Archive

Category Archives for "Networking"

Apple database acquisition could help improve performance of its services

Apple has reportedly acquired database company FoundationDB, a move that would allow the company to improve the underpinnings of its existing services and also lay the groundwork for an Internet of Things (IoT) expansion.Asked to confirm the deal, first reported by TechCrunch, Apple responded by saying that it from time to time buys smaller companies but doesn’t discuss its plans. On its part, FoundationDB said that it will no longer offer downloads of its database, and that “we have made the decision to evolve our company mission.”Apple could use FoundationDB’s technology to improve the performance of its own infrastructure. The reported acquisition comes just a couple of months after FoundationDB announced a major upgrade of its flagship NoSQL database. The database was redesigned to handle millions of random writes per second and make it a better fit for IoT systems.To read this article in full or to leave a comment, please click here

MX with enhanced SCB2 – cards not coming online

We just installed an MX in the lab for a customer type-approval test (TAT) and none of the cards came online. 

The output of “show chassis hardware” showed that there were FPCs installed, but not the MICs that were in them:

[email protected]> show chassis hardware
Hardware inventory:
Item             Version  Part number  Serial number     Description
Chassis                                JN1249BDBAFA      MX960
Midplane         REV 04   750-047849   ACRD2400          Enhanced MX960 Backplane
FPM Board        REV 03   710-014974   CADE9287          Front Panel Display
PDM              Rev 03   740-013110   QCS181650BM       Power Distribution Module
PEM 0            Rev 11   740-027760   QCS1806N0MP       PS 4.1kW; 200-240V AC in
PEM 1            Rev 11   740-027760   QCS1806N0SK       PS 4.1kW; 200-240V AC in
PEM 2            Rev 11   740-027760   QCS1806N07S       PS 4.1kW; 200-240V AC in
PEM 3            Rev 11   740-027760   QCS1812N02D       PS 4.1kW; 200-240V AC in
Routing Engine 0 REV 01   740-051822   9013061577        RE-S-1800x4
Routing Engine 1 REV 01   740-051822   9013056762        RE-S-1800x4
CB 0             REV 01   750-055976   CACX9090          Enhanced MX SCB 2
CB 1             REV 01   750-055976   CACZ4497          Enhanced MX SCB 2
CB 2             REV 01   750-055976   CADA1721          Enhanced MX SCB 2
FPC 0            REV 05   750-044444   CAAM5562          MPCE Type 2 3D P
  CPU
FPC 1            REV 35   750-028467   CAAP9738          MPC 3D 16x  Continue reading

Zero day, Web browser vulnerabilities spike in 2014

The number of zero-day and Web browser vulnerabilities shot up in 2014, but overall software vendors are patching faster.The data comes from Secunia, a Danish security vendor that releases an annual study of trends in software vulnerabilities, which are used by hackers to compromise computers.Zero-day vulnerabilities—which are software flaws actively being used by attackers when publicly disclosed—rose from 14 in 2013 to 25 last year. Those type of flaws are among the most dangerous and prized by attackers since patches aren’t available from vendors.Flaws in Web browser software increased to 1,035 in 2014, up from 728 the prior year, according to Secunia’s report.To read this article in full or to leave a comment, please click here

Availability Zones in Overlay Virtual Networks

Amazon Web Services was (AFAIK) one of the first products that introduced availability zones – islands of infrastructure that are isolated enough from each other to stop the propagation of failure or outage across their boundaries.

Not surprisingly, multiple availability zones shouldn’t rely on a central controller (as Amazon found out a few years back), and there are only few SDN controller vendors that are flexible enough to meet this requirement. For more details, watch the free Availability Zones video on my web site (part of Scaling Overlay Virtual Networking webinar).

