VMware: What to Do When Cybercriminals Hunt Your Company in Your Home
The worse-case scenario is “whether your entire brand will be used to attack your customers,”...
The worse-case scenario is “whether your entire brand will be used to attack your customers,”...
Docker Desktop is getting ready to celebrate its fourth birthday in June this year. We have come a long way from our first version and have big plans of what we would like to do next. As part of our future plans we are going to be kicking off a new early access program for Docker Desktop called Docker Desktop Developer Preview and we need your help!
This program is for a small number of heavy Docker Desktop users who want to interact with the Docker team and impact the future of Docker Desktop for millions of users around the world.
As a member of this group we will be working with you to look at and experiment with our new features. You will get direct access to the people who are building Docker Desktop everyday. You will meet with our engineering team, product manager and community leads, to share your feedback, tell us what is working in our new features and how we could improve, and also help us really dig in when something doesn’t work quite right.
On top of that, you will have a chance to Continue reading
The surge, which is tied to the ongoing COVID-19 virus outbreak, is being managed by the platform's...
SDxCentral Weekly Wrap for April 3, 2020: CloudGenix had been targeting Cisco in the SD-WAN space;...


When I arrived at Cloudflare for an internship in the summer of 2018, I was taken on a tour, introduced to my mentor who took me out for coffee (shoutout to Preston), and given a quick whiteboard overview of how Cloudflare works. Each of the interns would work on a small project of their own and they’d try to finish them by the end of the summer. The description of the project I was given on my very first day read something along the lines of “implementing signed exchanges in a Cloudflare Worker to fix the AMP URL attribution problem,” which was a lot to take in at once. I asked so many questions those first couple of weeks. What are signed exchanges? Can I put these stickers on my laptop? What’s a Cloudflare Worker? Is there a limit to how much Topo Chico I can take from the fridge? What’s the AMP URL attribution problem? Where’s the bathroom?
I got the answers to all of those questions (and more!) and eventually landed a full-time job at Cloudflare. Here’s the story of my internship and working on the Workers Developer Experience team at Cloudflare.
Most of us are in some sort of lockdown (or quarantine or shelter-in-place or whatever it’s called) at the moment. Some have their hands full balancing work and homeschooling their kids (hang in there!), others are getting bored and looking for networking-related content (or you wouldn’t be reading this blog).
If you’re in the latter category you might want to browse some of the free ipSpace.net content: almost 3500 blog posts, dozens of articles, over a hundred podcast episodes, over 20 free webinars, and another 30+ webinars with sample videos that you can access with free subscription.
Need more? Standard subscription includes 260 hours of video content and if you go for Expert subscription and select the network automation course as part of the subscription, you’ll get another 60 hours of content plus hands-on exercises, support, access to Slack team… hopefully enough to last you way past the peak of the current pandemic.
The post BGP errors, BGP error codes, and BGP error handling. appeared first on Noction.
I’ve had a Kenwood TH-D74 for almost two years now, and was curious to get a sense of what the competition is like. Seems like everyone’s recommending the Yaesu FT3D. So I got one, and I think I’ve played around with it enough now to have an informed opinion.
Summarizing the feeling of them, while I have my complaints about the usability of the D74, the FT3D is like a time machine back to the 90s in how well the interface is though through.
I’m sneaking in some mentions of the AnyTone 878UV too. But I’ve not used it enough to have a solid opinion yet.
With the FT3D upgrading the firmware is a two step process, where you have to flip a little hidden switch first to “up”, to upgrade one firmware, then to “down”, to upgrade the other. And then flip it back to “middle” for normal mode.
The FT3D programming software costs $25 and comes with a special cable, but the software also seems downloadable from their website. The USB cable seems to require a special driver. I guess that’s what you’re paying for. At least you can download the software and put the data on Continue reading
For the past five years or so, there has been a lot of talk about accelerated computing being the new normal and about the era of the general purpose processor being over in the datacenter, and for good reason. …
Tachyum Starts From Scratch To Etch A Universal Processor was written by Timothy Prickett Morgan at The Next Platform.
IBM tapped AMD for bare metal cloud; Do Coronavirus SOCs look Like Zoom war rooms?; and Canonical...
