Architecture is constantly changing. New materials and ideas, as well as the needs of clients, drive new innovation in architecture. The latest innovation in architecture is that there are no defining standards, allowing for a wide variety of different styles and designs.
Modern architecture places emphasis on horizontal and vertical lines, as well as 90-degree angles. Modern architecture depends a great deal on sculpture forms, smooth surfaces, circular voids, and overhead shading systems.
Innovations in architecture include such features as large horizontal windows and ample natural light, as well as outdoors entertainment areas.
In the last few years, one of the biggest innovations in architecture is the designing of tiny houses for those on a budget. These tiny homes need to be well thought out and the innovation comes in when architects have to come up with innovative ways to fit everything that normal homes have in a small space often no larger than a small bedroom.
Some of the innovations in this include such things as built in storage solutions and multifunctional furniture to make the most of the limited living space.
Another architecture innovation is the turning shipping containers into cute Continue reading
Have you ever wondered how emergency communications get re-established after major disasters? Who are the people who rush in to enable first responders to do their jobs efficiently in the most trying of circumstances. In this episode we talk with Dustin Li and Andrew White of ITDRC (Information Technology Disaster Resource Center) to find out exactly what it takes to use technology in disaster response and why it is so important.
You can learn more about what ITDRC is doing as well as help out the cause at the following locations:
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Using Technology In Disaster Response appeared first on Network Collective.
When I started designing Data Center Infrastructure for Networking Engineers webinar I wanted to create something that would allow someone fluent in networking but not in adjacent fields like servers or storage to grasp the fundamentals of data center technologies, from server virtualization and containers to data center fabrics and storage protocols.
Here’s what a network architect said about the webinar:
David Klee is a SQL database expert, but he's also knowledgeable about virtualization, networking, and infrastructure. In today's Full Stack Journey podcast, host Scott Lowe talks with David about how and why IT specialists should be competent in other disciplines, how to decide which areas to branch out into, and how adjacent competencies enrich can enrich your specialization.
The post Full Stack Journey 042: How An IT Specialist Chooses Adjacent Competencies appeared first on Packet Pushers.
Phishing attacks begin like any other visit to a site on the Internet. A user opens a suspicious link from an email, and their DNS resolver looks up the hostname, then connects the user to the origin.
Cloudflare Gateway’s secure DNS blocks threats like this by checking every hostname query against a constantly-evolving list of known threats on the Internet. Instead of sending the user to the malicious host, Gateway stops the site from resolving. The user sees a “blocked domain” page instead of the malicious site itself.
As teams migrate to SaaS applications and zero-trust solutions, they rely more on the public Internet to do their jobs. Gateway's security works like a bouncer, keeping users safe as they navigate the Internet. However, some organizations still need to send traffic to internal destinations for testing or as a way to make the migration more seamless.
Starting today, you can use Cloudflare Gateway to direct end user traffic to a different IP than the one they originally requested. Administrators can build rules to override the address that would be returned by a resolver and send traffic to a specified alternative.
Like the security features of Cloudflare Gateway, the redirect function is Continue reading
During the Comparing Transparent Bridging and IP Routing part of How Networks Really Work webinar I said something along the lines of:
While packets should never be reordered in transit in transparent bridging, there’s no such guarantee in IP networks, and IP applications should tolerate out-of-order packets.
One of my regular readers who designs and builds networks supporting VoIP applications disagreed with that citing numerous real-life examples.
Of course he was right, but let’s get the facts straight first:
As our enterprise customers build out large, multi-cluster Kubernetes environments, they are encountering an entirely new set of security challenges, requiring solutions that operate at scale and can be deployed both on-premises and across multiple clouds.
Today we are thrilled to announce the release of Calico Enterprise 3.0 and the availability of Calico Multi-Cluster Management, a game-changing solution that provides centralized management for network security across every Kubernetes cluster in your organization.
Calico Multi-Cluster Management provides a centralized management plane and single point of control for multi-cluster and multi-cloud environments. Calico Enterprise’s centralized control simplifies and speeds routine maintenance, leaving more time for your platform team to address other important tasks.
For example, instead of logging in to 50 clusters one-at-a-time to make a policy change, with a single log-in to Calico Enterprise you can apply policy changes consistently across all 50 clusters. You can also automatically apply existing network security controls to new clusters as they are added.
Calico Multi-Cluster Management includes centralized log management, troubleshooting with Flow Visualizer, and cluster-wide IDS (intrusion detection). It also provides compliance reporting, and alerts on non-compliance and indicators of compromise. Alerts are sent to SIEMs, including Splunk and Continue reading
Post-mortem reviews seem to be quite common in the software engineering and application development sides of the IT world—but I do not recall a lot of post-mortems in network engineering across my 30 years. This puzzling observation sprang to mind while I was reading a post over at the ACM this last week about how to effectively learn from the post-mortem exercise.
The common pattern seems to be setting aside a one hour meeting, inviting a lot of people, trying to shift blame while not actually saying you are shifting blame (because we are all supposed to live in a blame-free environment now—fix the problem, not the blame!), and then … a list is created on a whiteboard, pictures are taken, and everyone walks away with a rock-solid plan to never do that again.
In a few months’ time, the same team will be in the same room, draw the same drawings, and say the same things all over again. At least that is the way it seems to me. If there is an effective post-mortem process in use by a company someplace, I do not think I have seen it.
From the article—
Even before COVID-19, political and economic scenes within the MENA region were changing. Differences across economies, politics, religion, and even the weather kept governments occupied.
Amid all that, the region has been shaken by COVID-19 as nations have moved operations into the home.
Looking at this from a technology perspective, we must ask ourselves: Are we ready for this? Are we able to transfer all our businesses and schools to our homes? Do we have an adequate Internet-based economy and good quality connectivity to back up the huge demand?
There’s no question that the Internet provides significant economic and social benefits. COVID-19 has made that especially clear. For many parts of the world, it has allowed us to carry on. But for the first time, governments have had to face the reality that there is no time for pilot projects. This is happening and it is happening now.
COVID-19 has opened the world’s eyes to how critical the Internet is for the economy. How can the Middle East build on what COVID-19 has taught us about the Internet and connectivity? The Internet Society has released two papers that can help develop the answers: “Middle East & North Africa Internet Continue reading
I’m going to assume that at this stage, you’ve got a fully working (and tested) GNS3 install on a suitably powerful Linux host. Once that is complete, the next step is to download the two virtual machine images we discussed in part 1 of this blog, and integrate them into GNS3.
In my setup, I downloaded the Cumulus VX 4.0 QCOW2 image (though you are welcome to try newer releases which should work), which you can obtain by visiting this link: https://cumulusnetworks.com/accounts/login/?next=/products/cumulus-vx/download/
I also downloaded the Ubuntu Server 18.04.4 QCOW2 image from here: https://cloud-images.ubuntu.com/bionic/current/bionic-server-cloudimg-amd64.img
Once you have downloaded these two images, the next task is to integrate them into GNS3. To do this: