article thumbnail

Why F5 and Tempered Networks founder Jeff Hussey left retirement and ‘bought’ himself a job

GeekWire

Jeff Hussey, CEO and co-founder of Tempered Networks, and his wife on a trip to Austria. Jeff Hussey , co-founder and CEO of Seattle’s Tempered Networks, is not a believer in long-term work-from-home practices. “We In 2014 , he became CEO and co-founder of Tempered. “I Photo courtesy of Jeff Hussey). Jeff Hussey.

Network 127
article thumbnail

IBM to Acquire Cloudant: Open, Cloud Database Service Helps Organizations Simplify Mobile, Web App and Big Data Development

CTOvision

– 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., To meet this growing demand, data must be always available and easily accessed by massive volumes and networks of users and devices. – bg.

IBM 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #58

Scott Lowe

Networking. Mustafa Akin has an article on Docker’s new overlay networking functionality. Here’s a post that claims to translate OVS and OpenStack Neutron to the network engineer’s language. I would respond to that by saying OpenStack Neutron wasn’t built to manage a physical network. Now, on to the content!

Vmware 60
article thumbnail

IDF 2014: Architecting for SDI, a Microserver Perspective

Scott Lowe

Microservers share some common characteristics, such as high integrated platforms (like integrated network) and being designed for high efficiency. He starts the discussion by talking about NFV and SDN, and how these efforts enable agile networks on standard high volume (SHV) servers (such as microservers).

article thumbnail

Kubernetes on OpenStack: The Technical Details

Scott Lowe

Lees spends some time reviewing the basics of Kubernetes networking, reviewing the core constructs leveraged by Kubernetes. In the process of reviewing Kubernetes networking, Lees points out that there are lots of solutions for pod-to-pod (east-west) traffic flows. Load balancing is the next connection point that Lees reviews.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I wasn't really interested in security because I was mainly interested in enterprise infrastructure, how to design, big LANs for for networking on organizations like getting file shares up and running so I was an early adopter of Windows infrastructure like Windows, and early, Windows for Workgroups later on, like, NT 4.0 And I did terribly.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I wasn't really interested in security because I was mainly interested in enterprise infrastructure, how to design, big LANs for for networking on organizations like getting file shares up and running so I was an early adopter of Windows infrastructure like Windows, and early, Windows for Workgroups later on, like, NT 4.0 And I did terribly.