The Upload: Your tech news briefing for Wednesday, March 25

Google wants to let you pay bills inside GmailGoogle has a project in the works to let Gmail users not only receive bills but pay them from within the mail service, re/code reports. The news site viewed details of the project, called Pony Express, and said it is scheduled to start in the fourth quarter.Microsoft packages Azure for Web and mobile developersMicrosoft brought out an integrated set of Azure-based services on Tuesday that are meant to ease the process of developing applications that run in the cloud. The new Azure App Service could help organizations build Web applications or mobile applications that connect to a variety of data sources that reside in the cloud or in internal IT systems.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Wednesday, March 25

Google wants to let you pay bills inside GmailGoogle has a project in the works to let Gmail users not only receive bills but pay them from within the mail service, re/code reports. The news site viewed details of the project, called Pony Express, and said it is scheduled to start in the fourth quarter.Microsoft packages Azure for Web and mobile developersMicrosoft brought out an integrated set of Azure-based services on Tuesday that are meant to ease the process of developing applications that run in the cloud. The new Azure App Service could help organizations build Web applications or mobile applications that connect to a variety of data sources that reside in the cloud or in internal IT systems.To read this article in full or to leave a comment, please click here

9 compelling reasons to keep your old PC instead of upgrading

The grass isn't always greenerFew can withstand the siren song of the latest and greatest gear, the deep allure of a new and shiny gadget—but that doesn’t mean that tossing your old computer in the trash and picking up a fresh PC is necessarily a smart idea.While gamers and hardcore video editors always stand to gain extra performance out of fresh firepower, more casual users might be better off saving their cash and sticking with the PC you already own. Here’s why.To read this article in full or to leave a comment, please click here

Review: 7 excellent mobile app builders

Over the last six months, I’ve been examining and testing a variety of mobile app builders and mobile back ends. In some cases, the app builders and back ends were part of a single product. In other cases, the app builders or back ends stood on their own.In this roundup, I’ll summarize seven products that are at least partially a mobile app builder. Some have IDEs that run locally on your computer; others give you a Web IDE that lives in the cloud. Some are aimed at enterprise development, others at individual developers or even students.To read this article in full or to leave a comment, please click here

Various SSL errors while using VMware Web Client or vClient

Many errors can occur while using a misconfigured client. Below you can find the errors I found. Opening console from Web Client   SSL verification failure for "vcenter1.example.com" due to a host thumbprint mismatch: stored thumbprint "8d:29:ae:69:87:e5:cc:a0:ff:01:51:25:84:8a:b4:d3:b5:a3:55:33" does not match certificate thumbprint "5B:E9:36:23:44:F0:4D:E5:6A:F3:7E:BC:4F:FE:9D:0D:93:64:03:E0". Opening console from vClient Unable to connect to the MKS: Login (username/password) incorrect. […]

Kubernetes – Notable changes since my first build

During my latest Kubernetes lab rebuild, I noticed some significant differences in the some functions of Kubernetes cluster.  I’ve done my best to go back and update the previous blog posts with notes and pointers to make this clear.  However – going forward please consider my GitHub Salt repo as the ‘source of truth’ for the Kubernetes configuration files and current build process.   I’ll be updating that regularly as I continue to optimize the Salt config and add onto the Kubernetes configuration.  A couple of big hitters I want to call out as differences between my initial build and this one…

cAdvisor is now part of kubelet
That’s right!  We no longer need to have a separate manifest and container for cAdvisor.  We can see that any host running the kubelet process is exposing port 4194…

image 
And sure enough…

image

kube-proxy and kubelet no longer use etcd
In my first build, both the kubelet and kube-proxy service relied on talking directly to etcd to interact with the cluster.  The associated configs looked like…

image 
The newest systemd service configuration looks like this…

image

So what’s happened here is the cluster communication has moved to Continue reading

How to update a GitHub pull request (PR)

So what happens when you submit a PR, but then you want to change it?  After reviewing my proposed changes from my last post, it was decided that I should take a different approach.  The changes I needed to make weren’t substantial, and were in the same spirit as the initial PR, so I decided that updating made more sense then starting over.  All you have to do is update the code and push another commit to the branch.  Let’s assume we’ve made the changes we want to our code again.  Let’s verify that Git sees these updates…

image 
Yep – Looks good so far.  Now we need to add these files to the commit just like last time…

git add .

