Microsoft .Net Core: Finally ready for prime time

It’s risky and often foolish to rush into a new software development framework, programming language, or technology platform too early in its lifecycle. Beyond the usual issues of too much hype and too little stability, new tech tends to lack staying power. You might end up investing precious time and effort into learning the ways of a tool that becomes abandoned or, worse, eliminated. It happens more often than you might think.To read this article in full or to leave a comment, please click here(Insider Story)

FAQ: The real impact of Trump’s H-1B executive order

President Donald Trump is calling for "a long-overdue reform of H-1B visas." But what changes does he want, and can he get Congress to agree?Here's a look at some some of the key questions around Trump's visa reform effort and his "Hire American, Buy American" executive order.What's the most important thing that Trump wants to accomplish?In issuing his executive order, Trump called the "totally random" H-1B lottery "wrong." He wants the visas distributed to "the most-skilled and highest-paid" applicants. He wants to end "abuse."To read this article in full or to leave a comment, please click here

12 free utilities that can give you more control over your PC

Tweak Windows to your willImage by Bet Noire / iStockThere are some very good reasons why you might want to peer behind the scenes of your Windows PC. Maybe you want to tweak your system to maximize performance, or maybe you just want to know what your computer is doing underneath those slick desktop graphics. Either way, here are 12 free programs you can use to fully monitor and manage your Windows experience.To read this article in full or to leave a comment, please click here

Top IT hiring trends for recent grads

TEKsystems, a provider of IT staffing services, released the results of a survey highlighting the best IT jobs and key hiring trends for recent graduates. The survey asked more than 250 IT hiring managers across the U.S. what they're looking for in entry-level IT candidates and what the best opportunities are for graduates.To read this article in full or to leave a comment, please click here(Insider Story)

Why you need a systems reliability engineer

How can you ensure that the software and services you build today can deliver what your customers and consumers need in the future? If this is a question you think your organization should be asking, then you might need a systems reliability engineer (SRE). SREs are software engineers who focus on the reliability and uptime of applications and services not just in the short-term, but with a focus on scalability and long-term use.Sometimes referred to as "site reliability engineer," or "services reliability engineer," this engineering role is one that's finding its footing as DevOps practices take hold in IT departments, says Jason Hand, DevOps evangelist and incident and alerting specialist with VictorOps. The roles are most prevalent in cloud services, SaaS, PaaS and Iaas companies whose clients rely on them to keep those services available 24/7/365, he says. For organizations that rely on uptime, availability and reliability, an SRE is a logical talent add, as every minute of downtime chips away at the bottom line, Hand says.To read this article in full or to leave a comment, please click here

Episode 2 – Choosing A Routing Protocol

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another.  Is there any difference between IGP routing protocols at this point?  When does it make sense to run BGP in an enterprise network?  Is IS-IS an old and decaying protocol, or something you should viably consider?  Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Russ White
Guest
Kevin Myers
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 2 – Choosing A Routing Protocol appeared first on Network Collective.

Episode 2 – Choosing A Routing Protocol

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another.  Is there any difference between IGP routing protocols at this point?  When does it make sense to run BGP in an enterprise network?  Is IS-IS an old and decaying protocol, or something you should viably consider?  Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Russ White
Guest
Kevin Myers
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 2 – Choosing A Routing Protocol appeared first on Network Collective.

9 tips to turn your data center green

Going greenImage by ThinkstockData center providers know all too well that it’s not easy being green. According to a 2016 report by the Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab), data centers are responsible for close to 2 percent of U.S. energy consumption. Ensuring the integrity of these systems is a major challenge for data centers looking to create sustainable operations for their facilities and the companies who rely on them, but some simple steps can make all the difference.To read this article in full or to leave a comment, please click here

9 tips to turn your data center green

Going greenImage by ThinkstockData center providers know all too well that it’s not easy being green. According to a 2016 report by the Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab), data centers are responsible for close to 2 percent of U.S. energy consumption. Ensuring the integrity of these systems is a major challenge for data centers looking to create sustainable operations for their facilities and the companies who rely on them, but some simple steps can make all the difference.To read this article in full or to leave a comment, please click here

Stand for Leadership: The choice is yours

The world of today mostly buzzes with social media and hashtags. For a youth it’s a complicated dynamic world of Internet with tons and tons of messages and notifications that pop up every other minute, and where no Internet means no life. 

As a journalist, blogger, activist and a consultant, the Internet made me who I am and still I am exploring the possibilities of my virtue. Nothing was easy but the point is standing for change. 

I realized the power of Internet when I published a story in one of the citizen journalism sites, Ground Report, and it was picked up by Access Now and they launched an international campaign “Nepal Shutdown Showdown”.  

