IoT and the law of unintended consequences

You’ve probably already heard about the latest Internet of Things (IoT) security fiasco — coverage has gone far beyond the tech press into the mainstream TV news. In case you haven’t been paying attention, though, here’s the elevator pitch version:Fitness network Strava publishes a global heatmap of where users are running and working out using its services, and folks just figured out that the map includes information that could reveal the locations of military forces working out in sensitive and sometimes secret locations. One expert worried that “tracking the timing of movements on bases could provide valuable information on patrol routes or where specific personnel are deployed.”To read this article in full, please click here

IoT and the law of unintended consequences

You’ve probably already heard about the latest Internet of Things (IoT) security fiasco — coverage has gone far beyond the tech press into the mainstream TV news. In case you haven’t been paying attention, though, here’s the elevator pitch version:Fitness network Strava publishes a global heatmap of where users are running and working out using its services, and folks just figured out that the map includes information that could reveal the locations of military forces working out in sensitive and sometimes secret locations. One expert worried that “tracking the timing of movements on bases could provide valuable information on patrol routes or where specific personnel are deployed.”To read this article in full, please click here

IDG Contributor Network: Choosing ISPs for SD-WAN: don’t be pound foolish

I was in the local Best Buy the other day and overheard a conversation between a saleswoman and a father looking to buy a computer for his daughter. Apparently, the daughter is a designer, which of course requires lots of heavy graphics work. Anyway, the saleswoman was trying to explain how he should invest a little bit more in an expensive graphics card because of her work. The father wouldn’t hear of it. He wanted the least expensive machine possible.It was a mistake.Part of the art of life is knowing when and where to invest your resources for maximum return. Sometimes less is, well, less and investing a bit more really can make a difference. I know you didn’t come to this blog for self-help advice, but life’s truism has real-world implications for wide area networks and, in particular, when selecting the Internet infrastructure underlying your SD-WAN.To read this article in full, please click here

IDG Contributor Network: Choosing ISPs for SD-WAN: don’t be pound foolish

I was in the local Best Buy the other day and overheard a conversation between a saleswoman and a father looking to buy a computer for his daughter. Apparently, the daughter is a designer, which of course requires lots of heavy graphics work. Anyway, the saleswoman was trying to explain how he should invest a little bit more in an expensive graphics card because of her work. The father wouldn’t hear of it. He wanted the least expensive machine possible.It was a mistake.Part of the art of life is knowing when and where to invest your resources for maximum return. Sometimes less is, well, less and investing a bit more really can make a difference. I know you didn’t come to this blog for self-help advice, but life’s truism has real-world implications for wide area networks and, in particular, when selecting the Internet infrastructure underlying your SD-WAN.To read this article in full, please click here

Aruba v Aerohive in customer reviews

When choosing the wireless LAN gear to be used in enterprises, it's important to look at security, reliability and ease of system management, and that's exactly what a group of Aruba and Aerohive customers have done.To read this article in full, please click here(Insider Story)

History Of Networking – Paul Vixie – DNS Adoption

In a continued look at the history of DNS on the Internet, Paul Vixie joins Network Collective to talk about the adoption process of DNS.


Paul Vixie
Guest
Russ White
Host
Donald Sharp
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Paul Vixie – DNS Adoption appeared first on Network Collective.

Getting Started: LDAP Authentication in Ansible Tower

Ansible Getting Started LDAP

Next in the Getting Started series is covering the basics of configuring Red Hat Ansible Tower to allow users to log in with LDAP credentials. In this post, we'll explain a few troubleshooting tips to help narrow down problems and correct them. As long as you have a map of your LDAP tree/forest, this post should help get users logging in with their LDAP credentials.

CONFIGURATION SETTINGS

To configure your Ansible Tower for LDAP authentication, navigate to Settings (the gear icon) and to the "Configure Tower" section. The area within these configuration settings we're focusing on is "Authentication", and the sub category should be set to "LDAP".

