Most acute storage pain points, letdowns

Things don’t always go as planned with new technologies. Two new research reports document the struggles, disappointments and false starts that challenge enterprise storage pros as they modernize their infrastructures for digital business.451 Research asked enterprise IT pros to rank their most pressing storage pains. “Data/capacity growth” landed in the top spot, according to the firm’s research brief. “Meeting disaster recovery requirements” and “high cost of storage” ranked second and third, respectively, among survey respondents.“The core challenges in storage are shifting; public cloud is beginning to assume the burden of inexorable data growth, and the emphasis is moving to other areas, such as effectively managing data and storage across both on- and off-premises locations,” according to Simon Robinson, research vice president at 451 Research and author of the report, Top three storage pain points for enterprise customers.To read this article in full or to leave a comment, please click here

Shrubbery.net TACACS+ daemon and Junos

Axians Professional Services normally recommends using RADIUS authentication to our customers, but one of our customers uses TACACS.  We did some type-approval testing of new Junos release for them recently and had to set up a TACACS+ daemon in the lab to make sure authentication still worked following the upgrade.

Shrubbery.net very helpfully provide a TACACS+ implementation that you can download to a Linux host for this purpose, but the documentation is a bit light on their website, and what you find using Google is naturally somewhat Cisco-specific.  So here are some notes on getting a basic setup going with Shrubbery’s tac_plus daemon and Junos.  Maybe this will help someone else.

 

Create the Junos Config

First, you need to set up the Junos side of things.  You need to do three things:

  1. Create a tacplus-server in the config
  2. Add tacplus to the authentication-order
  3. Create a ‘local user’ account that has no password, but gives anyone belonging to it the appropriate privileges.

 

Create the TACACS server

axians@MX104-1-re0> show configuration system tacplus-server | display set

set system tacplus-server 192.168.3.237 port 49
set system tacplus-server 192.168.3.237 secret testing123
set system tacplus-server 192.168.3. Continue reading

FPGAs, OpenHMC Push SKA HPC Processing Capabilities

Astronomy is the oldest research arena, but the technologies required to process the massive amount of data created from radio telescope arrays represents some of the most bleeding-edge research in modern computer science.

With an exabyte of data expected to stream off the Square Kilometer Array (SKA), teams from both the front and back ends of the project have major challenges ahead. One “small” part of that larger picture of seeing farther into the universe than ever before is moving the data from the various distributed telescopes into a single unified platform and data format. This means transferring data from

FPGAs, OpenHMC Push SKA HPC Processing Capabilities was written by Nicole Hemsoth at The Next Platform.

New Podcast for the Podcatcher – The Network Collective

I am giving a great big shout out to a new community podcast. The Network Collective is only five session in, AND it is a great podcast. I’m looking forward to catching many future episodes.

Episode 1 – Top 10 Ways To Break Your Network

Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may does not reflect the position of past, present or future employers.

The post New Podcast for the Podcatcher – The Network Collective appeared first on PacketU.

ISOC’s Policy Statement at the WSIS Forum: Support Your Local Heroes

On 13 June 2017, Internet Society Vice President, Global Engagement, Raúl Echeberría, and Senior Director, Global Internet Policy, Constance Bommelaer de Leusse, participated in the Opening Ceremony and the High-Level Policy Session on Bridging Digital Divides at the World Summit on the Information Society Forum (WSIS) 2017. Here are their reflections.

Constance Bommelaer de Leusse
Mr. Raúl Echeberría

Q&A: Fast Application Deployment with Ansible and F5 BIG-IP

Ansible-and-F5-Blog-Header.png

The following post contains answers to questions asked during our webinar about Fast Application Deployment with Ansible and F5 Big-IP.

Q: How can we define BIG-IP in one sentence? What is its significance in DevOps?

F5 BIG-IP is an API-enabled application delivery platform supporting a full seven layers of traffic and security services. It's not a tool that will make DevOps easier per-se, but the BIG-IP has (historically) been difficult to administer in an automated way. These Ansible modules are intended to make it less difficult so that you can drive your BIG-IP devices via code (Ansible) instead of by having to manually configure it via the Web UI.

Q: Is there documentation that details all the F5 modules being presented in the webinar?

The documentation is in two places:

  1. The official list of F5 modules can be found in Ansible docs.
  2. The upstream/community developer docs are on the F5 readthedocs page or you can find many technical resources at F5 devcentral. The latest virtual appliance that you will find are the 13.x branch of BIG-IP module. 

There will be documentation on these modules once the modules are released with Ansible version 2.4. For sample Playbooks on Continue reading

On the ‘web: All you ever wanted to know about EIGRP

In episode 5 the Network Collective panel dives deep into the inner-workings of EIGRP and how to tune the protocol to work best for you. This isn’t your run of the mill EIGRP training session though, so buckle up and dig in to learn a lot about a protocol which appears pretty straight forward on the surface.

This last week I was on the Network Collective discussing EIGRP with Nick Russo; even if you think this protocol is dead, it’s well worth watching or listening to. And if this isn’t enough EIGRP for you, the EIGRP book on Addision-Wesley is another good resource.

eigrp-for-ip

The post On the ‘web: All you ever wanted to know about EIGRP appeared first on rule 11 reader.

Hackers Marketing ‘Most Sophisticated’ Mac Malware Ever

Hackers with their targets set on devices running Apple’s MacOS are selling access to new, sophisticated attacks that can infect machines and hold them for ransom. The attacks, which include a malware-as-a-service (MaaS) known as MacSpy and a ransomware-as-a-service called MacRansom — both of which attackers can purchase to use to direct at a target— …