Day Zero, One, Two

My personal approach to technology design is to visualise three broad stages. Design, Deploy and Operate.  Because those terms are boring and much abused by marketing, I actually use Day Zero, Day One and Day Two.  Day Zero design, strategy  customer needs,  service goals and values – how to keep the service runnings business – […]

The post Day Zero, One, Two appeared first on EtherealMind.

Cumulus + Nutanix = Building and Simplifying Open, Modern Data Centers at Scale

We are excited to announce that Cumulus and Nutanix are partnering to build and operate modern data centers with open networking software. We’ve worked closely with Nutanix, a leader in enterprise cloud computing, to develop a joint integration that will solve one of the most pressing enterprise infrastructure problems by unlocking the power of hyperconverged systems with open networking.

It’s a challenge every enterprise knows all too well: siloed servers, storage and compute make traditional IT infrastructure expensive and complex to maintain and creates a dynamic that holds back business innovation. Hyperconverged infrastructure with modern, open networking software allows for agility, flexibility, and a greatly simplified operational model across compute, storage, and networking. Our joint solution brings a fully automated and highly distributed network fabric to hyperconverged workloads for the modern data center.

Together, Cumulus and Nutanix unite compute, storage, virtualization and now networking in an open, scalable, and efficient way for today’s modern data center.

Cumulus Linux and NetQ with Nutanix delivers tangible business value by increasing operational efficiency shortening the time required to stand up Nutanix clusters, organizational agility by improving the user experience via a single interface using Nutanix Prism, streamlined procurement through common hardware partners such Continue reading

New UN Tool Maps Asia-Pacific Cybersecurity Landscape

News of cyber attacks and personal data breaches frequently make headlines nowadays, particularly in Asia Pacific*, and every time a new incident happens, it deals a blow to the trust of some users. Since cyber threats are grave and growing, society must understand how policymakers are addressing cybersecurity concerns, and what can be done to strengthen trust.

A United Nations agency recently launched a tool to do exactly that. Against the backdrop of increasingly complex cybersecurity policies around the world, the portal aims to “enhance informed participation in key policy processes by all relevant stakeholders”, thus facilitating information sharing, capacity building, and trust and cooperation in cyberspace. We spent some time with it to evaluate the state of cybersecurity in Asia Pacific and to highlight the importance of the issue.

The Cyber Policy Portal, released this month by the United Nations Institute for Disarmament Research (UNIDIR), maps the global cybersecurity capability landscape, covering all 193 of the UN Member States, 13 intergovernmental organizations, including the Association of Southeast Asian Nations (ASEAN), and a number of multilateral frameworks.

The interactive map draws from public information and, where applicable, carries links to original documents. Systematically, it answers some of the salient questions Continue reading

Not So Fast Ansible, Cisco IOS Can’t Keep Up…

Remember how earlier releases of Nexus-OS started dropping configuration commands if you were typing them too quickly (and how it was declared a feature ;)?

Mark Fergusson had a similar experience on Cisco IOS. All he wanted to do was to use Ansible to configure a VRF, an interface in the VRF, and OSPF routing process on Cisco CSR 1000v running software release 15.5(3).

Here’s what he was trying to deploy. Looks like a configuration straight out of an MPLS book, right?

Read more ...

Passwords in a file

My dad is on some sort of committee for his local home owners association. He asked about saving all the passwords in a file stored on Microsoft's cloud OneDrive, along with policy/procedures for the association. I assumed he called because I'm an internationally recognized cyberexpert. Or maybe he just wanted to chat with me*. Anyway, I thought I'd write up a response.

The most important rule of cybersecurity is that it depends upon the risks/costs. That means if what you want to do is write down the procedures for operating a garden pump, including the passwords, then that's fine. This is because there's not much danger of hackers exploiting this. On the other hand, if the question is passwords for the association's bank account, then DON'T DO THIS. Such passwords should never be online. Instead, write them down and store the pieces of paper in a secure place.

OneDrive is secure, as much as anything is. The problem is that people aren't secure. There's probably one member of the home owner's association who is constantly infecting themselves with viruses or falling victim to scams. This is the person who you are giving OneDrive access to. This is fine for the Continue reading

You can sign up for this team collaboration app for free today

Efficiency is the name of the game in today’s fast-paced digital world; and whether you’re leading a team—or an entire company—you should always be looking for new and creative ways to get more done in less time. That’s the goal, right? While there are plenty of pricey tools like Slack and Skype that promise to fine-tune your productivity, few are as quick and impactful as Glip, and it won’t cost you a dime.To read this article in full, please click here

The Revenge of the Ancillaries

Have you ever tried to make water flow in a specific direction? Maybe you have some particularly muddy spot in your yard, so you dig a small ditch and think, “the water will now flow from here to there, and the muddy spot won’t be so muddy the next time it rains.” Then it rains, and the water goes a completely different direction, or overflows the little channel you’ve dug, making things worse. The most effective way to channel water, of course, is to put it in pipes—but this doesn’t always seem to work, either.

The next time you think about shadow IT in your organization, think of these pipes, and how the entire system of IT must look to a user in your organization. For instance, I have had corporate laptops where you must enter two or three passwords to boot the laptop, provided by departments that require you to use your corporate laptop for everything, and with security rules forbidding the use of any personal software on the corporate laptop. I have even had company issued laptops on which you could not modify the position of icons on the desktop, change the menu items in any piece Continue reading