Ansible-Getting-Started-Tower-LDAP-7

The fields that will be the primary focus are:

  • LDAP server URI
  • Bind DN and password
  • User/group searches

The other fields will allow you to refine your LDAP searches to reduce the resources used in production or map your organization.

The LDAP URI is simply the IP or hostname of your LDAP server prepended with the protocol (ldap://).


The bind DN will be a user credential and password (followed by the group and domain) with access to read the LDAP structure.

REFINING USER SEARCH

With Ansible Tower able to connect to the LDAP Continue reading

IT budgets remain tight due to cloud migration

For the third straight year, IT organizations are keeping tight control over their IT budgets, but not because of economic uncertainty. Instead, the hesitancy to spend is because of the transition to the cloud.That’s the findings from IT market research firm Computer Economics, which published the report Worldwide IT Spending and Staffing Outlook for 2018 (paywall), and it echoes a common finding that on-premises computing continues to fall out of favor as IT shops look to migrate as much work as possible to the public cloud.“Typically, before the cloud transition, companies would grow IT budgets roughly to match expected revenue growth,” said David Wagner, vice president of research for Computer Economics in a statement. “This is no longer true in regions of higher cloud adoption, such as the U.S. and Canada, where IT budgets are not keeping pace with revenue growth.”To read this article in full, please click here

IT budgets remain tight due to cloud migration

For the third straight year, IT organizations are keeping tight control over their IT budgets, but not because of economic uncertainty. Instead, the hesitancy to spend is because of the transition to the cloud.That’s the findings from IT market research firm Computer Economics, which published the report Worldwide IT Spending and Staffing Outlook for 2018 (paywall), and it echoes a common finding that on-premises computing continues to fall out of favor as IT shops look to migrate as much work as possible to the public cloud.“Typically, before the cloud transition, companies would grow IT budgets roughly to match expected revenue growth,” said David Wagner, vice president of research for Computer Economics in a statement. “This is no longer true in regions of higher cloud adoption, such as the U.S. and Canada, where IT budgets are not keeping pace with revenue growth.”To read this article in full, please click here

IDG Contributor Network: A software defined network requires reinventing IT devops

It’s common for a newly released application to have a few bugs in it. Customers may grumble, and IT service requests may increase, but life goes on and people will figure out how to work around the issues. The same cannot be said for a network software upgrade. If the network goes down, everything grinds to a halt, and service to employees and customers ceases.In the old hardware network model, an operator relied on three to four vendors to run annual or semiannual upgrades, and even that process put the network’s resiliency at risk.  As networks transition to a software model, they are supported by a myriad of best-of-breed partners and a more diverse ecosystem, increasing the frequency of updates and therefore the degree of network vulnerability. In addition, the technology implemented is less mature, resulting in greater network exposure to errors and risk.To read this article in full, please click here

IDG Contributor Network: A software defined network requires reinventing IT devops

It’s common for a newly released application to have a few bugs in it. Customers may grumble, and IT service requests may increase, but life goes on and people will figure out how to work around the issues. The same cannot be said for a network software upgrade. If the network goes down, everything grinds to a halt, and service to employees and customers ceases.In the old hardware network model, an operator relied on three to four vendors to run annual or semiannual upgrades, and even that process put the network’s resiliency at risk.  As networks transition to a software model, they are supported by a myriad of best-of-breed partners and a more diverse ecosystem, increasing the frequency of updates and therefore the degree of network vulnerability. In addition, the technology implemented is less mature, resulting in greater network exposure to errors and risk.To read this article in full, please click here

Deep Learning is the Next Platform for Pathology

It is a renaissance for companies that sell GPU-dense systems and low-power clusters that are right for handling AI inference workloads, especially as they look to the healthcare market–one that for a while was moving toward increasing compute on medical devices.

The growth of production deep learning in medical imaging and diagnostics has spurred investments in hospitals and research centers, pushing high performance systems for medicine back to the forefront.

