Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use. Nina Mushiana of @LinkedIn says "Anything that can be documented should be automated".

Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use.

One particular topic that came up was one I’ve struggled with for the past few years; What about Day 2 of network automation? So, we manage to write some Ansible playbooks to push configuration files to switches - what’s next? Often this question isn’t asked. I think the network automation conversation has progressed to the point where we should all start asking this question more often.

I believe that the network engineering discipline is at a crossroads, and the workforce as a whole needs to make some changes and decisions in order to stay relevant. Those changes are all based on the following premise:

The value of the network does not Continue reading

Decoding FSK

Something I’ve been playing with lately is software defined radio with GNURadio. I’m not good at it yet, but I’ve managed to decode the signals from a couple of things.

This is my step-by-step for how I decoded data from a boiler thermostat. I’m not saying it’s the best way, or even a good way. But it’s what got me there.

0. Find the frequency

Often this is written on the device itself. Other times it’s in the manual. If not, then more research is needed, such as by trying to find the manufacturer on fcc.gov or similar.

In this case it was easy. The manual said “868 MHz”, which is in the SRD860 band.

1. Capture some data

When I poked at the controls of the thermostat, saying “please make the room 25 degrees”, the thermostat must send this data to the boiler. I could hear the boiler start up and shut down, so there must be something sent between me pressing the buttons and I heard the results.

I started by centering around 868.5 Mhz with 1Msps. The minimum for the RTL-SDR is 900ksps, so even if you wanted to see less than 1MHz you need Continue reading

Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use.

One particular topic that came up was one I’ve struggled with for the past few years; What about Day 2 of network automation? So, we manage to write some Ansible playbooks to push configuration files to switches - what’s next? Often this question isn’t asked. I think the network automation conversation has progressed to the point where we should all start asking this question more often.

I believe that the network engineering discipline is at a crossroads, and the workforce as a whole needs to make some changes and decisions in order to stay relevant. Those changes are all based on the following premise:

The value of the network does not Continue reading

Google is helping to build another Asia-Pacific submarine cable

Google is investing in another massive undersea fiber-optic cable as a part of its plans to build out network connectivity around the world. The company announced Wednesday that it is helping to fund a project called Indigo, which will connect Jakarta, Singapore, Perth and Sydney to one another.The cable will run for approximately 9,000 kilometers (almost 5,600 miles) and provide a capacity of roughly 18Tbps (bits per second). It's being built to bring users more connectivity in a region that has growing internet needs.Google has now invested in five submarine cables in the Asia-Pacific region and seven overall. By investing in these cables, the company hopes to better compete with other cloud providers and consumer internet companies.To read this article in full or to leave a comment, please click here

Google is helping to build another Asia-Pacific submarine cable

Google is investing in another massive undersea fiber-optic cable as a part of its plans to build out network connectivity around the world. The company announced Wednesday that it is helping to fund a project called Indigo, which will connect Jakarta, Singapore, Perth and Sydney to one another.The cable will run for approximately 9,000 kilometers (almost 5,600 miles) and provide a capacity of roughly 18Tbps (bits per second). It's being built to bring users more connectivity in a region that has growing internet needs.Google has now invested in five submarine cables in the Asia-Pacific region and seven overall. By investing in these cables, the company hopes to better compete with other cloud providers and consumer internet companies.To read this article in full or to leave a comment, please click here

iPhone 8 release date may be pushed back to October or November

We may have some bad news for anyone out there eagerly counting down the days until Apple releases its highly anticipated iPhone 8. According to a fresh report from the Chinese-language Economic Daily News (via Digitimes), the iPhone 8 release date may be pushed back by one or two months due to technical challenges Apple is encountering in the manufacturing process.According to the report, Apple is having some technical problems with the lamination process involved with the iPhone 8's OLED panels. Additionally, the company is seeing some issues with incorporating the device's advanced 3D camera sensors.To read this article in full or to leave a comment, please click here

Most notable tech leaders delivering 2017 college commencement addresses

You’d think ponying up for a technology leader to be your school’s commencement day speaker would be so much less of a hassle than going with a high profile politician such as President Donald Trump or his rival Hillary Clinton, yet 2017 appears to be a lean year for top techies on the college/university commencement circuit.This seems especially true for tech leaders in enterprise networking and IT, whereas in the past the heads of companies such as Cisco, IBM and Salesforce.com have commanded the commencement day stage at top schools.To read this article in full or to leave a comment, please click here

