Pragmatic Approach to Achieving Programmable Network Automation

Sdxcentral

Network automation is the latest catchphrase to hit the networking space. Hot on the heels of SDN, NFV, and intent-based networking, network automation has been used as an umbrella term to encompass all manner of programmable approaches to automating network configuration and control. Many network engineers who may already have collections of standard operating procedures, template config files, scripts in varying languages, are confused about how to embark on a path to network automation. Incorporating developers into a NetOps team introduces a variety of tools and strategies that should be aligned into your network automation journey.
Watch Now

Spotlight

Cybercriminals will band together, creating fewer but stronger malware-as-a-service families. Cybercriminals can buy malware, exploits, botnets, and other shady services on the underground market. Criminals of varying experience and sophistication can easily launch attacks. Increasingly powerful brands will propel more sophisticated cryptocurrency mining and increases in mobile malware and stolen credit cards and credentials.

OTHER ON-DEMAND WEBINARS

Tech Webinar on Introduction to ICP

MindCraft Software Pvt. Ltd.

Raja Roychoudhury, Head, Infrastructure Software Services at MindCraft, explains how IBM Cloud Private can be used to leverage on-premises private cloud infrastructure to run your cloud-ready application.
Watch Now

Best Practices for Business Continuity and Disaster Recovery in Hyper-Converged Infrastructures

5NINE

Join Director of Technical Sales, Barry Martin from Axellio and Sr Solutions Engineer, Rob Conley from 5nine as they share use cases, customer stories and best practices for business continuity and disaster recovery in HCI environments.
Watch Now

Managing Data at Scale in VMware and Hybrid Cloud Environment

Rubrik

With more and more data being generated by organizations, it's increasingly important to manage and protect data at scale, across the edge, core data centers, and cloud environments. As applications and data are becoming more distributed a modern approach to data management is needed.
Watch Now

UDS Enterprise 2.2.1

udsenterprise

The UDS Enterprise Team organized past Tuesday 19th March the Webinar Whats new in UDS Enterprise 2.2.1 VDI connection broker to showcase the new features added to the latest version of this software for virtualization of Windows and Linux desktops and applications. In the session, a comprehensive technical demo of the important improvements introduced in UDS Enterprise 2.2.1 was performed. All the recommended steps and configurations were shown to manage and deploy virtual desktops and applications hosted in Microsoft Azure.
Watch Now

Spotlight

Cybercriminals will band together, creating fewer but stronger malware-as-a-service families. Cybercriminals can buy malware, exploits, botnets, and other shady services on the underground market. Criminals of varying experience and sophistication can easily launch attacks. Increasingly powerful brands will propel more sophisticated cryptocurrency mining and increases in mobile malware and stolen credit cards and credentials.

resources