Learning Kubernetes requires several critical elements; one of which is setting up a cluster. But the value in understanding how to set up a Kubernetes cluster is dwindling as enterprise Kubernetes services are emerging. So if you want to learn how to use Kubernetes, but not know how to deploy it, what do you do?
Escaping the buzz and hype around Kubernetes seems impossible these days. Clearly the platform has won the container orchestration wars and has been embraced by developers.
Building two separate data centers for reliability makes all the sense in the world. But what happens when they start behaving like one data center? Dr. Peter Welcher has some thoughts on the subject and some things you definitely want to watch out for.
Wi-Fi 6 is a done deal, right? We’re certified, which is almost the same thing as ratified. Except when it isn’t. Nick Shoemaker has a quick overview of why the difference makes all the difference.
In this data-powered economy, all organizations need a solid backup and recovery plan to minimize disruptions in the event of a system malfunction. In this webinar, Chris M. Evans addresses the topic by discussing how business leaders can prepare a data management plan to protect the business from loss and liability.
Is your enterprise ready for DNS-over-HTTPS? How would you know if you weren’t? Josh Warcop takes a look at how to configure Firefox to play nicely in the enterprise with this new security feature.
Is your networking solution of choice SD-WAN? Daniel Dib gives us a great overview of what makes something SD-WAN and how we can ensure we’re getting what we paid for.
Curious how Kubernetes seems to magically achieve your desired state? When you pass you YAML file to the Kubernetes API and stuff just happens, what is going on? Eric Shanks breaks down the basics of the control loop that Kubernetes uses to accomplish this.
When AWS announced their Outpost product in late 2018 there was much excitement around the possibility of bringing native AWS service and VMware Cloud on AWS into the data center for situations where data and applications were latency sensitive and needed to be placed closer to the user. As details have emerged about architecture and delivery, Chris Evans has noticed that the offering could present a potential conflict with traditional enterprise IT hardware vendors.
Security is paramount and we do everything we can to make our systems more secure. But what happens if they’re insecure at the origin? Bruce Schneier has some thoughts about supply-chain security in this great post.