I often hear people expressing their of helplessness in the face of pervasive corporate surveillance. "They've already got all my data, what can I do anyway ?" When I was twenty five, my career was centred on maintaining Novell and Windows networks, my life aspirations were to own my car and a house. My social […]
The post Not Giving Up on Data Surveillance appeared first on EtherealMind.
A long while ago I decided to write an article explaining how you could run VMware NSX on ESXi servers with redundant connections to two top-of-rack switches on top of a layer-3-only fabric (a fabric with IP subnets and VLANs limited to a single top-of-rack switch). Turns out that’s Mission Impossible, so I put the article on the back burner and slowly forgot about it.
Well, not exactly. Every now and then my subconsciousness would kick it up and I’d figure out yet-another reason why it’s REALLY hard to do it right. After a while, I decided to try again, and completely rewrote the article. The first part is already online, more details coming (hopefully) soon.
XML, or Extensible Markup Language, rounds out the usual suspects of YAML, JSON, and XML. It’s probably my least favorite of the three, but knowledge of XML is needed when working with code.
XML is, of course, related to HTML. So why didn’t we just settle for HTML? Turns out machines don’t understand HTML very well. They can parse it perfectly fine, yes, but in HTML you put information in, such an address, and you understand it’s an address because you are a human. A machine doesn’t know that Baker Street is an address, unless you tell it.
XML consists of tags, elements, and attributes. Let’s take a basic example and then go through these in more detail:
<?xml version="1.0" encoding="UTF-8"?> <address> <name> <title>Mr</title> <first-name>Sherlock</first-name> <last-name>Holmes</last-name> </name> <street>221B Baker Street</street> <city state="NA">London</city> </address>
First, we declare that this is an XML document and the encoding used. This is called a prolog. It’s optional, but if included, should always be the first line.
The tag <address>
is the root of the document. We must always have a root. The tag <address>
has three children:
<name>
<street>
<city>
The tag <name>
has three children as well:
I'm excited to announce the upcoming launch of Cloudflare TV. A 24x7 live television broadcast, streamed globally via the Cloudflare network. You can tune in to the pre-broadcast station and check out the upcoming schedule at: cloudflare.tv
I'm kicking off the first live broadcast starting at 12:00pm Pacific (1900 UTC) on Monday, June 8 with a conversation with Chris Young (add to calendar). Chris was most recently the CEO of McAfee and has had a career defining the cyber security industry, from his own startup Cyveillance in the 1990s, to leadership positions at AOL, RSA, VMWare, Cisco, and Intel. I hope you'll tune in and then stay tuned for all the content our team has in store.
Which leaves the question: why on earth is Cloudflare launching a 24x7 television station?
I was born in the 70's, am a child of the 80's, and got started in my career in the 90's. In the background, throughout much of it, was linear television we watched together. Over the last few months I've learned that Michelle Zatlyn, my co-founder and Cloudflare's COO, and I shared a love of Children's Television Network's Continue reading
Nutanix furloughed 25% of its workforce, saying COVID-19 is to blame; SAP cloud CFO jumped ship;...
Efforts to develop what comes after 5G are gaining momentum, but it’s more of a rallying cry to...
Every few years someone within the ITU-T (the standard organization that mattered when we were still dealing with phones, virtual circuits and modems) realizes how obsolete they are and tries to hijack and/or fork the Internet protocol development. Their latest attempt is the “New IP” framework, and Geoff Huston did a great job completely tearing that stupidity apart in his May 2020 ISP column. My favorite quote:
It’s really not up to some crusty international committee to dictate future consumer preferences. Time and time again these committees with their lofty titles, such as “the Focus Group on Technologies for Network 2030” have been distinguished by their innate ability to see their considered prognostications comprehensively contradicted by reality! Their forebears in similar committees missed computer mainframes, then they failed to see the personal computer revolution, and were then totally surprised by the smartphone.
Enjoy!
Eight years ago, on June 6, 2012, thousands of companies and organizations came together as part of World IPv6 Launch to permanently enable IPv6 for their websites and networks.