We have written quite a bit about some of the emerging use cases for deep learning in medicine with an eye on the systems angle in particular, and while these

Deep Learning is the Next Platform for Pathology was written by Jeffrey Burt at The Next Platform.

Rust 로 복잡한 매크로를 작성하기: 역폴란드 표기법​

Rust 로 복잡한 매크로를 작성하기: 역폴란드 표기법​

This is a Korean translation of a prior post.


(이 글은 제 개인 블로그에 게시된 튜토리얼을 다시 올린 것입니다)

Rust에는 흥미로운 기능이 많지만 그중에도 강력한 매크로 시스템이 있습니다. 불행히도 The Book[1]과 여러가지 튜토리얼을 읽고 나서도 서로 다른 요소의 복잡한 리스트를 처리하는 매크로를 구현하려고 하면 저는 여전히 어떻게 만들어야 하는지를 이해하는데 힘들어 하며, 좀 시간이 지나서 머리속에 불이 켜지는 듯한 느낌이 들면 그제서야 이것저것 매크로를 마구 사용하기 시작 합니다. :) (맞아요, 난-매크로를-써요-왜냐하면-함수나-타입-지정이나-생명주기를-쓰고-싶어하지-않아서 처럼과 같은 이유는 아니지만 다른 사람들이 쓰는걸 봤었고 실제로 유용한 곳이라면 말이죠)

Rust 로 복잡한 매크로를 작성하기: 역폴란드 표기법​
CC BY 2.0 image by Conor Lawless

그래서 이 글에서는 제가 생각하는 그런 매크로를 쓰는 데 필요한 원칙을 설명하고자 합니다. 이 글에서는 The Book의 매크로 섹션을 읽어 보았고 기본적인 매크로 정의와 토큰 타입에 대해 익숙하다고 가정하겠습니다.

이 튜토리얼에서는 역폴란드 표기법 (Reverse Polish Notation, RPN)을 예제로 사용합니다. 충분히 간단하기 때문에 흥미롭기도 하고, 학교에서 이미 배워서 익숙할 지도 모르고요. 하지만 컴파일 시간에 정적으로 구현하기 위해서는 재귀적인 매크로를 사용해야 할 것입니다.

역폴란드 표기법(후위 또는 후치 표기법으로 불리기도 합니다)은 모든 연산에 스택을 사용하므로 연산 대상을 스택에 넣고 [이진] 연산자는 연산 대상 두개를 스택에서 가져와서 결과를 평가하고 다시 스택에 넣습니다. 따라서 다음과 같은 식을 생각해 보면:

2 3 + 4 *

이 식은 다음과 같이 해석됩니다:

  1. 2 Continue reading

Writing complex macros in Rust: Reverse Polish Notation

Writing complex macros in Rust: Reverse Polish Notation

(This is a crosspost of a tutorial originally published on my personal blog)

Among other interesting features, Rust has a powerful macro system. Unfortunately, even after reading The Book and various tutorials, when it came to trying to implement a macro which involved processing complex lists of different elements, I still struggled to understand how it should be done, and it took some time till I got to that "ding" moment and started misusing macros for everything :) (ok, not everything as in the i-am-using-macros-because-i-dont-want-to-use-functions-and-specify-types-and-lifetimes everything like I've seen some people do, but anywhere it's actually useful)

Writing complex macros in Rust: Reverse Polish Notation
CC BY 2.0 image by Conor Lawless

So, here is my take on describing the principles behind writing such macros. It assumes you have read the Macros section from The Book and are familiar with basic macros definitions and token types.

I'll take a Reverse Polish Notation as an example for this tutorial. It's interesting because it's simple enough, you might be already familiar with it from school, and yet to implement it statically at compile time, you already need to use a recursive macros approach.

Reverse Polish Notation (also called postfix notation) uses a stack for all its operations, Continue reading