Archive

Category Archives for "Networking"

Device Configurations Are Not a Good Source of Truth

One of my subscribers sent me this question after watching the second part of Network Automation Tools webinar (or maybe it was Elisa Jasinska's presentation in the Data Center course):

Elisa mentions that for a given piece of data, there should be “one source of truth”. It gets a bit muddled when you have an IPAM tool and Git source control simultaneously. It is not hard to imagine scenarios where these get out of sync especially if you consider multi-operator scenarios.

Confused? He provided a simple scenario:

Read more ...

Privacy legislation reintroduced for mail older than 180 days

A bill has been reintroduced in the U.S. House of Representatives that would require that law enforcement agencies get a warrant before they poke around users’ emails and other communications in the cloud that are older than 180 days.The Email Privacy Act, reintroduced on Monday, aims to fix a loophole in the Electronic Communications Privacy Act that allowed the government to search without warrant email and other electronic communications older than 180 days, stored on servers of third-party service providers such as Google and Yahoo.“Thanks to the wording in a more than 30-year-old law, the papers in your desk are better protected than the emails in your inbox,” digital rights organization, Electronic Frontier Foundation said in a blog post Monday.To read this article in full or to leave a comment, please click here

Privacy legislation reintroduced for mail older than 180 days

A bill has been reintroduced in the U.S. House of Representatives that would require that law enforcement agencies get a warrant before they poke around users’ emails and other communications in the cloud that are older than 180 days. The Email Privacy Act, reintroduced on Monday, aims to fix a loophole in the Electronic Communications Privacy Act that allows the government to search without warrant email and other electronic communications older than 180 days, stored on servers of third-party service providers such as Google and Yahoo. “Thanks to the wording in a more than 30-year-old law, the papers in your desk are better protected than the emails in your inbox,” digital rights organization, Electronic Frontier Foundation said in a blog post Monday.To read this article in full or to leave a comment, please click here

Watch Steve Jobs unveil the iPhone and change the world

10 years ago today, Steve Jobs delivered one of the most masterful product introductions in history when he unveiled the iPhone. Though the idea that Apple was working on a phone had been making its way through the rumor mill over the preceding few months, what the iPhone actually delivered to the table surpassed even the most optimistic of expectations.With a multitouch display and intuitive access to the entire web via mobile Safari, the iPhone instantly changed the way people used their smartphones. And that's not to say nothing of the App Store which went live in July of 2008 and quickly turned the smartphone industry on its head.Apple earlier today, naturally, celebrated 10 years of the iPhone with a special splash page on its website.To read this article in full or to leave a comment, please click here

Stock-tanking in St. Jude Medical security disclosure might have legs

For better or worse, a security firm’s attempt to cash in on software bugs -- by shorting a company’s stock and then publicizing the flaws -- might have pioneered a new approach to vulnerability disclosure.Last August, security company MedSec revealed it had found flaws in pacemakers and other healthcare products from St. Jude Medical, potentially putting patients at risk.However, the controversy came over how MedSec sought to cash in on those bugs: it did so, by partnering with an investment firm to bet against St. Jude’s stock. Since then, the two parties have been locked in a legal battle over the suspected vulnerabilities. But on Monday, MedSec claimed some vindication.To read this article in full or to leave a comment, please click here

Stock-tanking in St. Jude Medical security disclosure might have legs

For better or worse, a security firm’s attempt to cash in on software bugs -- by shorting a company’s stock and then publicizing the flaws -- might have pioneered a new approach to vulnerability disclosure.Last August, security company MedSec revealed it had found flaws in pacemakers and other healthcare products from St. Jude Medical, potentially putting patients at risk.However, the controversy came over how MedSec sought to cash in on those bugs: it did so, by partnering with an investment firm to bet against St. Jude’s stock. Since then, the two parties have been locked in a legal battle over the suspected vulnerabilities. But on Monday, MedSec claimed some vindication.To read this article in full or to leave a comment, please click here

