Pragmatic Approach to Achieving Programmable Network Automation

Network automation is the latest catchphrase to hit the networking space. Hot on the heels of SDN, NFV, and intent-based networking, network automation has been used as an umbrella term to encompass all manner of programmable approaches to automating network configuration and control. Many network engineers who may already have collections of standard operating procedures, template config files, scripts in varying languages, are confused about how to embark on a path to network automation. Incorporating developers into a NetOps team introduces a variety of tools and strategies that should be aligned into your network automation journey.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Enabling Self-Service Analytics with Logical Data Warehouse

denodo

What makes data scientists happy? Of course data. They want it fast and flexible, and they want to do it themselves. But most classic data warehouses (DW) and data lakes are not easy to deal with for agile data access. A more practical solution is the logical data warehouse (LDW), which has shown to be a more agile foundation for delivering and transforming data and makes it easy to quickly plug in new data sources.
Watch Now

Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX

Devops.com

Developers, operators, and corporate executives all agree that compliance with security and regulatory requirements is critical, but many find that enforcing security through manual scans and “best efforts” at the end of the cycle wastes staff time and adds days or weeks to the release schedule. Once the required environments are built, tested, and certified, today’s customer-centric product owners are already longing to push out the next set of changes, absorbing even more of IT Operations’ time to scramble for security and compliance solutions.
Watch Now

Desktop Virtualization Everything you Ever Wanted to Know

The global pandemic has very well changed the very DNA of our work culture. As more and more organizations make the shift to cloud, virtual desktop infrastructure (VDI) is ushering in a work from home -friendly scenario. While this is making the lives of many IT admins easier, with the reduced dependencies on infrastructure.
Watch Now

Designing an IAM Blueprint and Deploying a Federated Identity Service Based on Virtualization

Radiant Logic

Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of this data, and non-compliance issues. But you cannot correct what you don’t know, so the first step in any IAM program is assessment.
Watch Now

Spotlight

resources