Archive

Category Archives for "Networking"

FAQ: The real impact of Trump’s H-1B executive order

President Donald Trump is calling for "a long-overdue reform of H-1B visas." But what changes does he want, and can he get Congress to agree?Here's a look at some some of the key questions around Trump's visa reform effort and his "Hire American, Buy American" executive order.What's the most important thing that Trump wants to accomplish?In issuing his executive order, Trump called the "totally random" H-1B lottery "wrong." He wants the visas distributed to "the most-skilled and highest-paid" applicants. He wants to end "abuse."To read this article in full or to leave a comment, please click here

12 free utilities that can give you more control over your PC

Tweak Windows to your willImage by Bet Noire / iStockThere are some very good reasons why you might want to peer behind the scenes of your Windows PC. Maybe you want to tweak your system to maximize performance, or maybe you just want to know what your computer is doing underneath those slick desktop graphics. Either way, here are 12 free programs you can use to fully monitor and manage your Windows experience.To read this article in full or to leave a comment, please click here

Top IT hiring trends for recent grads

TEKsystems, a provider of IT staffing services, released the results of a survey highlighting the best IT jobs and key hiring trends for recent graduates. The survey asked more than 250 IT hiring managers across the U.S. what they're looking for in entry-level IT candidates and what the best opportunities are for graduates.To read this article in full or to leave a comment, please click here(Insider Story)

Why you need a systems reliability engineer

How can you ensure that the software and services you build today can deliver what your customers and consumers need in the future? If this is a question you think your organization should be asking, then you might need a systems reliability engineer (SRE). SREs are software engineers who focus on the reliability and uptime of applications and services not just in the short-term, but with a focus on scalability and long-term use.Sometimes referred to as "site reliability engineer," or "services reliability engineer," this engineering role is one that's finding its footing as DevOps practices take hold in IT departments, says Jason Hand, DevOps evangelist and incident and alerting specialist with VictorOps. The roles are most prevalent in cloud services, SaaS, PaaS and Iaas companies whose clients rely on them to keep those services available 24/7/365, he says. For organizations that rely on uptime, availability and reliability, an SRE is a logical talent add, as every minute of downtime chips away at the bottom line, Hand says.To read this article in full or to leave a comment, please click here

Episode 2 – Choosing A Routing Protocol

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another.  Is there any difference between IGP routing protocols at this point?  When does it make sense to run BGP in an enterprise network?  Is IS-IS an old and decaying protocol, or something you should viably consider?  Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Russ White
Guest
Kevin Myers
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 2 – Choosing A Routing Protocol appeared first on Network Collective.

Episode 2 – Choosing A Routing Protocol

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another.  Is there any difference between IGP routing protocols at this point?  When does it make sense to run BGP in an enterprise network?  Is IS-IS an old and decaying protocol, or something you should viably consider?  Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Russ White
Guest
Kevin Myers
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 2 – Choosing A Routing Protocol appeared first on Network Collective.

9 tips to turn your data center green

Going greenImage by ThinkstockData center providers know all too well that it’s not easy being green. According to a 2016 report by the Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab), data centers are responsible for close to 2 percent of U.S. energy consumption. Ensuring the integrity of these systems is a major challenge for data centers looking to create sustainable operations for their facilities and the companies who rely on them, but some simple steps can make all the difference.To read this article in full or to leave a comment, please click here

9 tips to turn your data center green

Going greenImage by ThinkstockData center providers know all too well that it’s not easy being green. According to a 2016 report by the Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab), data centers are responsible for close to 2 percent of U.S. energy consumption. Ensuring the integrity of these systems is a major challenge for data centers looking to create sustainable operations for their facilities and the companies who rely on them, but some simple steps can make all the difference.To read this article in full or to leave a comment, please click here

Stand for Leadership: The choice is yours

The world of today mostly buzzes with social media and hashtags. For a youth it’s a complicated dynamic world of Internet with tons and tons of messages and notifications that pop up every other minute, and where no Internet means no life. 

As a journalist, blogger, activist and a consultant, the Internet made me who I am and still I am exploring the possibilities of my virtue. Nothing was easy but the point is standing for change. 

