The Larger Facebook/Cambridge Analytica Question: Is this really what we signed up for?

Mark Zuckerburg’s testimony before the US Congress today and the flood of news about the privacy breach at Facebook and revelations that the company mishandled the data of millions of people has me asking:

Is this really what we signed up for?

It is clear that we are not in control of our online information nor do we really have any idea how it is bought, sold, or used.

For some of us, signing up for a social network like Facebook was about staying in touch with our kids and friends. For others, it was an easy way to reach new customers, or gather a community behind a social project. Yes, many of us figured out that our information was being used to serve up ‘relevant’ ads: as a matter of fact, that seems pretty standard in today’s online world. But that’s only a small part of a much bigger picture.

In the past few weeks we have found out – yet again – that information about ourselves, and our friends and contacts was used far beyond what we intended. We have been profiled, pigeon-holed, politically manipulated, and played like pawns in someone else’s chess game. I’d challenge you to Continue reading

Datanauts 129: Automation And Security In AWS

Today the Datanauts explore three key concepts to make cloud management and operations more bearable: automation, understanding new services and capabilities, and security.

Our guest is Kenneth Hui, Technical Marketing Engineer at Rubrik. Ken blogs at Cloud Architect Musings. While our conversation focuses primarily on AWS, many of the principles discussed will apply to any cloud platform.

In part one we parse automation, infrastructure-as-code, and DevOps to understand how these concepts are related, how they differ, and why culture and human behavior matter more than labels.

Part two explores the latest offerings in AWS including serverless, container support, and machine learning.

Part three tackles cloud security essentials including encryption, not exposing S3 buckets, and best practices.

Show Links:

Infrastructure as Code: A Reason to Smile – Thoughtworks.com

DevOps Culture (Part 1) – IT Revolution

The AWS Love/Hate Relationship with Data Gravity – Cloud Architect Musings

Data Encryption in the Cloud, Part 1: Why You Should Care – Cloud Architect Musings

Last Week In AWS – Newsletter

Unsecured server exposed thousands of FedEx customer records – ZDNet

Vault Project – Vault.io

AWS Blogs – Amazon

AWS Security – Amazon

AWS Security Best Practices – Amazon

AWS FaragateContinue reading

History Of Networking – Dino Farinacci – History of LISP

 In this History of Networking episode of Network Collective we chat with Dino Farinacci about his contributions to the Locator/ID Separation Protocol, or LISP.

Dino Farinacci
Guest
Russ White
Host
Jordan Martin
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Dino Farinacci – History of LISP appeared first on Network Collective.

Intel FPGAs step toward mainstream in Dell, Fujitsu enterprise servers

[ Learn about how server disaggregation can boost data center efficiency and learn the how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ] Enterprises should find it easier to tap the benefits of FPGAs now that Dell EMC and Fujitsu are putting Intel Arria 10 GX Programmable Acceleration Cards into off-the-shelf servers for the data center.To read this article in full, please click here

Intel FPGAs step toward mainstream in Dell, Fujitsu enterprise servers

[ Learn about how server disaggregation can boost data center efficiency and learn the how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ] Enterprises should find it easier to tap the benefits of FPGAs now that Dell EMC and Fujitsu are putting Intel Arria 10 GX Programmable Acceleration Cards into off-the-shelf servers for the data center.To read this article in full, please click here

Dell EMC and Fujitsu Roll Intel FPGAs Into Servers

Nvidia caused a shift in high-end computing more than a decade ago when it introduced its general-purpose GPUs and CUDA development platform to work with CPUs to increase the performance of compute-intensive workloads in HPC and other environments and drive greater energy efficiencies in datacenters.

Nvidia and to a lesser extent AMD, with its Radeon GPUs, took advantage of the growing demand for more speed and less power consumption to build out their portfolios of GPU accelerators and expand their use in a range of systems, to the point where in the last Top500 list of the world’s fastest

Dell EMC and Fujitsu Roll Intel FPGAs Into Servers was written by Jeffrey Burt at The Next Platform.

Splunk debuts IIoT product for in-depth analytics

Splunk is introducing software that enables pulling in information from industrial IoT devices and analyzing it.Called Industrial Asset Intelligence, it is in essence a pre-packaged set of analytical tools used on top of the Splunk Enterprise platform, designed for use in a wide range of IIoT applications, said Seema Haji, the company’s director of product marketing for IoT.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ]  “Industry 4.0’s kind of broad – it encompasses customers from transportation, oil and gas, energy and utilities companies,” she said. “These companies are using Splunk enterprise today … we see them using Splunk enterprise to gain insight into their industrial operations.”To read this article in full, please click here

MPLS 101 – MPLS VPNs

In our last post, we removed our last piece of static configuration and replaced static routes with BGP.  We’re going to pick up right where we left off and discuss another use case for MPLS – MPLS VPNs.  Really – we’re talking about two different things here.  The first is BGP VPNv4 address families used for route advertisement.  The second is using MPLS as a data plane to reach the prefixes being announced by VPNv4 address family.  If that doesn’t make sense yet – don’t worry – it will be pretty clear by the end of the post.  So as usual – let’s jump right into this and talk about our lab setup.