Today, we can see the success! If you visit the World IPv6 Launch measurements site, you can see some amazing numbers:
Another major source of info, Google’s IPv6 statistics, show that over 30% of all traffic to Googles sites globally is now over IPv6. If you look at Google’s per-country IPv6 adoption, some countries are seeing up around 50% of all traffic to Google’s properties going over IPv6.
This is all fantastic to see. But of course, we want more IPv6 deployment!
Specifically, we want more web sites and services available over IPv6. Increasing numbers of IPv6-only mobile networks are being deployed around the world. To ensure that people can reach websites that are still only available over IPv4, many IPv6-only networks use IPv6-to-IPv4 gateways. But we Continue reading
VMware lassoed Lastline to boost security NDR; How to train employees not to fall for phishing...
Memory isolation is a cornerstone security feature in the construction of every modern computer system. Allowing the simultaneous execution of multiple mutually distrusting applications at the same time on the same hardware, it is the basis of enabling secure execution of multiple processes on the same machine or in the cloud. The operating system is in charge of enforcing this isolation, as well Continue reading
Revenues during the quarter reached $894 million, up 3.4% year over year, exceeding investor...
Lastline is known for its anti-malware research and artificial intelligence-powered network...
Today's Heavy Networking podcast explores Dell Technologies' SONiC network OS for enterprises. This distro offers hardware support across multiple ASIC platforms and full enterprise support. We dive into technical details, discuss the business and operational value propositions, explore use cases, and more. Dell Technologies is our sponsor for this episode. Our guest is Alley Hasan, Director, Product Strategy and Business Development.
The post Heavy Networking 521: Diving Into Dell Technologies’ SONiC Network OS For The Enterprise (Sponsored) appeared first on Packet Pushers.
How much did your last laptop cost? You probably know down to the penny. How much time did it take for you to put together your last Powerpoint deck or fix an issue for a customer? You can probably track that time in the hours you recorded on your timesheet. What about the last big meeting you had of the department? Can you figure out how many hours combined of time that it took to get the business discussed? Pretty easy to calculate when you know how many people and how long it took.
All of these examples are ways that we track resources in the workplace. We want to know how many dollars were invested in a particular tool. We want to figure out how many hours someone has worked on a project or a proposal. We want to know how much of the company’s resources are being invested so we can track it and understand productivity and such. But when’s the last time you tracked your personal resources? I’m not talking about work you do or money you spend. I’m talking about something more personal than that. Because one of the things that I’ve seen recently that is Continue reading
“I know it’s an extremely overused term in security awareness, but gamification is extremely...
In this blog post, we will walk you through the reliability model of services running in our more than 200 edge cities worldwide. Then, we will go over how deploying a new dynamic task scheduling system, HashiCorp Nomad, helped us improve the availability of services in each of those data centers, covering how we deployed Nomad and the challenges we overcame along the way. Finally, we will show you both how we currently use Nomad and how we are planning on using it in the future.
For this blog post, we will distinguish between two different categories of services running in each data center:
The reliability model of our customer-facing services is to run them on all machines in each data center. This works well as it allows each data center’s capacity to scale dynamically by adding more machines.
Scaling is especially made easy thanks to Continue reading
SDxCentral Weekly Wrap for June 5, 2020: Cisco admits to missing cloud's first wave; ThousandEyes...
Donal O Duibhir was trying to get me to present at INOG for ages, and as much as I’d love to get to Ireland we always had a scheduling conflict.
Last week we finally made it work - unfortunately only in a virtual event, so I got none of the famous Irish beer - and the video about alternate universes of public cloud networking is already online.
Maximilian Wilhelm had great fun turning my usual black-and-white statements into tweets, here’s a selection of them:
JSON, JavaScript Object Notation, is one of the usual suspects when it comes to network automation. YAML and XML being the other two. It’s easy for machines to parse and generate and the readability is good, better than XML, although YAML is easier for humans to read.
JSON is based on a subset of the JavaScript programming language, as the name implies.
JSON, just like YAML, supports single values, lists, and key/value pairs.
JSON is commonly used to interchange between different formats.
JSON has no requirement for indentation or white space, which YAML has. That said, to make it human readable, it still makes sense to use white space and spaces, most likely either two or four.
JSON supports the following data types:
We’ll Continue reading