Are containers a fad? Or maybe just the wrong answer to a problem you're trying to solve. On today's Day Two Cloud podcast, container contrarian Dave Tucker discusses the problems containers solve, the new ones they create, and why you might want to think twice before you immediately adopt containers as your next application platform.
The post Day Two Cloud 036: The Container Contrarian appeared first on Packet Pushers.
"Contracting with the federal government is a privilege, not a constitutionally guaranteed right,"...
The optical giant says the routers will help network operators achieve the low-latency,...
Customers can manage hundreds of ROBO locations through Cohesity Helios similar to how they manage...
In October of 2019, as part of Red Hat Ansible Engine 2.9, the Ansible Network Automation team introduced the concept of resource modules. These opinionated network modules make network automation easier and more consistent for those automating various network platforms in production. The goal for resource modules was to avoid creating overly complex jinja2 templates for rendering network configuration. This blog post goes through the eos_vlans module for the Arista EOS network platform. I walk through several examples and describe the use cases for each state parameter and how we envision these being used in real world scenarios.
Before starting let’s quickly explain the rationale behind naming of the network resource modules. Notice for resource modules that configure VLANs there is a singular form (eos_vlan, ios_vlan, junos_vlan, etc) and a plural form (eos_vlans, ios_vlans, junos_vlans). The new resource modules are the plural form that we are covering today. We have deprecated the singular form. This was done so that those using existing network modules would not have their Ansible Playbooks stop working and have sufficient time to migrate to the new network automation modules.
Let's start with an example of the eos_vlans Continue reading
Enterprise IT continues to cast its attentions – and sometimes its aspersions – out to the edge, that place outside of traditional datacenters and beyond that cloud where data is increasingly being generated and processed. …
The Continuum From Edges To Datacenters was written by Jeffrey Burt at The Next Platform.
Urban legends claim that Sir Isaac Newton started thinking about gravity when an apple dropped on his head. Regardless of its origins, his theory successfully predicted planetary motions and helped us get people to the moon… there was just this slight problem with Mercury’s precession.
Likewise, his laws of motion worked wonderfully until someone started crashing very small objects together at very high speeds, or decided to see what happens when you give electrons two slits to go through.
Then there was the tiny problem of light traveling at the same speed in all directions… even on objects moving in different directions.
Urban legends claim that Sir Isaac Newton started thinking about gravity when an apple dropped on his head. Regardless of its origins, his theory successfully predicted planetary motions and helped us get people to the moon… there was just this slight problem with Mercury’s precession.
Likewise, his laws of motion worked wonderfully until someone started crashing very small objects together at very high speeds, or decided to see what happens when you give electrons two slits to go through.
Then there was the tiny problem of light traveling at the same speed in all directions… even on objects moving in different directions.
Read more ...Cloudy with a high chance of DBMS: a 10-year prediction for enterprise-grade ML, Agrawal et al., CIDR’20
"Cloudy with a high chance of DBMS" is a fascinating vision paper from a group of experts at Microsoft, looking at the transition of machine learning from being primarily the domain of large-scale, high-volume consumer applications to being an integral part of everyday enterprise applications.
When it comes to leveraging ML in enterprise applications, especially in regulated environments, the level of scrutiny for data handling, model fairness, user privacy, and debuggability will be substantially higher than in the first wave of ML applications.
Throughout the paper, this emerging class of applications are referred to as EGML apps: Enterprise Grade Machine Learning. And there’s going to be a lot of them!
Enterprises in every industry are developing strategies for digitally transforming their businesses at every level. The core idea is to continuously monitor all aspects of the business, actively interpret the observations using advanced data analysis – including ML – and integrate the learnings into appropriate actions that improve business outcomes. We predict that in the next 10 years, hundreds of thousands of small teams will build millions of ML-infused applications – Continue reading
As part of an automation workflow I’m building around Elgato Stream Deck, I needed a way to size an application window to 16×9. This would be one component of a workflow that would allow me to launch an app, size the window, position it on the screen, and hide all the other windows with the push of a Stream Deck button.
The easy part was the Stream Deck configuration. The hard part was the AppleScript–I had never written one.
This AppleScript is crude, but it’s a start. I explain what the script is doing using inline comments, which in AppleScript are noted by the leading double-hyphens, although pound signs and (* *) delimiters for multi-line comments are also supported.
---------------------------------------------------------- -- SET VARIABLES ---------------------------------------------------------- -- theApp = name of the app MacOS will act upon set theApp to "ApplicationName" -- appWidth = how many pixels wide we'd like the window -- appHeight is calculated as a 16:9 ratio of "appWidth" -- Note that "as integer" means decimal portions of a -- calculation are truncated. set appWidth to 1600 set appHeight to appWidth / 16 * 9 as integer -- screenWidth = display pixel width -- screenHeight = Continue reading
The company claims the appliance is capable of simultaneously juggling millions of connections per...
Last year, we introduced powerful new innovations that make networking more secure and intrinsic to your infrastructure. These innovations included our Service-defined Firewall and introduction of optional distributed intrusion detection and prevention (IDS/IPS).
At RSAC 2020, VMware is making it easy to learn how intrinsic security can benefit your business with opportunities to engage us in 1:1 conversations, view demos and more.
Here are 3 ways that you can learn more about intrinsic security at RSAC 2020.
Tom Gillis, SVP/GM of Networking and Security at VMware, will be speaking at the RSA Conference in a breakout session. His session covers data center and branch security approaches and will feature demos across the VMware security portfolio including NSX Data Center, VMware NSX Advanced Load Balancer, and VMware SD-WAN.
Be sure to reserve a seat for his session!
Schedule an exclusive conversation with a security executive to discuss how intrinsic security for your network and workloads can enable proactive security that’s easy to operationalize.
Meeting time slots are limited so request a meeting now.
Dell bagged $2B with the sale of RSA; AT&T shared threat intelligence; and Orange teamed up...