Archive

Category Archives for "Networking"

IDG Contributor Network: Networks help you compress time

In his book The Seventh Sense, Joshua Cooper Ramo makes the thought-provoking statement that networks compress time. Nowhere is this more visible than with Amazon. Amazon reportedly releases more than 20,000 new features, capabilities and services to their customers a day, making changes to production every 11 seconds. Facebook does multiple releases a day, and Google does a large package of releases every week or two.To read this article in full or to leave a comment, please click here

Ansible and Junos Notes

I’m working on a project to push out configs to Juniper devices and upgrade them if necessary.  In the first instance I thought about writing it all in Python, but there’s really no need because quite a lot of legwork has already been done for you in the form of ‘PyEz’ and the Junos Ansible core modules.

Juniper give you a few examples to get you started, but don’t really explain what each of the lines in the YAML file does, but I guess they expect you to figure that out.  Below are a few notes on things I discovered – perhaps obvious to some, but they might help someone else.

‘No module named jnpr.junos’ When Running Ansible

In the examples Juniper give, they don’t tell you that the Ansible module ‘Juniper.junos’ relies on a Python module called ‘jnpr.junos’.  (It is mentioned elsewhere if you look for it.)

So if you’ve done an ‘ansible-galaxy install Juniper.junos’ you could be forgiven for thinking that you’ve downloaded the modules you need.  You then gaily go on to have a crack at the example given above, but get this error:

$ ansible-playbook juniper-test.yml

PLAY [Get info] *********************************************************

TASK  Continue reading

Asylum of WikiLeaks’ Assange not in question

The asylum granted to WikiLeaks’ founder Julian Assange by the government of Ecuador is not in question, despite possible differences of opinion between the two on the release of controversial documents by the whistleblowing site.Late Monday, the Ecuadorian government said that in the wake of speculation, it reaffirmed the continuation of asylum that it had extended to Assange for the last four years. It said that the protection would continue as long  as the circumstances that had led to that decision continues.Assange was given asylum by Ecuador in 2012 after he slipped into the country’s embassy in London, where he continues to be holed for fear of arrest by U.K. police, who have said that they have to arrest Assange if he steps out of the embassy to meet an extradition request from Sweden.To read this article in full or to leave a comment, please click here

Asylum of WikiLeaks’ Assange not in question

The asylum granted to WikiLeaks’ founder Julian Assange by the government of Ecuador is not in question, despite possible differences of opinion between the two on the release of controversial documents by the whistleblowing site.Late Monday, the Ecuadorian government said that in the wake of speculation, it reaffirmed the continuation of asylum that it had extended to Assange for the last four years. It said that the protection would continue as long  as the circumstances that had led to that decision continues.Assange was given asylum by Ecuador in 2012 after he slipped into the country’s embassy in London, where he continues to be holed for fear of arrest by U.K. police, who have said that they have to arrest Assange if he steps out of the embassy to meet an extradition request from Sweden.To read this article in full or to leave a comment, please click here

Scripts

This article contains a list of scripts that I created and that are somehow useful for me. You are free to download and modify them according to your needs. I do not take any responsibility for improper use or any damage caused by using them.

1. Networking & Servers

1.1 Automatic Deployment VyOS ISO on VMware VM
A Bash script deploy vyos.sh downloads the latest VyOS ISO image and an Expect script install vyos.exp installs VyOS ISO on VMware vmdk disk.

1.2 Automatic Deployment of DRBL (Clonezilla) Server
The script deploy drbl.sh  installs and configure DRBL server on Ubuntu with a single Ethernet card. You have to provide the name of Ethernet interface as an argument. The script creates a virtual interface for you based on a physical interface. It also downloads a DRBL project public key, download and install drbl package from repository.

1.3 Secure Copy with Rsync from SSH server
The script copy.sh keeps copying files with rsync command while a return value of the rsync command is not zero. Just edit script and set server IP address and bothe remote and local directory.

