Archive

Category Archives for "Networking"

Virtual assistants move into DevOps

Companies embracing DevOps practices are turning to chat-based and voice-guided virtual assistants to monitor applications, provision virtual machines and perform other operations. Such tools are instrumental in keeping developers and IT operations staff on the same page as they prioritize speedier software deployment in the digital era."The problems you run into in DevOps is teams are distributed," says Milan Hanson, a Forrester Research analyst who focuses on infrastructure and operations. "You can have the bot automate activities, address it in the chat like it's another person, and it will perform what you've asked it to do and bring the result back into the chat channel where everyone can see it. In a crisis, when people put together a war room or a SWAT team, being able to do that virtually through a chat is a huge advantage."To read this article in full or to leave a comment, please click here

How to create IT innovation

Sixty-four percent of IT leaders say their departments are taking the steps necessary to drive innovation in their business. Are you one of them?To read this article in full or to leave a comment, please click here(Insider Story)

A trove of new Android smartphones to debut at MWC

Several new high-profile Android smartphones are expected to launch this weekend in advance of Mobile World Congress, which opens Monday in Barcelona.Analysts and published reports have said these new Android smartphones will include: the BlackBerry DTEK70 (through a license with TCL); the LG G6; Moto G5 (the Motorola brand is owned by Lenovo); Nokia 8/P1 ( HMD holds the Nokia brand); Sony Xperia X2; the Huawei P10; and at least one model from HTC.To read this article in full or to leave a comment, please click here

AMD’s Ryzen launches March 2, outperforming Intel’s Core i7 at a fraction of the price

Ryzen is here. AMD said Wednesday that it plans a “hard launch” of its first three Ryzen processors on March 2, outperforming Intel’s high-end chips while undercutting its prices by as much as 54 percent. AMD executives confidently unveiled the first three desktop chips to attack Intel’s Core i7, supported by several top-tier motherboard vendors and boutique system builders. In many cases, executives said, AMD will offer more for less. The top-tier Ryzen 7 1800X will cost less than half of what Intel’s thousand-dollar Core i7-6900K chip does—and outperform it, too. You can preorder Ryzen chips and systems from 180 retailers and system integrators today.To read this article in full or to leave a comment, please click here

AMD’s Ryzen launches March 2, outperforming Intel’s Core i7 at a fraction of the price

Ryzen is here. AMD said Wednesday that it plans a “hard launch” of its first three Ryzen processors on March 2, outperforming Intel’s high-end chips while undercutting its prices by as much as 54 percent. AMD executives confidently unveiled the first three desktop chips to attack Intel’s Core i7, supported by several top-tier motherboard vendors and boutique system builders. In many cases, executives said, AMD will offer more for less. The top-tier Ryzen 7 1800X will cost less than half of what Intel’s thousand-dollar Core i7-6900K chip does—and outperform it, too. You can preorder Ryzen chips and systems from 180 retailers and system integrators today.To read this article in full or to leave a comment, please click here

Cisco touts next-gen firewall gear for midsize installations

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.The devices make up a family called the Cisco Firepower 2100 series and are built around dual, multi-core processors. That architecture enables custom processing of traffic requiring threat inspection, and also supports tagging traffic that doesn’t need threat inspection so it flows through only the separate network processing unit.These features combine to provide ample processing power for services such as IPS and also lighten the total load on that processor by diverting traffic that doesn’t require those services, Cisco says.To read this article in full or to leave a comment, please click here

Cisco touts next-gen firewall gear for midsize installations

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.The devices make up a family called the Cisco Firepower 2100 series and are built around dual, multi-core processors. That architecture enables custom processing of traffic requiring threat inspection, and also supports tagging traffic that doesn’t need threat inspection so it flows through only the separate network processing unit.These features combine to provide ample processing power for services such as IPS and also lighten the total load on that processor by diverting traffic that doesn’t require those services, Cisco says.To read this article in full or to leave a comment, please click here

Using CNI with Docker

In our last post we introduced ourselves to CNI (if you haven’t read that yet, I suggest you start there) as we worked through a simple example of connecting a network namespace to a bridge.  CNI managed both the creation of the bridge as well as connecting the namespace to the bridge using a VETH pair.  In this post we’ll explore how to do this same thing but with a container created by Docker.  As you’ll see, the process is largely the same.  Let’s jump right in.

