VMworld 2018 Europe in Barcelona is a week away. Want to learn more about NSX Networking and Security in VMware Cloud on AWS, how you can easily deploy and secure workloads in the cloud, or how to build hybrid cloud solutions with the familiarity and capabilities of vSphere? Make sure to attend the below sessions at VMworld 2018 Europe next week. We will go into a deep dive of all the functionality and show how VMware Cloud on AWS is being used by customers. Continue reading
Broadband for themselves: Rural Maine residents are looking into ways to create their own community broadband networks because of a lack of service in some areas, the Press Herald reports. About 15 percent of the state’s residents don’t have access to 25 Mbps broadband service. A project in the St. Croix Valley would create Maine’s first publicly-owned broadband network.
Home patches: Amazon has issued 13 security patches, with some addressing vulnerabilities in its Internet of Things home devices, Engadget reports. If left unpatched, the security holes would let intruders crash devices and remotely run code, giving them full control.
Confusion and delay: Meanwhile, a lot of companies that are potential IoT users are delaying their deployments because of security concerns, reports Betanews. About half of companies labeled as early adopters have delayed an IoT purchase because of security issues, according to a survey from F-Secure.
The cost of a breach: Yahoo has agreed to pay a $50 million settlement to the 200 million people affected the company’s huge 2013 data breach, Fortune says. The company will also pay a tidy $35 million in lawyers’ fees. The settlement applies only to a fraction of the people affected by the email breach.
Starting next weekend, the Internet Engineering Task Force will be in Bangkok for IETF 103, where around 1,000 engineers will discuss open Internet standards and protocols. The week begins on Saturday, 3 November, with a Hackathon and Code Sprint. The IETF meeting itself begins on Sunday and goes through Friday. We’ll be providing our rough guides on topics of mutual interest to both the IETF and the Internet Society as follows:
For more general information about IETF 103 see:
Here are some of the activities that the Internet Society is involved in during the week.
Through the Applied Networking Research Prize (ANRP), supported by the Internet Society, the Internet Research Task Force (IRTF) recognizes the best new ideas in networking and brings them to the IETF, especially in cases where the ideas are relevant for transitioning into shipping Internet products and related standardization efforts. Out of 55 submissions in 2018, six submissions will be awarded prizes. Two winners will present their Continue reading
A while ago I wrote about using kubeadm
to bootstrap an etcd cluster with TLS. In that post, I talked about one way to establish a secure etcd cluster using kubeadm
and running etcd as systemd units. In this post, I want to focus on a slightly different approach: running etcd as static pods. The information on this post is intended to build upon the information already available in the Kubernetes official documentation, not serve as a replacement.
For reference, the Kubernetes official documentation has a write-up on using kubeadm
to establish an etcd cluster with etcd running as static pods. For Kubernetes 1.12.x (the current version as of this writing), that information is here; for Kubernetes 1.11.x, that same information is here.
When using these instructions for use with Kubernetes 1.11.x, the official guide leaves something out that is very important: reconfiguring the kubelet to operate in a standalone fashion (without the Kubernetes control plane). This information is present in the 1.12.x documentation, but it applies to both versions.
Now, lest you think you can just follow the 1.12.x documentation for a 1.11.x cluster, you need Continue reading
Documentation is an extremely important rule when building a network. You will know what has been done in your network. With a good network documentation, the network support and maintenance procedures could handle the incidents in a more professional and organized way. Without a good network documentation, there is no map, topology or …
Continue reading "Network documentation 101 ! How? When? Why?"
The post Network documentation 101 ! How? When? Why? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Documentation is an extremely important rule when building a network. You will know what has been done in your network. With a good network documentation, the network support and maintenance procedures could handle the incidents in a more professional and organized way. Without a good network documentation, there is no map, topology or …
Continue reading "Network documentation 101 ! How? When? Why?"
The post Network documentation 101 ! How? When? Why? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
Automation is becoming essential in most organizations. The key to adoption is a positive user experience. This requires identifying and meeting the differing needs of the individuals involved.
In early October I had a chat with Dinesh Dutt discussing the outline of the webinar he’ll do in November. A few days later Fastly published a blog post on almost exactly the same topic. Coincidence? Probably… but it does seem like observability is the next emerging buzzword, and Dinesh will try to put it into perspective answering these questions:
Read more ...Noria: dynamic, partially-stateful data-flow for high-performance web applications Gjengset, Schwarzkopf et al., OSDI’18
I have way more margin notes for this paper than I typically do, and that’s a reflection of my struggle to figure out what kind of thing we’re dealing with here. Noria doesn’t want to fit neatly into any existing box!
We’ve seen streaming data-flow engines that maintain state and offer SQL interfaces and even transactions (e.g. Apache Flink, and data Artisan’s Streaming Ledger for Flink). The primary model here is data-flow, and SQL is bolted on as an interface to the state. The title of this paper sets me off thinking along those lines, but from the end user perspective, Noria looks and feels more like a database. The SQL interface is primary, not ancillary, and it maintains relational data in base tables (using RocksDB as the storage engine). Noria makes intelligent use of data-flow beneath the SQL interface (i.e., dataflow is not exposed as an end-user programming model) in order to maintain a set of (semi-)materialized views. Noria itself figures out the most efficient data-flows to maintain those views, and how to update the data-flow graphs in the face of Continue reading
In one fell swoop that is going to cost Big Blue a whopping $34 billion, IBM is going to become a modern software powerhouse in the datacenter that has to be contended with in an entirely different way. …
Big Blue Dons A $34 Billion Red Hat was written by Timothy Prickett Morgan at .
I am using a Lenovo Thinkpad X1 Carbon laptop (210 DPI) since four years and a Nokia 8 phone (550 DPI) since a year. I enjoy their HiDPI screens: text is crisp and easy to read. To get a similar experience for my workstation, I bought a pair of Dell P2415Q monitors:
The Dell P2415Q is a 24” display featuring an IPS panel with a 3840×2160 resolution (185 DPI) and a complete coverage of the sRGB color space. It was released in 2015 and its price is now below $400. It received positive reviews.
One of my units arrived with a dead pixel. I thought it was a problem from the past but Dell policy on dead pixels says:
During LCD manufacturing process, it is not uncommon for one or more sub-pixels to become fixed in an unchanging state. A display with a 1 to 5 fixed sub-pixel is considered normal and within industry standards.
Another issue is the presence of faint horizontal grey lines, (barely) visible on white background. The issue seems to not be uncommon but Dell is dismissive about it. If I sit correctly, the Continue reading