I have reached the conclusion that “imposter syndrome” is healthy. You know you have more to learn and will act correctly to ensure that any weakness is addressed and managed. The problems start at unconscious incompetence however – I attempt to explain it here: 
AI battles the fake news: Can Artificial Intelligence combat all the fake news that’s out there? An article in Forbes looks at several ways fake news fighters are using AI, but the author casts some doubt on these approaches. Ultimately, humans are the problem, the article says: “The willingness to believe sensational information is a real phenomenon and debunking false information does not always change people’s minds.”
Fake tweets: As social networks take steps to fight against fake news, some still have a way to go. Twitter, for example, is still flooded with sham accounts that generate more than 1 million tweets a day, reports CBS News. Twitter disputed the study the story is based on, noting it has suspended more than 70 million suspicious accounts in May and June.
Tiny infiltrations: Chinese hackers have used tiny microchips to gain access to computers at 30 U.S. companies, including Apple and Amazon, Bloomberg reports. Both companies disputed the report, and the U.K.’s National Cyber Security Centre appeared to support the denials later in the week, Reuters says.
Blockchain’s bright future: There were several reports this week focused on the growth projections of the blockchain technology, with the blockchain Continue reading
New technologies keep on coming, but which are better to invest in now versus later? CompTIA's recently released a prioritized list of top 10 emerging technologies.
One of my readers sent me a series of questions regarding a new cloud deployment where the cloud implementers want to run VXLAN and EVPN on the hypervisor hosts:
I am currently working on a leaf-and-spine VXLAN+ EVPN PoC. At the same time, the systems team in my company is working on building a Cloudstack platform and are insisting on using VXLAN on the compute node even to the point of using BGP for inter-VXLAN traffic on the nodes.
Using VXLAN (or GRE) encap/decap on the hypervisor hosts is nothing new. That’s how NSX and many OpenStack implementations work.
Read more ...Online parameter selection for web-based ranking problems Agarwal et al., KDD’18
Last week we looked at production systems from Facebook, Airbnb, and Snap Inc., today it’s the turned of LinkedIn. This paper describes the system and model that LinkedIn use to determine the items to be shown in a user’s feed:

It replaces previous hand-tuning of the feature mix and ranking:
In the past, a developer spent days to accurately estimate [the feature weights] with desired behavior with every significant drift and intervention. Using the approach described in this paper, we have completely eliminated the laborious manual tuning, significantly increased developer productivity as well as obtained better Pareto optimal solutions.
Here are representative results comparing the impact on three key metrics for a setting found by the new algorithm over a period of 36 hours, vs the best setting that could be found in 7 days of hand-tuning:

Viral Actions is the most important metric for the LinkedIn feed, ‘with far reaching consequences from more subsequent sessions to more revenue.’ The algorithm is tasked with maximising this metric while not allowing others to drop by more than 1%. (Increases in the other metrics as well are Continue reading

Vagrant is an alien word for network engineers ,we as network engineer are more close to windows environment than Linux and always try to avoid linux . But time has changed now and with introduction of automation ,SDN ,Devops in networks professional life has made him to come out of windows environment and try Linux for multiple reasons as below:
So when ever we plan to work on linux environment , we just start downloading ubantu on our windows laptop with VM box ..install both and start working.
But there is an environment known as Vagrant that will not help you do all the Linux related task but also provide an environment that helps reduce setup time and allows you to virtualize configurations for various projects.We can set up up a virtual network environment for testing purposes, or setting up a lab, work with python , ansible ,devops tools and much more .
You Continue reading
Ethan Banks wrote an awesome blog post on the characteristics of fragile engineers (most of them probably being expert beginners). I can’t help but ponder how often I behave like one…

DockerCon EU 2018 sessions focus on how Docker works for you. From the latest in Docker technology, to how-tos for your developer and IT infrastructure and operations team, to customer stories on how they are transforming their business with Docker, this year’s program was revamped based on audience feedback. The result – we’ve doubled your favorite content! That’s right, we’ve expanded our popular Using Docker track into two customized tracks for those that are hands on with Docker technology on a daily basis – Using Docker for Developers and Using Docker for IT Infrastructure and Operations.
DockerCon is for Teams
DockerCon is better with friends and colleagues. In Barcelona we are introducing tracks specifically dedicated to developers and IT Infrastructure and Operations professionals. Combined with hands-on learning opportunities with Official Training, Workshops and Labs, there is no shortage of ways to level up on how to work with containers every day. So grab your colleagues and register together to take advantage of our DockerCon for Teams offer: Teams of 4 or more get 10% off their registration and 10 or more get 20% off.
This track is designed to cover the range of topics applicable Continue reading
CloudHealth CTO and co-founder Joe Kinsella says VMware plans to target managed service providers with its new multi-cloud management product line.
The company views WiFi as instrumental in providing the necessary in-building coverage and capacity for 5G deployments.
Innovium considers switch chip programmability to be relevant for niche applications and as an insurance policy for future needs.
Zabbix began as a hobby project, but evolved into a network monitoring software for system administrators to monitor IT infrastructure that has a user base of 300,000 across 75 countries.
SDxCentral Weekly Wrap for October 5, 2018. AT&T contributed its white box router specifications to the Open Compute Project.
We built Access to solve a problem here at Cloudflare: our VPN. Our team members hated the slowness and inconvenience of VPN but, that wasn’t the issue we needed to solve. The security risks posed by a VPN required a better solution.
VPNs punch holes in the network perimeter. Once inside, individuals can access everything. This can include critically sensitive content like private keys, cryptographic salts, and log files. Cloudflare is a security company; this situation was unacceptable. We need a better method that gives every application control over precisely who is allowed to reach it.
Access meets that need. We started by moving our browser-based applications behind Access. Team members could connect to applications faster, from anywhere, while we improved the security of the entire organization. However, we weren’t yet ready to turn off our VPN as some tasks are better done through a command line. We cannot #EndTheVPN without replacing all of its use cases. Reaching a server from the command line required us to fall back to our VPN.
Today, we’re releasing a beta command line tool to help your team, and ours. Before we started using this feature at Cloudflare, curling a server required me to Continue reading
By now the story and resulting controversy is as much about media credibility as it is about cyber — and national — security.
Editors Note: We are arranging interviews with leads on both the hardware and software side of this story and will update it with more information throughout the day. …
Deep Learning Just Dipped into Exascale Territory was written by Nicole Hemsoth at .
Because the threat landscape continues to evolve rapidly, organizations are having a hard time keeping pace with the evolving cybersecurity skills required to manage their complex environments.
On today’s Packet Pushers Weekly Show, we discuss how the broadcast media industry leverages IP networks, the initiatives behind the standards and protocols, and why it all matters to data networking professionals.
The post Weekly Show 410: Broadcast Media Using IP Networks appeared first on Packet Pushers.