tell you how is April Edwards, a Senior Software Engineer at Microsoft.
Technology is accelerating like crazy, with new tools, services, open-source projects, and processes. If you're trying to make DevOps work in your organization, you might feel like you're perpetually behind. This Day Two Cloud episode is here to say: You're going to be OK. You can still engage with DevOps to move your career and your organization forward. Our guest to tell you how is April Edwards, a Senior Software Engineer at Microsoft.
All of the major IT hardware suppliers to one degree or other have adopted a consumption model, which is a fancy word for leasing. Rather than the outright purchase of hardware, customers lease it, usage is monitored, and the customer pays a monthly use fee.Now Dell Technologies has announced it is expanding its as-a-service capabilities with Project APEX, to simplify how customers and partners access Dell technology on-demand.APEX will cover an array of Dell products —storage, servers, networking, hyperconverged infrastructure, PCs, and broader solutions. Project APEX will unify the company’s as-a-service and cloud strategies, technology offerings, and go-to-market efforts previously sold under the On Demand monicker.To read this article in full, please click here
All of the major IT hardware suppliers to one degree or other have adopted a consumption model, which is a fancy word for leasing. Rather than the outright purchase of hardware, customers lease it, usage is monitored, and the customer pays a monthly use fee.Now Dell Technologies has announced it is expanding its as-a-service capabilities with Project APEX, to simplify how customers and partners access Dell technology on-demand.APEX will cover an array of Dell products —storage, servers, networking, hyperconverged infrastructure, PCs, and broader solutions. Project APEX will unify the company’s as-a-service and cloud strategies, technology offerings, and go-to-market efforts previously sold under the On Demand monicker.To read this article in full, please click here
There is significant global attention around the upcoming United States election. Through the Athenian Project and Cloudflare for Campaigns, Cloudflare is providing free protection from cyber attacks to a significant number of state and local elections' websites, as well as those of federal campaigns.
One of the bedrocks of a democracy is that people need to be able to get access to relevant information to make a choice about the future of their country. This includes information about the candidates up for election; learning about how to register, and how to cast a vote; and obtaining accurate information on the results.
A question that I’ve been increasingly asked these past few months: are cyberattacks going to impact these resources leading up to and on election day?
Internally, we have been closely monitoring attacks on the broader elections and campaign websites and have a team standing by 24x7 to help our current customers as well as state and local governments and eligible political campaigns to protect them at no cost from any cyberattacks they may see.
The good news is that, so far, cyberattacks have not been impacting the websites of campaigns and elections officials we are monitoring and protecting. Continue reading
When I published the Optimize Network Data Models series a long while ago, someone made an interesting comment along the lines of “You should use JSON Schema to validate the data model.”
When I published the Optimize Network Data Models series a long while ago, someone made an interesting comment along the lines of “You should use JSON Schema to validate the data model.”
Docker testbed describes how to use Docker Desktop to build a test network to experiment with real-time sFlow streaming telemetry and analytics. This article extends the testbed to experiment with distributed denial of service (DDoS) detection and mitigation techniques described in Real-time DDoS mitigation using BGP RTBH and FlowSpec.
Start ExaBGP using the pre-built sflow/exabgp image. ExaBGP connects to the sFlow-RT analytics software and displays BGP RTBH / Flowspec controls sent by sFlow-RT:
docker run --rm sflow/exabgp
In a second terminal window, start an instance of the sFlow-RT analytics software using the pre-built sflow/ddos-protect image:
We have argued, even a decade and a half before The Next Platform was founded, that no one would ever move all of their IT infrastructure to a utility, what we now call a public cloud. …
Insight Analytics with custom tagging lets operators tailor their traffic views to their environment to gain deeper insight and accelerate trouble resolution.
One of the best-known clothing retailers in the world has embraced edge computing technology and realized significant operational advantages as a consequence, one of its senior technical staff said in a presentation at the recent Edge Computing World conference.The Gap operates more than 2,500 stores in North America and handles about $10 billion in transactions per year. The company has switched from traditional point-of-sale technology to a system based almost entirely on Apple’s iOS products, as iPads replace cash registers and scanner guns across sales floors.To read this article in full, please click here