This Week in Open Source News: Linux Foundation Training Provides Crucial Team Education, Open Source Leadership Summit News & More
If you’re interested in running a complex Kubernetes system across several different cloud environments, you should check out what Bob Wise and his team at Samsung SDS call “Control Plane Engineering.”
Wise, during his keynote at CloudNativeCon last year, explained the concept of building a system that sits on top of the server nodes to ensure better uptime and performance across multiple clouds, creates a deployment that’s easily scaled by the ClusterOps team, and covers long-running cluster requirements.
Throughout 2016, the SDS (Software-Defined Storage) category achieved many new milestones and became increasingly tied to successful cloud deployments. With SDS, organizations can manage policy-based provisioning and management of data storage independent of the underlying hardware. They can also deploy free and open source SDS solutions. Many people are familiar with Ceph and are leveraging it within their OpenStack deployments, but Ceph is far from the only relevant open source SDS project.
Software-defined networking’s biggest accomplishment last year was achieving market traction and validation, says Martin Casado, a general partner at the venture capital firm Andreessen Horowitz. But there are still many challenges ahead for the industry at large and the organizations that aim to drive SDN forward.
Satya Nadella, the CEO of Microsoft, famously said: "Every business will become a software business, build applications, use advanced analytics and provide Saas services." That's a bold prediction. Aaron Williams, Head of Advocacy and DC/OS at Mesosphere, believes it's true and that DC/OS is the bridge to this new world. He tells us why at MesosCon Asia 2016.
This Week in Open Source News: CNCF Buys RethinkDB's Source Code, SnapRoute Has $25 Million in Funding & More
The security of IoT devices is a high priority these days, as attackers can use Distributed Denial of Service (DDoS) attacks to target them and wreak havoc on a system.
“Due to the sheer volume of unconnected devices, it can take hours and often days to mitigate such an attack,” says Adam Englander, who is a Senior Engineer of the LaunchKey product at iovation.