image 
So now the files are ready to be committed, let’s go ahead and make a commit…

git commit -m "Updated the ENV variables and the way they are set"

image 
Perfect – So now let’s check and see if our remote (GitHub) is still defined…

image 
All looking good – So now all we need to do is push the commit…

git push -u origin fluentd-elasticsearch-kibanafix

image

Let’s go check out our PR Continue reading

Android flaw puts personal data at risk for millions

Nearly half of Android devices are vulnerable to an attack that could replace a legitimate app with malicious software that can collect sensitive data from a phone.Google, Samsung and Amazon have released patches for their devices, but 49.5 percent of Android users are still vulnerable, according to Palo Alto Networks, which discovered the problem. Google said it has not detected attempts to exploit the flaw.A malicious application installed using the vulnerability, called “Android Installer Hijacking,” would have full access to a device, including data such as usernames and passwords, wrote Zhi Xu, a senior staff engineer with Palo Alto.To read this article in full or to leave a comment, please click here

Stanford breakthrough could make better chips cheaper

Researchers at Stanford University have come up with a new way to make chips and solar panels using gallium arsenide, a semiconductor that beats silicon in several important areas but is typically too expensive for widespread use.For several decades, silicon has been the go-to semiconductor for electronics. It’s abundant and cheap, and manufacturing processes are well understood, but it’s not always the best choice.Electrons move faster through gallium arsenide than through silicon, which makes it better suited for chips handling data at very high speeds or high-frequency radio signals. Solar panels based on gallium arsenide are more efficient than silicon panels at converting light to electricity.To read this article in full or to leave a comment, please click here

Google said to prep billing payment service for Gmail

Google reportedly is creating a service to let people pay their bills from their Gmail accounts.The service, currently dubbed Pony Express, would ask users to provide personal information, including credit card and Social Security numbers, to a third-party company that would verify their identity, according to a Re/code report on Tuesday.Google also would work with vendors that distribute bills on behalf of service providers like insurance companies, telecom carriers and utilities, according to the article, which was based on a document seen by Re/code that describes the service.To read this article in full or to leave a comment, please click here

Hutchison to buy U.K. carrier O2 for up to US$15 billion

Hutchison Whampoa has agreed to acquire U.K. mobile operator O2 for a price that could top US$15 billion, giving a company that already owns one major carrier an even bigger share of the British market.The deal, which has been in the works at least since January, continues a trend of consolidation among European service providers. Hutchison already owns Three, one of the U.K.’s biggest carriers. Together, Three and O2 would form the country’s number one mobile operator by subscribers, according to news reports.To read this article in full or to leave a comment, please click here

Hutchison to buy U.K. carrier O2 for up to US$15 billion

Hutchison Whampoa has agreed to acquire U.K. mobile operator O2 for a price that could top US$15 billion, giving a company that already owns one major carrier an even bigger share of the British market.The deal, which has been in the works at least since January, continues a trend of consolidation among European service providers. Hutchison already owns Three, one of the U.K.’s biggest carriers. Together, Three and O2 would form the country’s number one mobile operator by subscribers, according to news reports.To read this article in full or to leave a comment, please click here

Hutchison to buy U.K. carrier O2 for up to US$15 billion

Hutchison Whampoa has agreed to acquire U.K. mobile operator O2 for a price that could top US$15 billion, giving a company that already owns one major carrier an even bigger share of the British market.The deal, which has been in the works at least since January, continues a trend of consolidation among European service providers. Hutchison already owns Three, one of the U.K.’s biggest carriers. Together, Three and O2 would form the country’s number one mobile operator by subscribers, according to news reports.To read this article in full or to leave a comment, please click here

Network World: 2015 State of the Network survey

The transformation of Network IT into a collaborative and agile team that is positioned to respond to rapid changes in technology is underway, according to Network World’s 2015 State of the Network survey. And IT decision-makers are optimistic that adopting advanced networking technologies will have a positive impact on IT operations.To read this article in full or to leave a comment, please click here(Insider Story)

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers’ products.A security researcher discovered the flaw in November and reported it to the PC manufacturer, which patched it in January. However, it’s not clear if the fix closed all avenues for abuse.The application, called Dell System Detect, is offered for download when users click the “Detect Product” button on Dell’s support site for the first time. It is meant to help the website automatically detect the user’s product—more specifically its Service Tag—so that it can offer the corresponding drivers and resources.Last year, a security researcher named Tom Forbes reverse engineered the program to see how it communicated with the Dell website. He found that the application installs a Web server on the local machine that listens on port 8884. The Dell site then uses JavaScript to send requests to the local server through the user’s browser.To read this article in full or to leave a comment, please click here