Today's episode explores how the US federal government views IPv6 adoption. We also explore the use of IPv6 by the U.S. Department of Defense, including innovations, and how the DoD's use affects its work with civilian entities. Our guest is Jeremy Duncan, founder and leading partner of the consultancy Tachyon Dynamics.
The consensus is growing among the big datacenter operators of the world that CPU cores are such a precious commodity that they should never do network, storage, or hypervisor housekeeping work but rather focus on the core computation that they are really acquired to do. …
5 Reasons You Might Be Afraid to Get Started with Kubernetes
Kubernetes has the broadest capabilities of any container orchestrator available today, which adds up to a lot of power and complexity. That can be overwhelming for a lot of people jumping in for the first time – enough to scare people off from getting started. There are a few reasons it can seem intimidating:
It’s complicated, isn’t it? As we noted in a previous post, jumping into the cockpit of a state-of-the-art jet puts a lot of power under you, but how to actually fly the thing is not obvious. If you’ve never done more than play a flight simulator game, it can be downright scary.
Is it production-ready? Everyone is talking about Kubernetes, but it’s only emerged as a major technology in the past few years. Many companies take a wait-and-see approach on new technologies. Building out a Kubernetes deployment on your own means solving challenging problems without enterprise support.
Do I have the people and skills to support it? IT teams are just beginning to learn Kubernetes. If it’s complicated, it means you’ll need people with the right experience to support it. According to industry Continue reading
I installed the Azure CLI in the Termux app on my Android phone. This post describes all the steps required to successfully run Azure CLI on most Android phones.
Installing Azure CLI on Termux on your Android phone is an alternative to using Azure Cloud Shell on Chrome or Firefox, or to using the Cloud Shell feature on the Azure mobile app. It’s also a cool thing to try.
This post is based on the excellent work done by Matthew Emes, who wrote a blog post about installing Azure CLI on a Chromebook. Matthew’s procedure got me started, but I had to modify it to make Azure CLI work in Termux on my Android phone. Also, Azure CLI has changed since Matthew wrote about it and some of his steps, while they still work, are no longer necessary.
Termux
Install Termux on your Android phone. Termux is a terminal emulator and Linux environment that runs on most Android devices with no rooting or setup required. You can use Termux as a terminal emulator to manage remote systems and it will run a large number of Linux utilities and programming languages directly on your phone. Install it from the Google Continue reading
Mad geniuses. Evil dolls. Slow zombies. This Halloween, we’ll see all of these horror film clichés come to life. Sure they’re fun, but are there lessons we can learn from them? What if they could teach us what not to do? We looked at seven scary tropes and what they might teach us about Internet trust.
The call is coming from inside the house.
The phone calls keep coming, each one scarier than the last. Ring. “Are you home alone?” Ring. “Have you locked the doors?” Ring. “Look in the basement.” It’s only then you realize the stalker has been in the house all along.
We lock our doors to make our homes more secure, but we don’t always think about the security of the things we connect to our home networks. An insecure connected device can put your whole network and the devices on it at risk. Meaning, yes, the cybersecurity threat could be coming from inside the house. By protecting your home network, you limit your devices’ exposure to online threats and help mitigate the risk they may pose to others. You can make your network more secure by using encryption, a strong password, and Continue reading
The effective range of Wi-Fi, and other wireless communications used in Internet of Things networks could be increased significantly by adding wireless noise, say scientists.This counter-intuitive solution could extend the range of an off-the-shelf Wi-Fi radio by 73 yards, a group led by Brigham Young University says. Wireless noise, a disturbance in the signal, is usually unwanted.To read this article in full, please click here
Application delivery controller provider Project Nova, a cloud native, hosted ADC service that is managed from a browser.
Nova is a response to customers using their existing ADC device in a manner that was never intended, Snapt CEO request access, with a community edition providing free access for up to five deployed nodes. At launch, Project Nova provides support for native service discovery on Kubernetes, Docker, Rancher, Consul and more, as well as full-automation with a REST API.
Blakey says they expect Project Nova’s beta to be available by mid-November and a full integration with service meshes by mid-December, with ” the real idea to be this app delivery fabric, which just takes responsibility for the delivery of your app across whatever infrastructure you’re running in.” General availability, he says, is expected by early 2020.
Feature image
Several months ago we announced that we were providing a new public time service. Part of what we were providing was the first major deployment of the new Network Time Security (NTS) protocol, with a newly written implementation of NTS in Rust. In the process, we received helpful advice from the NTP community, especially from the NTPSec and Chrony projects. We’ve also participated in several interoperability events. Now we are returning something to the community: Our implementation, cfnts, is now open source and we welcome your pull requests and issues.
The journey from a blank source file to a working, deployed service was a lengthy one, and it involved many people across multiple teams.
"Correct time is a necessity for most security protocols in use on the Internet. Despite this, secure time transfer over the Internet has previously required complicated configuration on a case by case basis. With the introduction of NTS, secure time synchronization will finally be available for everyone. It is a small, but important, step towards increasing security in all systems that depend on accurate time. I am happy that Cloudflare are sharing their NTS implementation. A diversity of software with NTS support is important for quick Continue reading
On November 14th I’ll start the VMware NSX-T saga (expect at least three live sessions - the second and the third one are scheduled for November 21st and 26th);
There are a lot of options for looping in bash whether on the command line or in a script. The choice depends on what you're trying to do.You may want to loop indefinitely or quickly run through the days of the week. You might want to loop once for every file in a directory or for every account on a server. You might want to loop through every line in a file or have the number of loops be a choice when the script is run. Let's check out some of the options.[Get regularly scheduled insights by signing up for Network World newsletters.]
Simple loops
Probably the simplest loop is a for loop like the one below. It loops as many times as there are pieces of text on the line. We could as easily loop through the words cats are smart as the numbers 1, 2, 3 and 4.To read this article in full, please click here
At some point, when the Epyc server CPU and Radeon Instinct GPU accelerator businesses are more substantial, AMD will probably be a lot less opaque about how its datacenter business is doing. …
There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the overarching networking landscape laid out by Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here
There is a fundamental, but perhaps a logical evolution in the way networks are being built to handle hybrid cloud applications – resources are moving closer to the edge; data centers are becoming more distributed and cloud hyperscalers are building bigger backbones to handle that traffic.That is the overarching networking landscape laid out by Juniper’s CTO Bikash Koley in an interview this week ahead of the company’s NXTWORK 2019 customer event next month. To read this article in full, please click here