Archive

Category Archives for "Networking"

Docker CE – Installing Test(“RC”) version

Starting with Docker 17.03, Docker introduced Community edition(CE) and Enterprise edition(CE) version of their Docker software. The release numbering also changed. From Docker 1.13.1, we jump to 17.03 version. Docker CE is the free version while Docker EE is the commercially supported enterprise version. Docker enterprise edition comes in different flavors based on the cost. … Continue reading Docker CE – Installing Test(“RC”) version

Witcher 3 developers won’t bow to extortion for stolen Cyberpunk 2077 files

With E3 (Electronic Entertainment Expo) starting this week, we can expect a flood of gaming news. It remains to be seen if the person or people trying to extort Polish game developer CD Projekt Red will choose this week to leak stolen Cyberpunk 2077 game files.Instead of staying quiet about an extortion attempt, CD Projekt Red, the developers behind The Witcher 3, got out ahead of any potential leak by tweeting: An unidentified individual or individuals have just informed us they are in possession of a few internal files belonging to CD PROJEKT RED. Among them are documents connected to early designs for the upcoming game, Cyberpunk 2077.To read this article in full or to leave a comment, please click here

Witcher 3 developers won’t bow to extortion for stolen Cyberpunk 2077 files

With E3 (Electronic Entertainment Expo) starting this week, we can expect a flood of gaming news. It remains to be seen if the person or people trying to extort Polish game developer CD Projekt Red will choose this week to leak stolen Cyberpunk 2077 game files.Instead of staying quiet about an extortion attempt, CD Projekt Red, the developers behind The Witcher 3, got out ahead of any potential leak by tweeting: An unidentified individual or individuals have just informed us they are in possession of a few internal files belonging to CD PROJEKT RED. Among them are documents connected to early designs for the upcoming game, Cyberpunk 2077.To read this article in full or to leave a comment, please click here

RPM Post-Upgrade Scripts

Something different today: Here’s something I learnt about RPM package management, and post-upgrade scripts. It turns out that they don’t work the way I thought they did. Post-uninstall commands are called on both uninstall and upgrade. For my own reference as much as anyone’s here some info about it, and how to deal with it.

RPM Package Management

RPM is a Linux package management system. It is a way of distributing and managing applications installed on Linux systems. Packages get distributed as .rpm files. These contain the application binaries, configuration files, and application metadata such as dependencies. They can also contain scripts to run pre- and post- installations, upgrades and removal.

Using package management systems is a vast improvement over distributing source code, or requiring users to manually copy files around and run scripts themselves.

There is some effort required to get the spec files used to create packages. But once it has been set up, it is easy to create new versions of packages, and distribute them to users. System administrators can easily check which version they’re running, check what new versions are available, and upgrade.

We use RPMs to distribute StackStorm packages for RHEL/CentOS systems. Similarly, we distribute Continue reading

RPM Post-Upgrade Scripts

Something different today: Here’s something I learnt about RPM package management, and post-upgrade scripts. It turns out that they don’t work the way I thought they did. Post-uninstall commands are called on both uninstall and upgrade. For my own reference as much as anyone’s here some info about it, and how to deal with it.

RPM Package Management

RPM is a Linux package management system. It is a way of distributing and managing applications installed on Linux systems. Packages get distributed as .rpm files. These contain the application binaries, configuration files, and application metadata such as dependencies. They can also contain scripts to run pre- and post- installations, upgrades and removal.

Using package management systems is a vast improvement over distributing source code, or requiring users to manually copy files around and run scripts themselves.

There is some effort required to get the spec files used to create packages. But once it has been set up, it is easy to create new versions of packages, and distribute them to users. System administrators can easily check which version they’re running, check what new versions are available, and upgrade.