This post assumes that you followed the steps in the first post (Understanding CNI) and have a ‘cni’ directory (~/cni) that contains the CNI binaries.  If you don’t have that – head back to the first post and follow the steps to download the pre-compiled CNI binaries.  It also assumes that you have a default Docker installation.  In my case, Im using Docker version 1.12.  

The first thing we need to do is to create a Docker container.  To do that we’ll run this command…

user@ubuntu-2:~/cni$ sudo docker run --name cnitest --net=none -d jonlangemak/web_server_1
835583cdf382520283c709b5a5ee866b9dccf4861672b95eccbc7b7688109b56
user@ubuntu-2:~/cni$

Notice that when we ran the command we told Docker to use a network of ‘none’. Continue reading

IDG Contributor Network: What is OWASP, and why it matters for AppSec

Modern software development is firmly focused on speed. The race to be first in the market is extremely competitive. To innovate, companies develop at breakneck pace, quickly establishing feedback loops that allow them to hone their software. Security, however, is often an afterthought for stressed developers and the business people pushing them to deliver faster.The importance of application security (AppSec) is widely understood, with 97 percent of respondents to the SANS Institute’s 2016 State of Application Security report revealing they have an AppSec program in place.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What is OWASP, and why it matters for AppSec

Modern software development is firmly focused on speed. The race to be first in the market is extremely competitive. To innovate, companies develop at breakneck pace, quickly establishing feedback loops that allow them to hone their software. Security, however, is often an afterthought for stressed developers and the business people pushing them to deliver faster.The importance of application security (AppSec) is widely understood, with 97 percent of respondents to the SANS Institute’s 2016 State of Application Security report revealing they have an AppSec program in place.To read this article in full or to leave a comment, please click here

Senator to file bill requiring border agents to get a warrant before searching phones

In moments of optimism, I’d like to believe there is still some common ground upon which liberals and conservatives – even supporters of President Trump – can stand with firm resolve. One such patch should be ensuring privacy protections for the digital devices and sensitive personal information of all U.S. citizens when they pass through border checkpoints.Toward that end, U.S. Sen. Ron Wyden, D-Ore., has signaled his intention to file legislation that would require customs and law enforcement agencies to acquire a warrant before compelling access to a U.S. traveler’s electronic device and also prohibit the growing practice of demanding social media identities and passwords. In a letter to John Kelly, director of homeland security, Wyden poses the following questions:To read this article in full or to leave a comment, please click here

Senator to file bill requiring border agents to get a warrant before searching phones

In moments of optimism, I’d like to believe there is still some common ground upon which liberals and conservatives – even supporters of President Trump – can stand with firm resolve. One such patch should be ensuring privacy protections for the digital devices and sensitive personal information of all U.S. citizens when they pass through border checkpoints.Toward that end, U.S. Sen. Ron Wyden, D-Ore., has signaled his intention to file legislation that would require customs and law enforcement agencies to acquire a warrant before compelling access to a U.S. traveler’s electronic device and also prohibit the growing practice of demanding social media identities and passwords. In a letter to John Kelly, director of homeland security, Wyden poses the following questions:To read this article in full or to leave a comment, please click here

10 happiest cities for CIOs

CIOs appear to be a relatively happy bunch, despite the pressures of the job.Robert Half Technology surveyed 2,500 U.S. CIOs in 25 metropolitan areas. As a group, the tech leaders rated their overall job satisfaction at 8.5 in a 10-point scale. Respondents from 10 cities reported above-average happiness, with Miami hosting the most content IT chiefs.The top 10 cities for CIO job satisfaction, according to the tech staffing firm, are:1. Miami2. Boston3. Des Moines, Iowa4. Indianapolis5. Cincinnati6. Minneapolis7. Raleigh, NC8. Salt Lake City9. Dallas10. San FranciscoTo read this article in full or to leave a comment, please click here