Episode 2 – Choosing A Routing Protocol

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another.  Is there any difference between IGP routing protocols at this point?  When does it make sense to run BGP in an enterprise network?  Is IS-IS an old and decaying protocol, or something you should viably consider?  Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Russ White
Guest
Kevin Myers
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 2 – Choosing A Routing Protocol appeared first on Network Collective.

Episode 2 – Choosing A Routing Protocol

In episode 2 our panel discusses some key differences between routing protocols and the details that should be considered before choosing to implement one over another.  Is there any difference between IGP routing protocols at this point?  When does it make sense to run BGP in an enterprise network?  Is IS-IS an old and decaying protocol, or something you should viably consider?  Russ White, Kevin Myers, and the co-hosts of Network Collective tackle these questions and more.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Russ White
Guest
Kevin Myers
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 2 – Choosing A Routing Protocol appeared first on Network Collective.

9 tips to turn your data center green

Going greenImage by ThinkstockData center providers know all too well that it’s not easy being green. According to a 2016 report by the Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab), data centers are responsible for close to 2 percent of U.S. energy consumption. Ensuring the integrity of these systems is a major challenge for data centers looking to create sustainable operations for their facilities and the companies who rely on them, but some simple steps can make all the difference.To read this article in full or to leave a comment, please click here

9 tips to turn your data center green

Going greenImage by ThinkstockData center providers know all too well that it’s not easy being green. According to a 2016 report by the Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab), data centers are responsible for close to 2 percent of U.S. energy consumption. Ensuring the integrity of these systems is a major challenge for data centers looking to create sustainable operations for their facilities and the companies who rely on them, but some simple steps can make all the difference.To read this article in full or to leave a comment, please click here

Stand for Leadership: The choice is yours

The world of today mostly buzzes with social media and hashtags. For a youth it’s a complicated dynamic world of Internet with tons and tons of messages and notifications that pop up every other minute, and where no Internet means no life. 

As a journalist, blogger, activist and a consultant, the Internet made me who I am and still I am exploring the possibilities of my virtue. Nothing was easy but the point is standing for change. 

I realized the power of Internet when I published a story in one of the citizen journalism sites, Ground Report, and it was picked up by Access Now and they launched an international campaign “Nepal Shutdown Showdown”.  

Shreedeep Rayamajhi

Tencent adding five data centers to target cloud users outside China

Tencent Holdings has opened a data center in Silicon Valley on Tuesday, with four more planned outside China as part of its bid to grow its cloud business outside the country.The proposed data centers in Frankfurt, Mumbai, Seoul and Moscow are targeted at Chinese companies looking to expand overseas and international companies expanding their businesses in China or other parts of the world, the Chinese internet giant said Tuesday. The centers are expected to go into operation this year.Rival Alibaba has also set up data centers outside China to expand its cloud business outside the country.The new investment aims to meet growing demand worldwide for the company's cloud services from online games and finance, video and other internet-related industries.To read this article in full or to leave a comment, please click here

Tencent adding five data centers to target cloud users outside China

Tencent Holdings has opened a data center in Silicon Valley on Tuesday, with four more planned outside China as part of its bid to grow its cloud business outside the country.The proposed data centers in Frankfurt, Mumbai, Seoul and Moscow are targeted at Chinese companies looking to expand overseas and international companies expanding their businesses in China or other parts of the world, the Chinese internet giant said Tuesday. The centers are expected to go into operation this year.Rival Alibaba has also set up data centers outside China to expand its cloud business outside the country.The new investment aims to meet growing demand worldwide for the company's cloud services from online games and finance, video and other internet-related industries.To read this article in full or to leave a comment, please click here

“Fast and Furious 8: Fate of the Furious”

So "Fast and Furious 8" opened this weekend to world-wide box office totals of $500,000,000. I thought I'd write up some notes on the "hacking" in it. The tl;dr version is this: yes, while the hacking is a bit far fetched, it's actually more realistic than the car chase scenes, such as winning a race with the engine on fire while in reverse.

[SPOILERS]


Car hacking



The most innovative cyber-thing in the movie is the car hacking. In one scene, the hacker takes control of the cars in a parking structure, and makes them rain on to the street. In another scene, the hacker takes control away from drivers, with some jumping out of their moving cars in fear.

How real is this?

Well, today, few cars have a mechanical link between the computer and the steering wheel. No amount of hacking will fix the fact that this component is missing.

With that said, most new cars have features that make hacking possible. I'm not sure, but I'd guess more than half of new cars have internet connections (via the mobile phone network), cameras (for backing up, but also looking forward for lane departure warnings), braking (for emergencies), and acceleration.