CyberPowerPC’s Oculus-ready system costs $499 — if you buy a Rift

CyberPowerPC's $499.99 Gamer Ultra VR is the first desktop ready for the Oculus Rift headset that is priced under $500, but there's a caveat.You'll need to buy it with the Oculus Rift headset, which costs more than the PC at $599.99.The bundle will put you back $1,099.98, but that's still a good deal for an Oculus Rift plus desktop, which could otherwise get pretty expensive.The Gamer Ultra VR desktop is available on Best Buy and will also be sold by Amazon. The standalone price for the desktop without the headset is $649.99 on both Best Buy and Amazon.To read this article in full or to leave a comment, please click here

Big Changes in 2017

This past June when I was in North Carolina at Cisco's CPOC lab, I learned that there was a chance-albeit a slim one, but a chance nonetheless-that a position would be opening up on the CPOC team in the fall. By that point I had been to CPOC three times and knew many of the engineers who worked there. I spoke to them to get their feedback, met with the newly-hired manager of the team, and just generally did all the things I thought I should be doing to take advantage of my time being face to face with these folks.

iPhone after 10 years: Google overwhelms the iPhone like Microsoft overwhelmed the Mac

In 1991, Harvard Business Review article Computerless Computer Company by Andy Rappaport and Shmuel Halevi explained how Microsoft’s PCs overwhelmed Apple’s Macs. Most of the article’s wisdom would hold true today if applied to Google and Android’s domination of the iPhone.Since Steve Jobs orchestrated Apple’s turnaround in the late 1990s, Apple has recovered from the near-death experience when when Jobs returned and Microsoft loaned Apple $150 million. Apple is now one of the world’s richest companies in the world and is no longer in what the authors called a battle for long-term survival when they asked the question:To read this article in full or to leave a comment, please click here

54% off Quicken Deluxe 2017 Personal Finance & Budgeting Software, Disk or Download – Deal Alert

Take control of your finances with Quicken's finance and budgeting software, updated for 2017. Quicken imports your bank transactions safely and automatically, even from loan, investment & retirement accounts. It categorizes your transactions and puts them in one place. Use it to create a plan to pay off your debt or save for college, a down payment or retirement. Quicken has been discounted 54% from its typical list price of $75, so you can buy it on Amazon right now for just $34.56. This software is for the PC disk or software download. Quicken has personal finance & budgeting software for the Mac currently discounted 40% right here.To read this article in full or to leave a comment, please click here

A Postscript to the Leap Second

The inexorable progress of time clocked past the New Year and at 23:59:60 on the 31st December 2016 UTC the leap second claimed another victim. This time Cloudflare described how the Leap Second caused some DNS failures in Cloudflare’s infrastructure. What's going on here? It should not have been a surprise, yet we still see failing systems.

After Two Years, Do I Find Self-Employment Worthwhile?

In March 2015, I started working for myself exclusively. That is to say, I went from working for someone else full-time while also operating my own company full-time to working strictly for my own company. How am I feeling after nearly two years of self-employment?

Fulfillment

Working for myself has proven to be fulfilling. I like the correlations to be found among opportunity, effort, risk, reward, and failure. I can weigh all of those things, make a decision of how to proceed, and benefit (or suffer) directly in accordance with my decisions. That is fulfilling to me.

Suffering, by the way, isn’t a bad thing. We could all stand to do a bit more of it today, so that we do a bit less of it tomorrow.

Process

I am free of silly processes that cripple my ability to get things done, not that I believe process is inherently bad. With my own company, I still have to define processes, but I can keep them both streamlined and fluid. I’m also free to let the people that work with me define their own processes, with me providing only the input required to achieve the desired result.