Shreedeep Rayamajhi

Tencent adding five data centers to target cloud users outside China

Tencent Holdings has opened a data center in Silicon Valley on Tuesday, with four more planned outside China as part of its bid to grow its cloud business outside the country.The proposed data centers in Frankfurt, Mumbai, Seoul and Moscow are targeted at Chinese companies looking to expand overseas and international companies expanding their businesses in China or other parts of the world, the Chinese internet giant said Tuesday. The centers are expected to go into operation this year.Rival Alibaba has also set up data centers outside China to expand its cloud business outside the country.The new investment aims to meet growing demand worldwide for the company's cloud services from online games and finance, video and other internet-related industries.To read this article in full or to leave a comment, please click here

Tencent adding five data centers to target cloud users outside China

Tencent Holdings has opened a data center in Silicon Valley on Tuesday, with four more planned outside China as part of its bid to grow its cloud business outside the country.The proposed data centers in Frankfurt, Mumbai, Seoul and Moscow are targeted at Chinese companies looking to expand overseas and international companies expanding their businesses in China or other parts of the world, the Chinese internet giant said Tuesday. The centers are expected to go into operation this year.Rival Alibaba has also set up data centers outside China to expand its cloud business outside the country.The new investment aims to meet growing demand worldwide for the company's cloud services from online games and finance, video and other internet-related industries.To read this article in full or to leave a comment, please click here

“Fast and Furious 8: Fate of the Furious”

So "Fast and Furious 8" opened this weekend to world-wide box office totals of $500,000,000. I thought I'd write up some notes on the "hacking" in it. The tl;dr version is this: yes, while the hacking is a bit far fetched, it's actually more realistic than the car chase scenes, such as winning a race with the engine on fire while in reverse.

[SPOILERS]


Car hacking



The most innovative cyber-thing in the movie is the car hacking. In one scene, the hacker takes control of the cars in a parking structure, and makes them rain on to the street. In another scene, the hacker takes control away from drivers, with some jumping out of their moving cars in fear.

How real is this?

Well, today, few cars have a mechanical link between the computer and the steering wheel. No amount of hacking will fix the fact that this component is missing.

With that said, most new cars have features that make hacking possible. I'm not sure, but I'd guess more than half of new cars have internet connections (via the mobile phone network), cameras (for backing up, but also looking forward for lane departure warnings), braking (for emergencies), and acceleration.

Continue reading

Kubernetes networking 101 – (Basic) External access into the cluster

In our last post we talked about an important Kubernetes networking construct – the service.  Services provide a means for pods running within the cluster to find other pods and also provide rudimentary load balancing capabilities.  We saw that services can create DNS entries within Kube-DNS which makes the service accessible by name as well.  So now that we know how you can use services to access pods within the cluster it seems prudent to talk about how things outside of the cluster can access these same services.  It might make sense to use the same service construct to provide this functionality, but recall that the services are assigned IP addresses that are only known to the cluster.  In reality, the service CIDR isnt actually routed anywhere but the Kubernetes nodes know how to interact with service IPs because of the netfilter rules programmed by the kube-proxy.  The service network just needs to be unique so that the containers running in the pod will follow their default route out to the host where the netfilter rules will come into play.  So really the service network is sort of non-existent from a routing perspective as it’s only locally significant to each host. Continue reading

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by stealing access tokens too. It's sneaky hack that's particularly worrisome, because it can circumvent Google's 2-step verification, according to security firm Trend Micro. The group, known as Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by stealing access tokens too. It's sneaky hack that's particularly worrisome, because it can circumvent Google's 2-step verification, according to security firm Trend Micro. The group, known as Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here

Big News About the Full Stack Journey Podcast

If you’ve been following the Full Stack Journey podcast, you know that the podcast has been silent for a few months. Some of that was due to some adverse situations in life (it happens to all of us from time to time), but some of it was due to the coordination of a major transition in the podcast. And that’s the big news I’m here to share—read on for the full details!

If you’ve been in the IT industry for any reasonable length of time, especially in the networking space, you’ve probably heard of the Packet Pushers Podcast. It’s a hugely popular podcast created by Greg Ferro and Ethan Banks. In recent years, Packet Pushers has expanded from the “main show” to include other shows, including the Datanauts podcast (led by Chris Wahl and Ethan Banks). They’ve also been looking to expand their stable of podcasts to include additional relevant content.

This brings me to the big news: the Full Stack Journey podcast is joining the Packet Pushers network of podcasts! That’s right—the Full Stack Journey will be part of Packet Pushers’ growing network of podcasts. In talking with Greg and Ethan and the rest of the Packet Pushers team, Continue reading