Continue reading

Kubernetes networking 101 – (Basic) External access into the cluster

In our last post we talked about an important Kubernetes networking construct – the service.  Services provide a means for pods running within the cluster to find other pods and also provide rudimentary load balancing capabilities.  We saw that services can create DNS entries within Kube-DNS which makes the service accessible by name as well.  So now that we know how you can use services to access pods within the cluster it seems prudent to talk about how things outside of the cluster can access these same services.  It might make sense to use the same service construct to provide this functionality, but recall that the services are assigned IP addresses that are only known to the cluster.  In reality, the service CIDR isnt actually routed anywhere but the Kubernetes nodes know how to interact with service IPs because of the netfilter rules programmed by the kube-proxy.  The service network just needs to be unique so that the containers running in the pod will follow their default route out to the host where the netfilter rules will come into play.  So really the service network is sort of non-existent from a routing perspective as it’s only locally significant to each host. Continue reading

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by stealing access tokens too. It's sneaky hack that's particularly worrisome, because it can circumvent Google's 2-step verification, according to security firm Trend Micro. The group, known as Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by stealing access tokens too. It's sneaky hack that's particularly worrisome, because it can circumvent Google's 2-step verification, according to security firm Trend Micro. The group, known as Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here

Big News About the Full Stack Journey Podcast

If you’ve been following the Full Stack Journey podcast, you know that the podcast has been silent for a few months. Some of that was due to some adverse situations in life (it happens to all of us from time to time), but some of it was due to the coordination of a major transition in the podcast. And that’s the big news I’m here to share—read on for the full details!

If you’ve been in the IT industry for any reasonable length of time, especially in the networking space, you’ve probably heard of the Packet Pushers Podcast. It’s a hugely popular podcast created by Greg Ferro and Ethan Banks. In recent years, Packet Pushers has expanded from the “main show” to include other shows, including the Datanauts podcast (led by Chris Wahl and Ethan Banks). They’ve also been looking to expand their stable of podcasts to include additional relevant content.

This brings me to the big news: the Full Stack Journey podcast is joining the Packet Pushers network of podcasts! That’s right—the Full Stack Journey will be part of Packet Pushers’ growing network of podcasts. In talking with Greg and Ethan and the rest of the Packet Pushers team, Continue reading

Palantir to pay $1.7 million to settle racial hiring bias claim

Data analytics company Palantir will pay US$1.7 million in back pay and stock options to settle charges that it routinely discriminated against Asian job applicants. In addition, it must also hire eight people from among those it allegedly discriminated against.The charges go back to September last year, when the Department of Labor accused Palantir of rejecting Asian software engineers for jobs even though they were as qualified as white applicants. Palantir also maintained a discriminatory employee referral system, the Labor Dept. alleged.Tuesday's deal ends a threat to Palantir's government contracting business. Under federal law, companies that work for the government are obliged to ensure their hiring practices and policies are free of all forms of discrimination.To read this article in full or to leave a comment, please click here

Old Windows Server machines can still fend off hacks. Here’s how

If you're running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.That's due to the internet release earlier this month of a batch of updates that paint a bulls-eye on computers running Windows Server 2003, according to security researchers.“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.To read this article in full or to leave a comment, please click here

Old Windows Server machines can still fend off hacks. Here’s how

If you're running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.That's due to the internet release earlier this month of a batch of updates that paint a bulls-eye on computers running Windows Server 2003, according to security researchers.“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.To read this article in full or to leave a comment, please click here

Huawei, Google supercharge Android with new Raspberry Pi-like board

Prepare to run Android at blazing fast speeds on a new Raspberry Pi-like computer developed by Huawei.Huawei's HiKey 960 computer board is priced at US$239 but has some of the latest CPU and GPU technologies. Google, ARM, Huawei, Archermind, and LeMaker all played roles in developing the board.The HiKey 960 is meant to be a go-to PC for Android or a tool to develop software and drivers for the OS. The board development was backed by Linaro, an organization that develops software packages for the Android OS and  ARM architecture.Linaro CEO George Grey recently said it was sad that Android developers had to write code on x86 chips. He encouraged the organization's members to build a superfast computer so developers could build ARM software on ARM architecture. Intel has scaled back Android support on x86 PCs and isn't making smartphone chips.To read this article in full or to leave a comment, please click here

Discounted CleanMyMac 3 with Gemini 2 Space Saving Bundle – Deal Alert

CleanMyMac 3 with Gemini 2 in tow is like a professional cleaning team for your Mac. The all-new CleanMyMac 3 will clean, optimize, and maintain your Mac. It scans every inch of your system, removes gigabytes of junk in just two clicks, and monitors the health of your Mac. Gemini 2 finds duplicate files and wipes them away. It's smart, laser accurate, and recovers tons of space on your Mac. Right now, when purchased together, the bundle will be discounted 10%. See this deal now on MacPaw (see under "Space Saving Bundle"). Alternatively, if you're looking to purchase just one, you can access CleanMyMac 3 here, and Gemini 2 right here.To read this article in full or to leave a comment, please click here

Cisco Jasper package manages everything enterprise mobile

Cisco today announced an enterprise management package designed to help users monitor and control the data usage operation of the tons of mobile devices in their networks.Cisco Jasper’s Control Center for Mobile Enterprise is an extension of Jasper’s overarching Control Center IoT service platform, now directed at letting enterprise customers turn up services more quickly, and since it ultimately will be integrated directly into service provider networks will allow for real-time usage data, automated cost control and what Jasper calls “enterprise-grade self-serve management of mobile services and assets.”Like Control Center for IoT, Cisco Jasper’s Mobile Enterprise features are delivered through a service provider and in for now only Canadian telco Telus offers the plan. Cisco Jasper says others will soon follow, but a timetable remains open. The company has 50 service providers offering Control Center services worldwide.To read this article in full or to leave a comment, please click here