Hewlett Packard Enterprise is one of the new investors, having initially signed up for the Portworx Enterprise platform last year.
“When you deal with Kubernetes in the core of a network, dealing with quarterly updates is one thing,” said Red Hat's Brian Gracely. “But when you have 2,000 branch offices that is a different model."
The open source project creates the necessary tunnels and routes between Kubernetes clusters that allow for direct connections regardless of their location.
AT&T ties its 5G and Airship plans to the Mirantis core; the Linux community uncovers a runC container runtime flaw; and Orange Business wants to be a "one-stop" SD-WAN shop.
Its purpose is to show the ability to run the same networking code running as VNFs on OpenStack and as CNF’s on Kubernetes.
The new product joins VMware’s other two Kubernetes offerings: Enterprise PKS and Cloud PKS.
The CSP platform relies on Google's Kubernetes-based GKE On-Prem and Istio to support management across hybrid environments.
SDxCentral Weekly Wrap for Feb. 15, 2019: Google's plan will include geographic and workforce expansion. Kubernetes, Docker, and containerd impacted by the runC runtime bug. Mirantis' multi-year AT&T deal is for eight-figures.
The support will allow organizations to deploy Knative in a Kubernetes cluster using a one-click install via the IBM Cloud Kubernetes Service user interface.
Will the NFV legacy trip up telcos’ leapfrog into containers?
The data preparation software company immediately identified dozens of problems within its code after deploying Instana’s APM and SDK software.
Watson applications can now be run as microservices orchestrated by Kubernetes across rival cloud ecosystems like like AWS, Azure, and GCP.
Dominic Wilde, CEO of the Cloud Native-based startup SnapRoute, discusses plans on turning application delivery and network industry upside down, using containerization, cloud-based networking and CI/CD.
Today’s container technology is an evolution of early Unix capabilities, with a similarity of containers sharing an OS. Learn more about containers basics.
The flaw basically allows an infected container to gain control of the overarching host container and allow an attacker to execute any command.