1.4 Collecting MAC and IP addresses Continue reading

Qualcomm’s 5G preview: high frequencies, 5-gigabit speed

5G networks will be five times as fast as the quickest LTE technology by using the highest cellular frequencies ever, according to Qualcomm, which provided a glimpse of its next-generation modem plans on Tuesday.The X50 modem won’t ship until the first half of 2018, and 5G networks aren’t expected to go commercial until 2020. But Qualcomm will have a lot to say about the new technology at its 4G/5G Summit in Hong Kong on Tuesday. At the same event, it’s announcing plans around its gigabit-speed X16 LTE modem.The X50 will offer download speeds as high as 5Gbps (bits per second), where networks support them, using millimeter-wave frequencies and futuristic techniques for beaming signals to devices, according to slides prepared for the 4G/5G Summit. Qualcomm shared the materials in advance.To read this article in full or to leave a comment, please click here

Connected cameras will get smarter with new Qualcomm chips

While most of IT is consolidating around the cloud, in some ways the internet of things is moving the other direction. Vendors are putting more computing power in devices near the edges of networks, like sensor modules and gateways.That's because it can be faster and less expensive to do filtering and analytics where the data is collected than to send it all the way to a distant data center. In some cases, this can reduce communications costs and help IoT respond to events more quickly.Connected cameras are among the hardest-working IoT devices, sometimes streaming high-definition video around the clock for surveillance and streaming entertainment. They’re the target of chip and software enhancements that Qualcomm is introducing on Tuesday. The company is announcing these offerings along with other advances at its 4G/5G Summit in Hong Kong.To read this article in full or to leave a comment, please click here

IPv6 and the DNS

We often think of the Internet as the web, or even these days as just a set of apps. When we look at the progress with the transition to IPv6 we talk about how these apps are accessible using IPv6 and mark this as progress. But the Internet is more than just these services. There is a whole substructure of support and if we are thinking about an IPv6 Internet then everything needs to change. So here I want to look at perhaps the most critical of these hidden infrastructure elements - the Domain Name System. How are we going with using IPv6 in the DNS?

Principles of Automation

Automation is an increasingly interesting topic in pretty much every technology discipline these days. There’s lots of talk about tooling, practices, skill set evolution, and more - but little conversation about fundamentals. What little is published by those actually practicing automation, usually takes the form of source code or technical whitepapers. While these are obviously valuable, they don’t usually cover some of the fundamental basics that could prove useful to the reader who wishes to perform similar things in their own organization, but may have different technical requirements.

I write this post to cover what I’m calling the “Principles of Automation”. I have pondered this topic for a while and I believe I have three principles that cover just about any form of automation you may consider. These principles have nothing to do with technology disciplines, tools, or programming languages - they are fundamental principles that you can adopt regardless of the implementation.

I hope you enjoy.

It’s a bit of a long post, so TL;DR - automation isn’t magic. It isn’t only for the “elite”. Follow these guidelines and you can realize the same value regardless of your scale.

Factorio

Lately I’ve been obsessed with a game called “Factorio”. Continue reading

Principles of Automation

Automation is an increasingly interesting topic in pretty much every technology discipline these days. There’s lots of talk about tooling, practices, skill set evolution, and more - but little conversation about fundamentals. What little is published by those actually practicing automation, usually takes the form of source code or technical whitepapers. While these are obviously valuable, they don’t usually cover some of the fundamental basics that could prove useful to the reader who wishes to perform similar things in their own organization, but may have different technical requirements.

I write this post to cover what I’m calling the “Principles of Automation”. I have pondered this topic for a while and I believe I have three principles that cover just about any form of automation you may consider. These principles have nothing to do with technology disciplines, tools, or programming languages - they are fundamental principles that you can adopt regardless of the implementation.

I hope you enjoy.

It’s a bit of a long post, so TL;DR - automation isn’t magic. It isn’t only for the “elite”. Follow these guidelines and you can realize the same value regardless of your scale.

Factorio

Lately I’ve been obsessed with a game called “Factorio”. Continue reading

Principles of Automation

Automation is an increasingly interesting topic in pretty much every technology discipline these days. There’s lots of talk about tooling, practices, skill set evolution, and more - but little conversation about fundamentals. What little is published by those actually practicing automation, usually takes the form of source code or technical whitepapers. While these are obviously valuable, they don’t usually cover some of the fundamental basics that could prove useful to the reader who wishes to perform similar things in their own organization, but may have different technical requirements.

Breaches, IT skills & innovation keeping CIOs up at night

To say that CIOs have full plates – from guarding against breaches to cloud migration to embracing innovation – is an understatement. But given the growing recognition of IT’s importance to organizations of all kinds, it’s also a tremendous time to be a CIO despite the complications and demands of the job.These are among the findings of the Society for Information Management’s (SIM) 37th Anniversary IT Trends Study, which is being released to SIM members this week as a lead-in to next week’s annual SIMposium conference that’s taking place in Connecticut. Non-members can get a peek at the study next week.To read this article in full or to leave a comment, please click here

