Archive

Category Archives for "Networking"

GE’s Predix wants to help the industrial IoT shine

GE has always had technology as a core part of its offering. After all, you don’t build wind turbines, jet engines and gas plants without leveraging technology. But in recent years, the company has moved from being an industrial company that uses technology to an outright vendor of technology solutions.A core part of this approach is by powering what GE calls the Industrial IoT, that is all the connected devices that are used in industrial settings of every kind. Predix is GE’s platform for the industrial IoT, and it promises to connect machines, data and people to drive results. Predix offers a single platform based in the cloud that can reconcile all the disparate data feeds and information streams pouring out of the industrial IoT.To read this article in full or to leave a comment, please click here

Consumer IoT could outpace industrial IoT

Both Gartner and Tech Insider agree, the Internet of Things (IoT) will be a major tech category, predicting  20.4 billion units and 23.9 billion devices, respectively, by 2020.They disagree, however, about where those devices will go. Gartner says two-thirds of the devices will land in consumer applications. Tech Insider says over three-fourths will land in government and business applications.+ Also on Network World: 5 things to think about for industrial IoT readiness + Why is there such a big difference in forecasts? Which forecaster’s crystal ball is less occluded? Gartner’s forecasts depend on more stable, smaller IoT consumer islands, while Tech Insider’s forecasts depend on large clouds often built on evolving technologies.To read this article in full or to leave a comment, please click here

Docker CE – Installing Test(“RC”) version

Starting with Docker 17.03, Docker introduced Community edition(CE) and Enterprise edition(CE) version of their Docker software. The release numbering also changed. From Docker 1.13.1, we jump to 17.03 version. Docker CE is the free version while Docker EE is the commercially supported enterprise version. Docker enterprise edition comes in different flavors based on the cost. … Continue reading Docker CE – Installing Test(“RC”) version

Witcher 3 developers won’t bow to extortion for stolen Cyberpunk 2077 files

With E3 (Electronic Entertainment Expo) starting this week, we can expect a flood of gaming news. It remains to be seen if the person or people trying to extort Polish game developer CD Projekt Red will choose this week to leak stolen Cyberpunk 2077 game files.Instead of staying quiet about an extortion attempt, CD Projekt Red, the developers behind The Witcher 3, got out ahead of any potential leak by tweeting: An unidentified individual or individuals have just informed us they are in possession of a few internal files belonging to CD PROJEKT RED. Among them are documents connected to early designs for the upcoming game, Cyberpunk 2077.To read this article in full or to leave a comment, please click here

Witcher 3 developers won’t bow to extortion for stolen Cyberpunk 2077 files

With E3 (Electronic Entertainment Expo) starting this week, we can expect a flood of gaming news. It remains to be seen if the person or people trying to extort Polish game developer CD Projekt Red will choose this week to leak stolen Cyberpunk 2077 game files.Instead of staying quiet about an extortion attempt, CD Projekt Red, the developers behind The Witcher 3, got out ahead of any potential leak by tweeting: An unidentified individual or individuals have just informed us they are in possession of a few internal files belonging to CD PROJEKT RED. Among them are documents connected to early designs for the upcoming game, Cyberpunk 2077.To read this article in full or to leave a comment, please click here

RPM Post-Upgrade Scripts

Something different today: Here’s something I learnt about RPM package management, and post-upgrade scripts. It turns out that they don’t work the way I thought they did. Post-uninstall commands are called on both uninstall and upgrade. For my own reference as much as anyone’s here some info about it, and how to deal with it.

RPM Package Management

RPM is a Linux package management system. It is a way of distributing and managing applications installed on Linux systems. Packages get distributed as .rpm files. These contain the application binaries, configuration files, and application metadata such as dependencies. They can also contain scripts to run pre- and post- installations, upgrades and removal.

Using package management systems is a vast improvement over distributing source code, or requiring users to manually copy files around and run scripts themselves.

There is some effort required to get the spec files used to create packages. But once it has been set up, it is easy to create new versions of packages, and distribute them to users. System administrators can easily check which version they’re running, check what new versions are available, and upgrade.

We use RPMs to distribute StackStorm packages for RHEL/CentOS systems. Similarly, we distribute Continue reading

RPM Post-Upgrade Scripts

Something different today: Here’s something I learnt about RPM package management, and post-upgrade scripts. It turns out that they don’t work the way I thought they did. Post-uninstall commands are called on both uninstall and upgrade. For my own reference as much as anyone’s here some info about it, and how to deal with it.

RPM Package Management

RPM is a Linux package management system. It is a way of distributing and managing applications installed on Linux systems. Packages get distributed as .rpm files. These contain the application binaries, configuration files, and application metadata such as dependencies. They can also contain scripts to run pre- and post- installations, upgrades and removal.

Using package management systems is a vast improvement over distributing source code, or requiring users to manually copy files around and run scripts themselves.

There is some effort required to get the spec files used to create packages. But once it has been set up, it is easy to create new versions of packages, and distribute them to users. System administrators can easily check which version they’re running, check what new versions are available, and upgrade.

We use RPMs to distribute StackStorm packages for RHEL/CentOS systems. Similarly, we distribute Continue reading

VMware NSX and Check Point vSEC

One of the current challenges of data center security is the East-West traffic that has become so pervasive as modern applications communicate a great deal between their different components.  Conventional perimeter security is poorly placed to secure these lateral flows, to promote a zero-trust model in order to prevent threats moving within each application layer.  VMware NSX addresses this, providing virtual firewall at the virtual NIC of each VM with a management framework where micro-segmentation is achievable with a sensible level of overhead.  Check Point vSEC can be deployed in conjunction to provide threat and malware protection.

The VMware NSX Distributed Firewall (DFW) protects East-West L2-L4 traffic within the virtual data center. The DFW operates in the vSphere kernel and provides a firewall at the NIC of every VM.  This enables micro-segmented, zero-trust networking with dynamic security policy leveraging the vCenter knowledge of VMs and applications to build policy rather than using IP or MAC addresses that may change.  Tools for automation and orchestration as well as a rich set of APIs for partner and customer extensibility complete the toolset for security without impossible management overhead.  While this is a dramatic improvement in the security Continue reading

The top 7 Linux IoT projects

It’s a Linux world, and the rest of computing is just living in it – often literally, thanks to containerization. IoT, in all of its manifold forms, is no exception, and the Linux Foundation lists these seven projects as the key players in the march of connected open-source systems. Here’s a quick rundown.Automotive-Grade LinuxStarted: 2012Key Members: A mix of big car companies (including Mazda, Suzuki, Toyota, Honda, Nissan and Ford), and a diverse array of well-known tech names. Everything from carriers (China Mobile, NTT), silicon makers (Intel, ARM, Nvidia) to electronics powerhouses like LG, Samsung and Panasonic.To read this article in full or to leave a comment, please click here