Archive

Category Archives for "Networking"

Legacy IT Is Not A Monument

During Networking Field Day 17, there was a lot of talk about legacy IT constructs, especially as they relate to the cloud. Cloud workloads are much better when they are new things with new applications and new processes. Existing legacy workloads are harder to move to the cloud, especially if they require some specific Java version or special hardware to work properly.

We talk a lot about how painful legacy IT is. So why do we turn it into a monument that spans the test of time?’

Keeping Things Around

Most monuments that we have from ancient times are things that we never really intended to keep. Aside from the things that were supposed to be saved from the beginning, most iconic things were never built to last. Even things like the Parthenon or the Eiffel Tower. These buildings were always envisioned to be torn down sooner or later.

Today, we can’t imagine a world without those monuments. We can’t conceive of a time without them. And, depending on Continue reading

How to use VPNs in China without breaking the law

A lot of people outside China ask whether the government there is going to shut down the corporate VPNs of international companies with facilities in China. How will the new Chinese cybersecurity law impact foreign IT operations in the country? Is it safe to transfer information into and out of China?To answer, let’s start with the Great Firewall of China (GFC), which has a big impact on what information is allowed to move in and out of the country. The GFC is a combination of government policies and advanced telecom equipment deployed by the main Internet Service Providers in China. It is intended to safeguard the national security and the best interests of China.To read this article in full, please click here

How to use VPNs in China without breaking the law

A lot of people outside China ask whether the government there is going to shut down the corporate VPNs of international companies with facilities in China. How will the new Chinese cybersecurity law impact foreign IT operations in the country? Is it safe to transfer information into and out of China?To answer, let’s start with the Great Firewall of China (GFC), which has a big impact on what information is allowed to move in and out of the country. The GFC is a combination of government policies and advanced telecom equipment deployed by the main Internet Service Providers in China. It is intended to safeguard the national security and the best interests of China.To read this article in full, please click here

Automatic Product Pitch Generator

Because we all like a little bit of fun, I created an automatic Product Pitch Generator for network vendors. More accurately, a conversation about buzzwords occurred in the context of Networking Field Day 17 where it was jokingly suggested that we needed to take some of the amazing words we were hearing and make a generator. Here’s the best part (if you look at it this way); we ended up with two generators!

Big props to Jordan Martin who hacked together some Python, and created his Network Product Buzzword Generator which I think is hilarious (go try it out!). Meanwhile, I was hacking together some Go and came up with this mess of a Product Pitch Generator:

Hit Refresh to get a new Pitch!

And finally, if you’re watching the NFD17 livestream, why not ML-wash yourself and play NFD17 Buzzword Bingo?

NFD17 Bingo!

Have fun! ?

If you liked this post, please do click through to the source at Automatic Product Pitch Generator and give me a share/like. Thank you!

Addressing 2017

Time for another annual roundup from the world of IP addresses. Let’s see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself.

Data could one day be stored on molecules

Billions of terabytes of data could be stored in one small flask of liquid, a group of scientists believe. The team from Brown University says soon it will be able to figure out a chemical-derived way of storing and manipulating mass-data by loading it onto molecules and then dissolving the molecules into liquids.If the method is successful, large-scale, synthetic molecule storage in liquids could one day replace hard drives. It would be a case of the traditional engineering that we’ve always pursued for storage being replaced by chemistry in our machines and data centers.Also on Network World: The future of storage: Pure Storage CEO Charlie Giancarlo shares his predictions The U.S. Department of Defense’s Defense Advanced Research Projects Agency (DARPA) has awarded the Brown team $4.1 million to work out how move the concept forward.To read this article in full, please click here

Data could one day be stored on molecules

Billions of terabytes of data could be stored in one small flask of liquid, a group of scientists believe. The team from Brown University says soon it will be able to figure out a chemical-derived way of storing and manipulating mass-data by loading it onto molecules and then dissolving the molecules into liquids.If the method is successful, large-scale, synthetic molecule storage in liquids could one day replace hard drives. It would be a case of the traditional engineering that we’ve always pursued for storage being replaced by chemistry in our machines and data centers.Also on Network World: The future of storage: Pure Storage CEO Charlie Giancarlo shares his predictions The U.S. Department of Defense’s Defense Advanced Research Projects Agency (DARPA) has awarded the Brown team $4.1 million to work out how move the concept forward.To read this article in full, please click here

Limited Time Only: Read our Springer/Nature Paper on Healthcare, Security, and Privacy

Last year, I was invited to contribute a paper to a special edition of the Health and Technology Journal published by Springer/Nature. The special issue addressed privacy and security, with a particular focus on healthcare and medical data. I’m happy to announce that now, for four weeks only, the publishers have made the whole issue available free.

From our accompanying blog post last July:

“The paper, “Trust and ethical data handling in the healthcare context” examines the issues associated with healthcare data in terms of ethics, privacy, and trust, and makes recommendations about what we, as individuals, should ask for and expect from the organisations we entrust with our most sensitive personal data.”

Although we can find several comprehensive and mature data protection frameworks around the world, current legal safeguards to not seem to prevent data controllers from indulging in:

  • over collection
  • insufficient care of personal data
  • unexpected or unwelcome use
  • excessive sharing

In my paper, I argue that a narrow focus on regulatory compliance can lead to a “checklist” mentality, obscure the real reasons why organisations should treat data with care and respect, and lead to poor outcomes for both the organisation and the individual. I Continue reading

Getting started with Linux: the basics – part 3

In part 1 of our series on the basics of Linux, we learned how to download Linux, whether you should use the CLI or the GUI, how to get a SSH client, how to login to Linux, and how to get help.

In part 2 of our series, we learned how to know what type of Linux you are using and how to navigate the Linux file system.

In this final post in the series, you’ll learn about Linux files, Linux permissions, Linux package management, and how to install applications in Linux.

Files and permissions

Let’s say that a user named “david” was denied access to the file /var/log/syslog. The reason for that is likely the user “david” doesn’t have permission to access to the file.

You can see this if you execute ls -l /var/log/syslog:

david@debian:~$ ls -l /var/log/syslog
-rw-r----- 1 root adm 9074 May 15 10:17 /var/log/syslog

The file is owned by the user “root” and the group “adm”. The file permissions are “rw” (shorthand for read/write) for the owner and “r” (shorthand for “read”) for the group with no permissions for anyone else. The graphic below shows how file permissions work in Linux.

Linux package management

In the file permissions Continue reading