The work is based on the carrier's Conducktor internal Kubernetes platform.
When an incident occurs, enterprises typically rely on their on-site security operations centers to...
At the heart of the new offering is AMD’s 96-core EPYC 7642 processors that launched in...
The market, which includes hardware, software, and IT services, is now expected to decline at a...
In late 2018, I wrote a couple of blog posts on using kubeadm to set up an etcd cluster. The first one was this post, which used kubeadm only to generate the TLS certs but ran etcd as a systemd service. I followed up that up a couple months later with this post, which used kubeadm to run etcd as a static Pod on each system. It’s that latter post—running etcd as a static Pod on each system in the cluster—that I’ll be revisiting in this post, only this time using containerd as the container runtime instead of Docker.
This post assumes you’ve already created the VMs/instances on which etcd will run, that an appropriate version of Linux is installed (I’ll be using Ubuntu LTS 18.04.4), and that the appropriate packages have been installed. This post also assumes that you’ve already made sure that the correct etcd ports have been opened between the VMs/instances, so that etcd can communicate properly.
Finally, this post builds upon the official Kubernetes documentation on setting up an etcd cluster using kubeadm. The official guide assumes the use of Docker, whereas this post will focus on using containerd as the container Continue reading
As the novel coronavirus causing COVID-19 continues to spread, Docker has been taking precautionary measures to support the health, well-being, and safety of our global team members and their families, as well as ensuring our customers and community at large can continue building and shipping apps using Docker. We are also following the World Health Organization (WHO) and the Center for Disease Control and Prevention (CDC) guidelines, as well as guidelines from local public health administrations.
Docker has always been about community, and here are the steps we have taken to ensure employees are taken care of as well as to ensure business continuity for our users worldwide:
Protecting Employees
In this week's IPv6 Buzz episode, we discuss the path from learning IPv6 to teaching it with Nicole Wajer, a Technical Solution Architect at Cisco and a frequent presenter at CiscoLive. She's an expert on IPv6 training.
The post IPv6 Buzz 048: From Learning To Teaching IPv6 appeared first on Packet Pushers.
Amid the global spread of COVID-19, the exceptional strict confinement to our homes offers important lessons about the urgency of bridging the digital divide.
Where I live, in Osona (rural Catalonia, northern Spain), 15 years ago there was no Internet access. Commercial operators said it wasn’t profitable. So, we set up a community network, Guifi.net, initially with radio connections, and in 2009 we deployed fiber optics. Today, we have connected many small towns and have more than 200,000 estimated users.
According to the National Statistical Institute, Osona County leads with the percentage of households with a computer: 82.5%, exceeding the Spanish average of 69.8%.
Connectivity has broken rural social isolation, connected our schools and hospitals, and it is helping people face this emergency situation. People can access multiple interactive channels to inform themselves without leaving home. Without connectivity, our confinement would feel like prison.
Connectivity has been an economic savior for us. In our livestock-driven region, robots milk cows that wear pedometers to measure their steps and detect diseases. Farmers use connected cameras to monitor whether their pigs have complications during birth. Technology has saved time, money, and improved productivity.
Just 15 years ago, Osona trailed Continue reading
Compliance exists in many forms, with tenancy, traffic isolation and access restriction. Compliance is mostly due to regulatory needs, which really comes down to security needs. Compliance applies to networking, fundamentally ensuring that resources can only be accessed from allowed locations. The actual media and content normally isn’t pertinent, as they merely just influence the scope of access for the data.
As a result, this post doesn’t delve into more complex compliance requirements such as deep packet inspection or encryption. Rather, this is to discuss how networking engineers use their existing toolset to enforce compliance requirements.
The most fundamental of these requests is networking access permissions. Most customers will allocate subnets for functional sections of their network.
ACLs are some of the most classic and undemanding forms of permission. The greatest part of ACLs is that they can be applied on nearly every networking device, and provide somewhat of a base level of security. But there are hidden complexities with ACLs that may not make it the ideal choice for most compliance solutions:
ACLs are unidirectional elements, examining packets one at a time and only blocking traffic in a single direction. This can create some logical Continue reading