<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cisco Tech Blog on Cisco Techblog</title><link>https://techblog.cisco.com/blog/</link><description>Recent posts on the Banzai Cloud Blog</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Thu, 23 Mar 2017 00:00:00 +0000</lastBuildDate><atom:link href="https://techblog.cisco.com/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>Democratizing Federated Learning</title><link>https://techblog.cisco.com/blog/democratizing-federated-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 08 Sep 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/democratizing-federated-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>What is Federated Learning? Federated learning (FL) is a machine learning (ML) mechanism where different parties participate in a machine learning task and build a global model without sharing training data with any other parties. While there are several different training modes, a typical setting consists of two types of computing nodes: (1) trainer and (2) aggregator. The trainer node processes a dataset locally to build a model; and a set of trainer nodes share their model parameters with the aggregator node.</description></item><item><title>Towards a Predictive Internet</title><link>https://techblog.cisco.com/blog/towards-a-predictive-internet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Tue, 17 Aug 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/towards-a-predictive-internet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Since the early days of the Internet (Arpanet in 1970), the topic of Routing Protocol Convergence Time (time required to detect and reroute traffic in order to handle a link/node failure) has been a top- of-mind issue. A number of protocols and technologies have been developed and deployed at a large scale with the objective of improving overall network reliability. Although such approaches have dramatically evolved, they all rely on a reactive approach: upon detecting a network failure, the traffic is rerouted onto an alternative path.</description></item><item><title>Automated Policy for developers using CI/CD (Terraform) tools</title><link>https://techblog.cisco.com/blog/automated-policy-for-developers-using-cicd/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Mon, 16 Aug 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/automated-policy-for-developers-using-cicd/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Automated Policy - Infrastructure as code is a core element of today’s CI/CD pipeline and led to the emergence of Continuous Configuration Automation (CCA) tools, such as Terraform, a leading declarative push CCA solution launched by HashiCorp in 2014. Security is often an afterthought for IaC solutions, and unfortunately, not prioritized nearly as much as it should be. Cisco Secure Cloud-Native provides comprehensive security from development through runtime, and now adds an important tool to eradicate the information gap between developers at the build stage and DevOps at the deployment stage.</description></item><item><title>Hardening Kubernetes Containers Security with Seccomp</title><link>https://techblog.cisco.com/blog/hardening-kubernetes-containers-security-with-seccomp/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Fri, 13 Aug 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/hardening-kubernetes-containers-security-with-seccomp/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Seccomps - An often overlooked way to harden Kubernetes containers’ security is by applying seccomp profiles. Customizing seccomp profiles, in effect, provides a deeply embedded line of defense that adds a layer of protection to your application in case of breach. Ever-increasing interconnections between applications, increased reliance on external service providers, and security risks in open-source images makes restricting seccomp profiles crucial to improving cloud-native security. In our eBook we detail:</description></item><item><title>API Security</title><link>https://techblog.cisco.com/blog/api-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Fri, 23 Jul 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/api-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Forrester dubbed API Insecurity &amp;ldquo;the lurking threat in your software.&amp;rdquo; Understanding API security-specific risks is key to protecting your API. New ways of thinking about API security are emerging.
API Security - The Challenges &amp;amp; Latest Developments Using external services through APIs is routinely done to speed up development cycles in today’s microservices architecture. Unfortunately, this potentially creates additional exposure for the application. When calling external services or data from an enterprise application, penetration vectors cloaked in these external sources might expose databases or the application back-end to attacks.</description></item><item><title>What’s New in Kubernetes v1.21 and Istio 1.9 Releases and their implications on DevOps?</title><link>https://techblog.cisco.com/blog/whats-new-in-k8s-service-mesh-and-implications-to-devops/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Thu, 22 Jul 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/whats-new-in-k8s-service-mesh-and-implications-to-devops/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Kubernetes and service mesh are increasingly interrelated, yet their new versions are released separately on different dates. Kubernetes and Istio’s last releases help to get a clearer understanding of the interplay between them and how one affects the other.
What’s New in Kubernetes v1.21 and Istio 1.9 Releases and their implications on DevOps? Kubernetes was updated in April 2021 to version 1.21 and Istio Service Mesh has also been updated to version 1.</description></item><item><title>The dark side of Kubernetes admission webhooks</title><link>https://techblog.cisco.com/blog/dark-side-of-kubernetes-admission-webhooks/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/dark-side-of-kubernetes-admission-webhooks/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Admission webhooks are widely used in the Kubernetes world, but people often don&amp;rsquo;t know how easily a faulty webhook can cause unwanted outages or even worse: bring down entire clusters.