Balance

When working for other employers as an IT professional, Continue reading

Response: Proposed server purchase for GitLab.com | GitLab

Gitlab is talking about heading into the private cloud after successfully building a cloud-ready application. The savings are substantial for a small, technology-rich company:

The cloud hosting for GitLab.com excluding GitLab CI is currently costing us about $200k per month. The capital needed for going to metal would be less than we pay for 1 quarter of hosting. The hosting facility costs look to be less than $10k per month. If you spread the capital costs over 2.5 years (10 quarters) it is 10x cheaper to host your own. (My emphasis)

This sounds about right but I don’t think this factors in head count for operating the physical infrastructure. Lets say that two extra FTEs at $15K per month are required, this still one third the cost of AWS. The reaility is $2.4MM is a substantial yearly budget for IT Infrastructure and for an application that already cloud-ready it would go a very long way

For a small company that is focussed on technology adding more headcount is good for capacity. In a team of ten people, adding 2 headcount increases diversity of thinking, ideas and approaches and can be important to spreading out the workload e. Continue reading

Iran Leaks Censorship via BGP Hijacks

Iran_map_new

Last week, we reported via Twitter that the Iranian state telecom TIC hijacked address space containing a number of pornographic websites.  The relevant BGP announcement was likely intended to stay within the borders of Iran, but had leaked out of the country in a manner reminiscent of Pakistan’s block of Youtube via BGP hijack in 2008.  Over the weekend, TIC performed BGP hijacks of additional IP address space hosting adult content as well as IP addresses associated with Apple’s iTunes service.

In addition, in 2015 on this blog we reported that a new DNS root server instance in Tehran was being leaked outside Iran, a situation that was quickly rectified at that time.  Despite the fact that the Tehran K-root is intended to only be accessible within Iran, as we will see below, it is currently being accessed by one of the largest US telecommunications companies.

Iranian BGP-based Censorship

Last week, Iranian state telecom announced a BGP hijack of address space (99.192.226.0/24) hosting numerous pornographic websites.  Continue reading

Microsoft is retiring the Blue Screen of Death for some users

Windows 10 beta testers who are used to the warm, familiar glow of Microsoft’s Blue Screen of Death will start learning it’s not easy being green.Microsoft is tweaking its venerable error message that lets people know that something went wrong, and their computers need to be restarted. While everyday consumers will still see the same old BSOD that we love to hate, people who are using beta builds released as part of the Windows 10 Insider Program will now see a Green Screen of Death.The change is designed to help distinguish between crashes in the generally available branch of Windows 10 and the beta branch. Microsoft lets people know that they use Insider builds at their own risk, and the betas can contain bugs that crash programs or entire devices.To read this article in full or to leave a comment, please click here

Dell: Mainstream laptops with wireless charging are still years away

Back in 2014, Intel declared it wanted laptops to be free of wires, and a centerpiece of that plan was wireless charging. But the technology has been slow to mature, and it may be years before it takes off.At CES last week, Dell showed a wireless charging PC called the Latitude 7285, a 2-in-1 with a detachable screen attached to a keyboard base. It's the first wireless charging laptop based on the AirFuel Alliance's emerging wireless PC charging standard.But Dell doesn't have widespread plans to put wireless charging in a host of new devices. That's partly because the technology, with slow charging speeds, is limited to low-power devices and isn't mature enough to replace wired charging. The wireless charging Latitude 7285 has a low-power Intel Kaby Lake chip that draws just 4.5 watts of power.To read this article in full or to leave a comment, please click here

Alibaba could generate 1 million new US jobs, Ma tells Trump

The billionaire head of China's biggest e-commerce retailer met with President-elect Donald Trump on Monday to promote his site by dangling the possibility of a million new U.S. jobs.Jack Ma met Trump in New York and the two talked U.S.-China trade and specifically small business. Ma promoted Alibaba as a platform through which U.S. small businesses could sell products to consumers in China and Southeast Asia.By doing that, up to a million new jobs could be created at a million small businesses, Alibaba said. Alibaba didn't commit to hiring new staff in the U.S. itself."We mainly talked about small business, and young people and selling American agricultural products to China," said Ma.To read this article in full or to leave a comment, please click here