Cisco issues variety of security warnings on wireless gear

Cisco warned of a variety of vulnerabilities – from letting attackers issue DDOS attack to making devices unexpectedly reload -- in some of its wireless access point and LAN gear.The only critical alert came for vulnerability in Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series Access Points.In those devices, running Cisco Mobility Express Software, a vulnerability could let an unauthenticated, remote attacker take complete control of an affected device, the company stated.+More on Network World: Cisco expands wireless reach with access points, management software+To read this article in full or to leave a comment, please click here

Cisco issues variety of security warnings on wireless gear

Cisco warned of a variety of vulnerabilities – from letting attackers issue DDOS attack to making devices unexpectedly reload -- in some of its wireless access point and LAN gear.The only critical alert came for vulnerability in Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series Access Points.In those devices, running Cisco Mobility Express Software, a vulnerability could let an unauthenticated, remote attacker take complete control of an affected device, the company stated.+More on Network World: Cisco expands wireless reach with access points, management software+To read this article in full or to leave a comment, please click here

More high-end GPUs are now compatible with Dell’s 8K monitor

Getting 8K displays to work with Windows 10 PCs can be difficult, as Dell is finding out.But playing with 8K on PCs is a discovery process for Dell, which shipped the first-ever 8K display -- the Dell 32 UltraSharp 8K Monitor -- last week. The small initial stock of the US$5,000 display sold out in a few days.The display won't work on all PCs and needs specific hardware and display ports. But Dell is finding out that more hardware than it originally thought can handle 8K graphics, including AMD's Radeon Pro WX 7100 workstation GPU.To read this article in full or to leave a comment, please click here

Fujitsu Takes On IBM Power9 With Sparc64-XII

While a lot of the applications in the world run on clusters of systems with a relatively modest amount of compute and memory compared to NUMA shared memory systems, big iron persists and large enterprises want to buy it. That is why IBM, Fujitsu, Oracle, Hewlett Packard Enterprise, Inspur, NEC, Unisys, and a few others are still in the big iron racket.

Fujitsu and its reseller partner – server maker, database giant, and application powerhouse Oracle – have made a big splash at the high end of the systems space with a very high performance processor, the Sparc64-XII, and a

Fujitsu Takes On IBM Power9 With Sparc64-XII was written by Timothy Prickett Morgan at The Next Platform.

OPNFV “Danube” upgrade looks to spur open source NFV expansion

Looking to drive the use of Network Functions Virtualization, the OPNFV project this week released the fourth version of its open source platform, known as Danube, that promises to help large organizations and service providers get a better handle on virtualization, SDN and cloud services.+More on Network World: Open source routing project gets a vital technology infusion+Heather Kirksey, director, OPNFV said Danube melds a ton of work that has been done around NFV and brings DevOps methodologies to NFV. “It brings together full next-gen networking stacks in an open, collaborative environment. By harnessing work with upstream communities into an open, iterative testing and deployment domain, we’re delivering the capabilities that truly enable NFV,” Kirksey said.To read this article in full or to leave a comment, please click here

4 reasons Cisco’s IoT forecast is right, and 2 why it’s wrong

Peter Corcoran, Ph.D., who describes himself as long-term IoT skeptic, published a research paper recently on arXiv.org—Third time is the charm – Why the World just might be ready for the Internet of Things this time around (pdf)—in which he speculates that this incarnation of the Internet of Things (IoT) may succeed.Technologies often fail on introduction, later to reemerge and become widely adopted. The PC, smartphone and tablet all went through at least one of these cycles.RELATED: IoT catches on in New England fishing town In the early 1990s, the Consumer Electronics Association first tried to promote CEBus, a specification for interconnecting devices in the home that supported multiple physical layers, including twisted pair, coaxial cable, powerline, wireless and even RF. CEBus was too early.To read this article in full or to leave a comment, please click here

38% off Corsair Gaming SCIMITAR RGB MOBA/MMO Gaming Mouse With Key Slider Mechanical Buttons – Deal Alert

The Scimitar RGB gaming mouse revolutionizes game play with its Key Slider control system, 12 mechanical side buttons, and pro-proven 12,000 DPI optical sensor. It’s purpose built to deliver the ultimate MOBA and MMO gaming experience. Brilliant customizable multicolor backlighting immerses you in the game and provides nearly unlimited lighting adjustability. The gaming mouse averages 4 out of 5 stars from over 380 people on Amazon (read reviews), where its typical list price of $79.99 has been reduced 38% to $49.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Critical Xen hypervisor flaw endangers virtualized environments

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.This is a serious violation of the security barrier enforced by the hypervisor and poses a particular threat to multi-tenant data centers where the customers' virtualized servers share the same underlying hardware.The open-source Xen hypervisor is used by cloud computing providers and virtual private server hosting companies, as well as by security-oriented operating systems like Qubes OS.The new vulnerability affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.To read this article in full or to leave a comment, please click here