In this post, we&amp;rsquo;ll explore the potential issues caused by webhooks and how you can avoid them.
Admission webhooks Before talking about webhooks, we need to mention admission controllers.
Admission controllers are &amp;ldquo;pieces of code that intercept requests to the Kubernetes API server prior to persistence of the object&amp;rdquo;, acting as middleware in processing objects.</description></item><item><title>Kubernetes Observability - One Tool to Rule Them All</title><link>https://techblog.cisco.com/blog/one-tool-to-rule-them-all/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Thu, 08 Jul 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/one-tool-to-rule-them-all/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>It&amp;rsquo;s been a while since we posted about our observability solution. We did not abandon observability, we were just busy with the development. First things first: One Eye is now called Cisco MCOM (Multi-Cloud Observability Manager). As you may know, Cisco has acquired Banzai Cloud. With the new environment come some changes as well. For those who are not familiar with One Eye, let&amp;rsquo;s quickly review the basics. We will cover the current state of our Kubernetes observability solution.</description></item><item><title>AI 2.0 - Episode #1, Introduction</title><link>https://techblog.cisco.com/blog/ai-2.0-episode-1/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 07 Jul 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/ai-2.0-episode-1/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>There is a growing realization in academia and industry that that the state-of-the-art in artificial intelligence, namely deep learning, is flawed but remains quite useful in many domains ranging from conversational agents, demand forecasting to recommendations and more. Hinton, who is thought of by many as "the Father of Deep Learning", has stated that in order to achieve a higher level of capability, we “need to start over”. It seems every day a new business leader or luminary, even the normally very positive Woz has viciously attacked deep learning based AI saying there is nothing intelligent about it.</description></item><item><title>Drowning in Data and Starving for Insights - Episode #3: Application of Topological Data Analysis to Telemetry</title><link>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 07 Jul 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-3/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Data networks are complex systems with plenty of counters and other data collection mechanisms built into them. Topological Data Analysis (TDA) techniques can be used to provide system breakdowns information or early warning signals in real-time. TDA can also be used for exploratory analysis and can help data center administrators and customers solve the big data dilemma, the tradeoff between data abundance and data scarcity. Administrators do not need all information from all components all the time.</description></item><item><title>Data Migration from MariaDB to Redshift using AWS Data Migration Service (DMS)</title><link>https://techblog.cisco.com/blog/data-migration-from-mariadb-to-redshift-using-aws-data-migration-service-dms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Thu, 24 Jun 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/data-migration-from-mariadb-to-redshift-using-aws-data-migration-service-dms/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>The AWS Database Migration Service (DMS) helps you migrate databases to AWS quickly and securely. The source database remains fully operational during the migration, minimizing downtime to applications that rely on the database. With the AWS Database Migration Service, you can migrate your data to and from most widely used commercial and open-source databases.
The following steps explain how to migrate a database from the AWS MariaDB to AWS Redshift using DMS.</description></item><item><title>Explaining Explainable AI in FinTech World</title><link>https://techblog.cisco.com/blog/explaining-explainable-ai-in-fintech-world/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Tue, 22 Jun 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/explaining-explainable-ai-in-fintech-world/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>In recent years, the usage of machine learning techniques has grown substantially, both in industry and research. New types of models based on deep neural networks (DNNs) are now becoming ubiquitous in the industry. These models are extremely powerful and have substantially improved the state of the art in many domains. This improvement, however, is achieved at a cost. Compared to classical machine learning algorithms (e.g., Logistic Regression, SVM), these models are more complex, and typically use many orders of magnitudes more parameters.</description></item><item><title>Access S3 Data in Amazon Redshift using Redshift Spectrum</title><link>https://techblog.cisco.com/blog/access-s3-data-in-amazon-redshift-using-redshift-spectrum/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Mon, 21 Jun 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/access-s3-data-in-amazon-redshift-using-redshift-spectrum/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>As the cloud data warehouse in AWS, Amazon Redshift provides seamless integration with other storages, such as Amazon S3. It enables a very cost-effective data warehouse solution, where the user can keep warm data in Amazon Redshift storage and cold data in S3 storage. The user can access the S3 data from Redshift in the same way, retrieving data from the Redshift storage itself. This blog post explains the process for doing just that.</description></item><item><title>What in the world of Applications?</title><link>https://techblog.cisco.com/blog/what-in-the-world-of-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 02 Jun 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/what-in-the-world-of-applications/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Over the next couple of months, I will introduce you to a three-part series called What in the World of Applications. As applications, API and security take the world by storm, I’ll take you on a journey to better understand the evolution of applications in our everyday lives.