As I mentioned in the last post, setting up BGP was a prerequisite to this post – so since that’s the case – Im going to pick up right where I left off.  So I’ll post the lab topology picture here for the sake of posting a lab topology – but if you want to get your configuration prepped – take a look at the last post.  At the end of the last post we had our Continue reading

Ansible 2.5: LAUNCH AN Azure CONTAINER INSTANCE

Ansible_and_MicrosoftAzure

The Ansible 2.5 release includes an additional 13 Azure modules for automators to use in their hybrid cloud journey. We have a goal of making automation as accessible as possible. As part of this goal, we are working with technology partners to bring additional automation know-how to the Ansible blog.

Special thanks to Kylie Liang from the Microsoft Azure DevEx team for giving us a closer look at one of the new Azure module features.

---

Launch an Azure Container Instance 

For this blog entry, we wanted to share a step by step guide to using the Azure Container Instance module that has been included in Ansible 2.5.

The Container Instance service is a PaaS offering on Azure that is designed to let users run containers without managing any of the underlying infrastructure. The Ansible Azure Container Instance module allows users to create, update and delete an Azure Container Instance.

Getting Started

For the purposes of this blog, we’ll assume that you are new to Azure and Ansible and want to automate the Container Instance service. This tutorial will guide you through automating the following steps:

  • Install Ansible and Docker
  • Set up credentials for your Azure modules
  • Create an Continue reading

Video Series: Modernizing Java Apps for Developers Part 5

Moving a monolithic application to a modern cloud architecture can be difficult and often result in a greenfield development effort. However, it is possible to move towards a cloud architecture using Docker Enterprise Edition (EE) with no code changes and gain portability, security and efficiency in the process.

To conclude the series In part 5, I use the message service’s REST endpoint to replace one part of the application UI with a Javascript client. The original application client UI was written in Java Server Pages (JSP) so that any UI changes required the application to be recompiled and redeployed. I can use modern web tools and frameworks such as React.js to write a new client interface. I’ll build the new client using a multi-stage build and deploy it by adding the container to the Docker Compose file. I’ll also show how to deploy the entire application from your development to Docker EE to make it available for testing.

Modernizing Java Apps for Developers shows how to take an existing Java N-tier application and run it in containers using the Docker platform to modernize the architecture. The source code for each part of this series is available on github and Continue reading

NetDevOpEd: Automation – start small, dream big

I’ve seen a number of blogs and articles describing what network automation is and what it entails, and in many cases, the descriptions end up frightening people who haven’t yet started down an automation path. The biggest question when starting any of these sorts of projects is the simplest: should you automate at all?

My answer to that first question (Spoiler alert: it’s yes, but let me explain why) is that it depends on your network itself. For years, before I was involved with networking at the operating system level, I worked on network management and automation products. Often, I’d tell my customers that if they were happy with the status quo, then I certainly wouldn’t force them down a particular path or to use a particular product. However, if you’re a bit fed up with the manual steps involved in updating a device operating system or configuring a device, then you should look into automation to save yourself time and headaches. Of course, if you only have three devices and they get updated yearly, maybe don’t bother. But if you believe automation will provide the solutions you’re looking for, there are some first steps for automation that you Continue reading

Docker Registry API to be standardized in OCI

We are excited to announce that the Docker Registry HTTP API V2 specification will be adopted in the Open Container Initiative (OCI), the organization under the Linux Foundation that provides the standards that fuel the containerization industry. The Docker team is proud to see another aspect of our technology stack become a de-facto standard. As we’ve done with our image format, we are happy to formally share and collaborate with the container ecosystem as part of the OCI community. Our distribution protocol is the underpinning of all container registries on the market and is so robust that it is leveraged over a billion times every two weeks as container content is distributed across the globe.

What does this protocol do?

Putting the protocol into perspective, part of the core functionality of Docker is the ability to push and pull images. From the first “Hello, World” moment, this concept is introduced to every user and is a large part of the Docker experience. While we normally sit back in our armchairs and marvel at this magical occurence, the amount of design and consideration that has gone into that simple capability can easily be overlooked.

When Docker was first released, the team Continue reading