Mark Zuckerburg’s testimony before the US Congress today and the flood of news about the privacy breach at Facebook and revelations that the company mishandled the data of millions of people has me asking:
Is this really what we signed up for?
It is clear that we are not in control of our online information nor do we really have any idea how it is bought, sold, or used.
For some of us, signing up for a social network like Facebook was about staying in touch with our kids and friends. For others, it was an easy way to reach new customers, or gather a community behind a social project. Yes, many of us figured out that our information was being used to serve up ‘relevant’ ads: as a matter of fact, that seems pretty standard in today’s online world. But that’s only a small part of a much bigger picture.
In the past few weeks we have found out – yet again – that information about ourselves, and our friends and contacts was used far beyond what we intended. We have been profiled, pigeon-holed, politically manipulated, and played like pawns in someone else’s chess game. I’d challenge you to Continue reading
Today the Datanauts explore three key concepts to make cloud management and operations more bearable: automation, understanding new services and capabilities, and security.
Our guest is Kenneth Hui, Technical Marketing Engineer at Rubrik. Ken blogs at Cloud Architect Musings. While our conversation focuses primarily on AWS, many of the principles discussed will apply to any cloud platform.
In part one we parse automation, infrastructure-as-code, and DevOps to understand how these concepts are related, how they differ, and why culture and human behavior matter more than labels.
Part two explores the latest offerings in AWS including serverless, container support, and machine learning.
Part three tackles cloud security essentials including encryption, not exposing S3 buckets, and best practices.
Infrastructure as Code: A Reason to Smile – Thoughtworks.com
DevOps Culture (Part 1) – IT Revolution
The AWS Love/Hate Relationship with Data Gravity – Cloud Architect Musings
Data Encryption in the Cloud, Part 1: Why You Should Care – Cloud Architect Musings
Last Week In AWS – Newsletter
Unsecured server exposed thousands of FedEx customer records – ZDNet
Vault Project – Vault.io
AWS Blogs – Amazon
AWS Security – Amazon
AWS Security Best Practices – Amazon
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Dino Farinacci – History of LISP appeared first on Network Collective.
It may be tempting to take drastic measures to protect the network, but the results can be a bit problematic.
EMA research found that enterprises use network analytics technology to automate a variety of networking tasks for increased uptime and other benefits.
Remember the IPv6 elephant in the room – the inability to do small-site multihoming without NAT (well, NPT66)? IPv6 is old enough to buy its own beer, but the elephant is still hogging the room. Tons of ideas have been thrown around in IETF (mostly based on source address selection tricks), but none of that spaghetti stuck to the wall.
Read more ...In our last post, we removed our last piece of static configuration and replaced static routes with BGP. We’re going to pick up right where we left off and discuss another use case for MPLS – MPLS VPNs. Really – we’re talking about two different things here. The first is BGP VPNv4 address families used for route advertisement. The second is using MPLS as a data plane to reach the prefixes being announced by VPNv4 address family. If that doesn’t make sense yet – don’t worry – it will be pretty clear by the end of the post. So as usual – let’s jump right into this and talk about our lab setup.
As I mentioned in the last post, setting up BGP was a prerequisite to this post – so since that’s the case – Im going to pick up right where I left off. So I’ll post the lab topology picture here for the sake of posting a lab topology – but if you want to get your configuration prepped – take a look at the last post. At the end of the last post we had our Continue reading
I’ve seen a number of blogs and articles describing what network automation is and what it entails, and in many cases, the descriptions end up frightening people who haven’t yet started down an automation path. The biggest question when starting any of these sorts of projects is the simplest: should you automate at all?
My answer to that first question (Spoiler alert: it’s yes, but let me explain why) is that it depends on your network itself. For years, before I was involved with networking at the operating system level, I worked on network management and automation products. Often, I’d tell my customers that if they were happy with the status quo, then I certainly wouldn’t force them down a particular path or to use a particular product. However, if you’re a bit fed up with the manual steps involved in updating a device operating system or configuring a device, then you should look into automation to save yourself time and headaches. Of course, if you only have three devices and they get updated yearly, maybe don’t bother. But if you believe automation will provide the solutions you’re looking for, there are some first steps for automation that you Continue reading
The company also launched an integrated data center security architecture that includes four Cisco products.