My goal is to shed light on how businesses can remain competitive by understanding that better application connectivity and security in the microservices era can directly impact their bottom line, learning how applications can deliver more business value to both your business and customers.</description></item><item><title>ScaleX Under Armour Invisible Migrations</title><link>https://techblog.cisco.com/blog/under-armour-at-scalex-spring-2021/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Tue, 01 Jun 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/under-armour-at-scalex-spring-2021/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>This is a guest post by Jake Walden.
Under Armour at ScaleX Spring 2021 On May 4, Day 0 of KubeCon + CloudNativeCon EU/Virtual 2021, Cisco hosted the 2nd edition of ScaleX – a full day of sessions that explore what building for scalability and reliability means for the modern cloud native developer. This second edition of ScaleX featured a full day of tech talks, deep dives, and use cases from the people building, operating, and maintaining reliable cloud native systems at scale.</description></item><item><title>Collaboration with Cisco Explores Frontier of Data Technologies</title><link>https://techblog.cisco.com/blog/collaboration-cisco-explores-frontier-data-technologies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 26 May 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/collaboration-cisco-explores-frontier-data-technologies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>This is a guest post by Kevin Coss. This post was originally published in the University of Minnesota&amp;rsquo;s Inquiry blog on research and innovation
A new collaboration between University of Minnesota researchers and Cisco Systems seeks to advance cutting-edge technologies that transform the way people access, manage, and protect data.
Cisco—which develops, manufactures, and sells networking hardware, software, telecommunications equipment, and other high-technology services and products (like WebEx)—has funded six projects at the University and plans to fund more in the near future.</description></item><item><title>Drowning in Data and Starving for Insights - Episode #2: What is Topological Data Analysis?</title><link>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-2/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 26 May 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-2/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Topology – The Stratosphere of Human Thought In the previous episode, we raised the need in networking to use methodologies that enable data mining services in complex environments and allow getting insights directly from data. To this aim, we will introduce in this post the concepts behind Topological Data Analysis.
First, let’s introduce topology. For a network engineer, a topology is a physical configuration of a network that defines how devices are connected.</description></item><item><title>Protecting Personal Identifiable Information with LexNLP</title><link>https://techblog.cisco.com/blog/protecting-personal-identifiable-information-with-lexnlp/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 26 May 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/protecting-personal-identifiable-information-with-lexnlp/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>It is no wonder companies are taking stringent measures to make sure they are fully compliant towards EU’s General Data Protection Regulations (GDPR) which protects privacy of Personally Identifiable Information (PII) of EU residents, a lot more stricter regulations are coming sooner than later such as California Privacy Right Act in 2023, SAFE DATA Act by the end of 2021. Hence protecting PII is becoming a matter of paramount importance to businesses.</description></item><item><title>Simplifying account-based billing through AWS organizational setup</title><link>https://techblog.cisco.com/blog/simplifying-account-based-billing-through-aws-organizational-setup/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Wed, 26 May 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/simplifying-account-based-billing-through-aws-organizational-setup/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Billing is core to the smooth operation of any business, and an organized AWS account structure using the AWS Organizations Service ensures that your billing processes run smoothly.
This post walks through how the AWS Organizations Service can be used to simplify account-based billing for organizations. The image below shows a sample AWS account structure made using the AWS Organizations Service. Once configured, after going to the AWS Billing console, the user will see the billing information for each account added.</description></item><item><title>Drowning in Data and Starving for Insights - Episode #1: Swimming in Sensors and Drowning in Data</title><link>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-1/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</link><pubDate>Thu, 20 May 2021 00:00:00 +0000</pubDate><guid>https://techblog.cisco.com/blog/drowning-in-data-and-starving-for-insights-episode-1/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=blog_rss</guid><description>Swimming in Sensors and Drowning in Data Modern sensor networks and communication networks provide large sets of operational data, including information per system, subsystem, feature, port, or even per packet. A network device, like a router or a switch, offers millions of multivariate time series that portray the state of the device. But the fact that data is available does not mean that it is easily consumable.
Indeed, the reality is that network operations produce a lot of data but at the same time they are starving for insights.</description></item></channel></rss>