Breaches, IT skills & innovation keeping CIOs up at night

To say that CIOs have full plates – from guarding against breaches to cloud migration to embracing innovation – is an understatement. But given the growing recognition of IT’s importance to organizations of all kinds, it’s also a tremendous time to be a CIO despite the complications and demands of the job.These are among the findings of the Society for Information Management’s (SIM) 37th Anniversary IT Trends Study, which is being released to SIM members this week as a lead-in to next week’s annual SIMposium conference that’s taking place in Connecticut. Non-members can get a peek at the study next week.To read this article in full or to leave a comment, please click here

9% off Nest Cam Indoor Security Camera – Deal Alert

Look after your home 24/7 in crisp 1080p HD. With Nest Cam Indoor, you can check in, even when you’re out, and even at night with its built-in high-quality night vision. Nest Cam features a versatile magnetic stand that lets you put it anywhere. See who’s there, listen in and speak up to get their attention. With Nest Aware, you can get a special alert if Nest Cam sees a person, and save 10 or 30 days of continuous video history in the cloud. Then speed through it in seconds and quickly find the moment you’re looking for in Sightline. Nest's indoor camera is a best-seller on Amazon with 4 out of 5 stars from over 4,000 people (read reviews). Its typical list price of $199 has been reduced 9% to $182.00 on Amazon. Amazon also features a bundle of three cameras that will deepen the discount even further. Right now it's just $454.97 for the pack of three.To read this article in full or to leave a comment, please click here

9% off Nest Cam Indoor Security Camera – Deal Alert

Look after your home 24/7 in crisp 1080p HD. With Nest Cam Indoor, you can check in, even when you’re out, and even at night with its built-in high-quality night vision. Nest Cam features a versatile magnetic stand that lets you put it anywhere. See who’s there, listen in and speak up to get their attention. With Nest Aware, you can get a special alert if Nest Cam sees a person, and save 10 or 30 days of continuous video history in the cloud. Then speed through it in seconds and quickly find the moment you’re looking for in Sightline. Nest's indoor camera is a best-seller on Amazon with 4 out of 5 stars from over 4,000 people (read reviews). Its typical list price of $199 has been reduced 9% to $182.00 on Amazon. Amazon also features a bundle of three cameras that will deepen the discount even further. Right now it's just $454.97 for the pack of three.To read this article in full or to leave a comment, please click here

Air Force gets space telescope that can see space objects like no ground-based system before it

The DARPA-developed Space Surveillance Telescope (SST) will this week get a new permanent home in Australia with the Air Force Space Command where it promises to rapidly bolster the nation’s ability to more quickly spot and track faint objects in space. The Air Force, says the SST features unique image-capturing technology known as a curved charge coupled device (CCD) system,  as well as very wide field-of-view, large-aperture optics, and doesn't require the long optics train of a more traditional telescopes. The design makes the SST less cumbersome on its moveable mount, letting it survey the sky rapidly, the Air Force says. The telescope's mount uses advanced servo-control technology, making the SST one of the most agile telescopes of its size ever built.To read this article in full or to leave a comment, please click here

Air Force gets space telescope that can see space objects like no ground-based system before it

The DARPA-developed Space Surveillance Telescope (SST) will this week get a new permanent home in Australia with the Air Force Space Command where it promises to rapidly bolster the nation’s ability to more quickly spot and track faint objects in space. The Air Force, says the SST features unique image-capturing technology known as a curved charge coupled device (CCD) system,  as well as very wide field-of-view, large-aperture optics, and doesn't require the long optics train of a more traditional telescopes. The design makes the SST less cumbersome on its moveable mount, letting it survey the sky rapidly, the Air Force says. The telescope's mount uses advanced servo-control technology, making the SST one of the most agile telescopes of its size ever built.To read this article in full or to leave a comment, please click here

To unlock phones, feds demand all occupants surrender fingerprints

U.S. investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence comply by surrendering their fingerprints.In May, the federal prosecutors made the request as part of a search warrant, according to a court filing uncovered by Forbes. Those fingerprints were crucial to unlocking the smartphones, the Department of Justice argued.However, the federal investigators went beyond asking for the fingerprints of one suspect. Instead, they the sought authority to "depress the fingerprints" of everyone located at the California property.To read this article in full or to leave a comment, please click here

To unlock phones, feds demand all occupants surrender fingerprints

U.S. investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence comply by surrendering their fingerprints.In May, the federal prosecutors made the request as part of a search warrant, according to a court filing uncovered by Forbes. Those fingerprints were crucial to unlocking the smartphones, the Department of Justice argued.However, the federal investigators went beyond asking for the fingerprints of one suspect. Instead, they the sought authority to "depress the fingerprints" of everyone located at the California property.To read this article in full or to leave a comment, please click here