Got questions about SD-WAN? Sign up for an online summit November 7th and 8th to learn about how to deploy branches more quickly, improve user experience, bolster security, and more. Hear from industry experts, analysts, and the Packet Pushers at this free event.
Introduction to DNS over HTTPS (DOH)
Juniper Networks believes that a new multicloud world creates an opportunity to lure enterprises with the promise of operational consistency: using Juniper software and automation to enforce uniform policies and security controls on premises and across public clouds.
Supply chain safety is more than just implants
Unsurprisingly, Enterprise IT is preventing good encryption because their security devices suck
Deep dive into compromising firmware on Supermicro BMC
One element of the US Govt is supporting vendors in denying the Bloomberg article
A big article from Bloomberg claiming that certain custom manufactured models of Super Micro servers shipped with hardware implants of a company (Elemental) that was offering services to US Security agencies. This company was later sold to Amazon and sold services to a company later acquired by Apple for the Siri voice product. Bloomberg published a […]
Seems everyone wants to move to the cloud but, should they move? It’s the classic answer: it depends. What workloads, projects and companies are best for the cloud? Certain companies and projects were designed for the cloud and others are not. To start off I was going to give a definition of what the cloud […]
Mode, a startup that offers a private network to compete with MPLS, has partnered with SD-WAN provider Versa Networks to integrate the two products.
Join the Packet Pushers and special guests for Virtual Design Clinic 2, a live mini-conference that’s online and absolutely free. Learn from deep-dive tech presentations and get your networking questions answered. Sign up now to reserve your place.
Barefoot Networks, maker of the Tofino ASIC, has released P4 Studio, software designed to make it easier to program Tofino and write custom functions.
After panel session about the value of security, Simon said that we need more operations and better people operating the security that we already have. Thats one of Greg’s hot button issues so he got him in front of the camera to get a bit deeper on how Secrutiny does this and the sort results […]
AppNeta, which offers a SaaS-based network performance monitoring (NPM) service, has announced new monitoring features to incorporate BGP data and greater DNS visibility, as well as a more powerful monitoring appliance.
The money’s good. Most everything else isn’t. How much more are you willing to take at this job?
Arista is expanding its switch portfolio with the acquisition of Metamako, which makes network gear for high-frequency trading in the financial services industry.
The problems begin when people don’t have imposter syndrome.
Juniper has announced a new software package, Contrail Edge Cloud, that targets service providers and telcos building out edge nodes to support existing and new applications. The package bundles software from Juniper and Red Hat for networking, compute, orchestration, and security.
Docker is not known for superior out-of-the-box security. By default, Docker management code and also code inside Docker containers is running as root. Read on to learn how to deal with these facts if you want to leverage Docker on a management server.
WLAN vendor Mist says it has enhanced its machine learning capabilities to improve anomaly detection, and has boosted the number of natural language queries its virtual assistant can respond to.
Cisco has announced a new UCS server, the C480 ML, for AI and machine learning workloads. The server includes 8 NVIDIA Tesla V100 GPUs and up to 182TBs of storage.
Geoff Huston asks the questions that other people don’t
Needing a means to provide some network automation tools to my team, I decided to see if Docker would fit the bill. Read on to learn how to build your own Docker container for network automation.
You’ve probably seen those social media posts that list traits or habits of successful people. Here’s a list of traits from an IT engineering perspective that you don’t want to emulate.
Helpful post on difference between general compute and AI processing