We use RPMs to distribute StackStorm packages for RHEL/CentOS systems. Similarly, we distribute Continue reading

VMware NSX and Check Point vSEC

One of the current challenges of data center security is the East-West traffic that has become so pervasive as modern applications communicate a great deal between their different components.  Conventional perimeter security is poorly placed to secure these lateral flows, to promote a zero-trust model in order to prevent threats moving within each application layer.  VMware NSX addresses this, providing virtual firewall at the virtual NIC of each VM with a management framework where micro-segmentation is achievable with a sensible level of overhead.  Check Point vSEC can be deployed in conjunction to provide threat and malware protection.

The VMware NSX Distributed Firewall (DFW) protects East-West L2-L4 traffic within the virtual data center. The DFW operates in the vSphere kernel and provides a firewall at the NIC of every VM.  This enables micro-segmented, zero-trust networking with dynamic security policy leveraging the vCenter knowledge of VMs and applications to build policy rather than using IP or MAC addresses that may change.  Tools for automation and orchestration as well as a rich set of APIs for partner and customer extensibility complete the toolset for security without impossible management overhead.  While this is a dramatic improvement in the security Continue reading

The top 7 Linux IoT projects

It’s a Linux world, and the rest of computing is just living in it – often literally, thanks to containerization. IoT, in all of its manifold forms, is no exception, and the Linux Foundation lists these seven projects as the key players in the march of connected open-source systems. Here’s a quick rundown.Automotive-Grade LinuxStarted: 2012Key Members: A mix of big car companies (including Mazda, Suzuki, Toyota, Honda, Nissan and Ford), and a diverse array of well-known tech names. Everything from carriers (China Mobile, NTT), silicon makers (Intel, ARM, Nvidia) to electronics powerhouses like LG, Samsung and Panasonic.To read this article in full or to leave a comment, please click here

Data should be stored in space, firm says

Space is significantly more data-center-friendly than earth, reckons a Los Angeles company that recently received a U.S. patent for a proposed galactic server farm and associated network.Cloud Constellation Corp. says it’s going to provide a way for organizations and governments to shift chunks of data around, without using the traditional terrestrial infrastructure that it says is slow, insecure and a legal minefield.“This concept will soon become reality,” president Cliff Beek says, writing in Nextgov about SpaceBelt. “Data will never pass through the internet or along its leaky and notoriously insecure lines. In-transit espionage, theft and surveillance become impossible.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Two ITIL processes that will protect your existence

In my recent blog entry, I talked about the future of the traditional IT organization and the need for sound governance and processes in the implementation of IT solutions, especially if they are leveraged through cloud and outsourced solution suppliers.IT service management (ITSM) and IT infrastructure library (ITIL) have become the dominant approach and best practices for operational excellence in most IT organizations. Yet, I question why so many have implemented only four or five of the 26 defined ITIL 2011 processes given the strength and magnitude of guidance that the ITIL IT service lifecycle provides.To read this article in full or to leave a comment, please click here

IDG Contributor Network: When it comes to cloud, one size does not fit all

While the cloud market is very competitive, enterprises are making it clear that when it comes to cloud, one size does not fit all. They can’t build their businesses by just relying on infrastructure-as-a-serve (IaaS) and committing to one vendor.These sentiments were echoed by Mary Meeker’s annual internet trends report, which found that companies are increasingly concerned about being locked-in with one cloud vendor. Citing data from Bain and Morgan Stanley, it was found that in 2015, 22 percent of organizations surveyed said they had concerns about using only one cloud vendor, compared with only seven percent in 2012.To read this article in full or to leave a comment, please click here

42% off Cable Organizer Electronics Accessories Travel Bag – Deal Alert

Do you have a ball of tangled up wires and adapters somewhere in the bottom of your bag? This Universal Electronics Accessories Travel Organizer provides a flexible organization solution for your electronics and computer accessories. It helps make you better organized with all the small items and gadgets.  Made of durable and weather-resistant nylon with well padded semi-flexible covers.  It's compact size of  8.8“ x W 6.1"allows it to easily stored in you laptop bag or backpack.  This travel organizers typical list price of $18.99 has been reduced 42% to just $10.98. See this deal on Amazon.To read this article in full or to leave a comment, please click here