I realized the power of Internet when I published a story in one of the citizen journalism sites, Ground Report, and it was picked up by Access Now and they launched an international campaign “Nepal Shutdown Showdown”.  

Shreedeep Rayamajhi

Tencent adding five data centers to target cloud users outside China

Tencent Holdings has opened a data center in Silicon Valley on Tuesday, with four more planned outside China as part of its bid to grow its cloud business outside the country.The proposed data centers in Frankfurt, Mumbai, Seoul and Moscow are targeted at Chinese companies looking to expand overseas and international companies expanding their businesses in China or other parts of the world, the Chinese internet giant said Tuesday. The centers are expected to go into operation this year.Rival Alibaba has also set up data centers outside China to expand its cloud business outside the country.The new investment aims to meet growing demand worldwide for the company's cloud services from online games and finance, video and other internet-related industries.To read this article in full or to leave a comment, please click here

Tencent adding five data centers to target cloud users outside China

Tencent Holdings has opened a data center in Silicon Valley on Tuesday, with four more planned outside China as part of its bid to grow its cloud business outside the country.The proposed data centers in Frankfurt, Mumbai, Seoul and Moscow are targeted at Chinese companies looking to expand overseas and international companies expanding their businesses in China or other parts of the world, the Chinese internet giant said Tuesday. The centers are expected to go into operation this year.Rival Alibaba has also set up data centers outside China to expand its cloud business outside the country.The new investment aims to meet growing demand worldwide for the company's cloud services from online games and finance, video and other internet-related industries.To read this article in full or to leave a comment, please click here

Kubernetes networking 101 – (Basic) External access into the cluster

In our last post we talked about an important Kubernetes networking construct – the service.  Services provide a means for pods running within the cluster to find other pods and also provide rudimentary load balancing capabilities.  We saw that services can create DNS entries within Kube-DNS which makes the service accessible by name as well.  So now that we know how you can use services to access pods within the cluster it seems prudent to talk about how things outside of the cluster can access these same services.  It might make sense to use the same service construct to provide this functionality, but recall that the services are assigned IP addresses that are only known to the cluster.  In reality, the service CIDR isnt actually routed anywhere but the Kubernetes nodes know how to interact with service IPs because of the netfilter rules programmed by the kube-proxy.  The service network just needs to be unique so that the containers running in the pod will follow their default route out to the host where the netfilter rules will come into play.  So really the service network is sort of non-existent from a routing perspective as it’s only locally significant to each host. Continue reading

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by stealing access tokens too. It's sneaky hack that's particularly worrisome, because it can circumvent Google's 2-step verification, according to security firm Trend Micro. The group, known as Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by stealing access tokens too. It's sneaky hack that's particularly worrisome, because it can circumvent Google's 2-step verification, according to security firm Trend Micro. The group, known as Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here

Palantir to pay $1.7 million to settle racial hiring bias claim

Data analytics company Palantir will pay US$1.7 million in back pay and stock options to settle charges that it routinely discriminated against Asian job applicants. In addition, it must also hire eight people from among those it allegedly discriminated against.The charges go back to September last year, when the Department of Labor accused Palantir of rejecting Asian software engineers for jobs even though they were as qualified as white applicants. Palantir also maintained a discriminatory employee referral system, the Labor Dept. alleged.Tuesday's deal ends a threat to Palantir's government contracting business. Under federal law, companies that work for the government are obliged to ensure their hiring practices and policies are free of all forms of discrimination.To read this article in full or to leave a comment, please click here

Old Windows Server machines can still fend off hacks. Here’s how

If you're running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.That's due to the internet release earlier this month of a batch of updates that paint a bulls-eye on computers running Windows Server 2003, according to security researchers.“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.To read this article in full or to leave a comment, please click here

Old Windows Server machines can still fend off hacks. Here’s how

If you're running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.That's due to the internet release earlier this month of a batch of updates that paint a bulls-eye on computers running Windows Server 2003, according to security researchers.“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.To read this article in full or to leave a comment, please click here