Discussing Disruption to IT

Disruption has come to mean different things in the realm of IT. It’s difficult to read social media for a day without seeing the word "disruption" abused by the great marketing machine.

Using this word in the context of "disruption to service" or put it another way, "What happens when something doesn’t work?", it’s difficult to come up with a good anecdote to describe the impact of something going wrong when you’re in front of customers without sounding like another marketeer. I firmly believe in delivering value by "showing" as opposed to just battering your audience with slide ware. 

Still, in networking we are actually going through a period of huge change. The CLI skill set is still dominant and I’m not scare mongering when I say over time this will change. It will. It just won’t change as fast as some people will have you believe. Anyway, I digress. 

Fred

At college, I studied the greatest passion in life I had at the time, which was electronics. The local college department was ok and the material was industry standard stuff. Nothing crazy and out there, but useful and real. We had one super hero in the Continue reading

New products of the week 10.3.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Daptiv TTMKey features: With Daptiv TTM, teams can better track tasks and submit timesheets, stakeholders get a more accurate view of project status, and initiatives move forward on time and on budget. More info.To read this article in full or to leave a comment, please click here

New products of the week 10.3.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Daptiv TTMKey features: With Daptiv TTM, teams can better track tasks and submit timesheets, stakeholders get a more accurate view of project status, and initiatives move forward on time and on budget. More info.To read this article in full or to leave a comment, please click here

Can you hack the vote? Yes, but not how you might think

With Donald Trump already talking about the presidential election being rigged, Symantec has set up a simulated voting station that shows how electronic systems might be hacked to alter actual vote tallies for just a few hundred dollars.+More on Network World: Was Trump bitten by Twitter time-stamp bug that stung Alec Baldwin’s wife?+They found that while it’s possible to change the number of votes cast for each candidate, it would be very difficult to do so on a large enough scale to swing the election one way or the other.To read this article in full or to leave a comment, please click here

Seattle substation is cool enough to draw a crowd

Welcome to the substationImage by NBBJThe typical substation is a high-voltage blot on the landscape. But not this one. Seattle’s Denny substation is under construction in a dense urban neighborhood instead of being screened from the public, and it aims to welcome pedestrians rather than fence out trespassers.To read this article in full or to leave a comment, please click here

Exascale Code Performance and Portability in the Tune of C

Among the many challenges ahead for programming in the exascale era is the portability and performance of codes on heterogeneous machines.

Since the future plan for architectures includes new memory and accelerator capabilities, along with advances in general purpose cores, developing on a solid base that offers flexibility and support for many hardware architectures is a priority. Some contend that the best place to start is with C++, which has been gathering steam in HPC in recent years.

As our own Douglas Eadline noted back in January, choosing a programming language for HPC used to be an easy task. Select

Exascale Code Performance and Portability in the Tune of C was written by Nicole Hemsoth at The Next Platform.

Building a Raspberry Pi-powered Barkometer, Part 4

In Part 3 of my epic series “Building a Raspberry Pi-powered Barkometer”, I covered how to capture audio using the arecord command and how I’d discovered that I got better sound out of an old USB webcam than the fancy-schmancy (but very cheap) USB sound card I started out with. I wound up in Part 3 collecting 60-second sound files in WAV format in a subdirectory on the Raspberry Pi, each named for the sample’s start time (e.g. 2016-09-07-04-42-27.wav).We need to get these files off of the RPi so we can analyze them. In theory, this could be done on the board but for now  we’ll FTP them to another machine for analysis. So, to get the recordings to somewhere we can slice and dice them, we’re going to use ncftpput, an FTP utility included the ncftp package. To install ncftp we'll run the following command on the RPi command line (as always, when installing a new package, you should run sudo apt-get update first):To read this article in full or to leave a comment, please click here

Shadow Brokers rant about people wanting stolen NSA-linked hacking tools for free

The hacking group trying to auction off NSA-linked Equation Group hacking tools is unhappy because no one has coughed up the big bucks yet to buy the exploits.On Saturday, the Shadow Brokers took to Medium to release the group’s third message. The hackers sound hurt that people don’t trust them and – if cursing is any indication – the hackers are angry that the Equation Group cyber weapons auction has flopped so far.The Shadow Brokers want $1 million dollars and sound irritated that interested parties want the stolen hacking tools for free. “Peoples is having interest in free files. But people is no interest in #EQGRP_Auction.”To read this article in full or to leave a comment, please click here

Shadow Brokers rant about people wanting stolen NSA-linked hacking tools for free

The hacking group trying to auction off NSA-linked Equation Group hacking tools is unhappy because no one has coughed up the big bucks yet to buy the exploits.On Saturday, the Shadow Brokers took to Medium to release the group’s third message. The hackers sound hurt that people don’t trust them and – if cursing is any indication – the hackers are angry that the Equation Group cyber weapons auction has flopped so far.The Shadow Brokers want $1 million dollars and sound irritated that interested parties want the stolen hacking tools for free. “Peoples is having interest in free files. But people is no interest in #EQGRP_Auction.”To read this article in full or to leave a comment, please click here

Packet Walk Through-Part 1

The objective of this blog is to discuss end to end packet (client to server)  traversing through a service provider network with special consideration on performance effecting factors.   

 

screenshot

 

 

We will suppose client needs to access any of the service hosted in server connected with CE-2, all the network links and NICs on end system are Ethernet based. Almost all the vendors compute machines (PC/ servers) are generating IP data gram with 1500 bytes size  (20 bytes header +1480  data bytes) in normal circumstances. 

ip

Fragmentation:- If any of link is unable to handle 1500 size IP data-gram then packet will be fragmented and forwarded to its destination where it will be re-assembled. The fragmentation and re-assembly will introduce overhead and  defiantly over all performance will be degraded.  In IP header following fields are important to detect fragmentation and to re-assemble the packets.

  •  Identification:- Is unique for all segments if packet is fragmented at all 
  •  Flags – 3 bits  . Bit 0 always 0, bit 1 -DF (Fermentation allowed or not  0 and 1 respectively), Bit 2-MF (More fragments expected or Last ,  1 and 0 respectively)
  • Fragments Offset :- Determine where data will start after removal of IP header in 1st and subsequent segments once packet is re-assembled.

With below Continue reading

No, Trump’s losses doesn’t allow tax avoidance

The New York Times is reporting that Tump lost nearly a billion dollars in 1995, and this would enable tax avoidance for 18 years. No, it doesn't allow "avoidance". This is not how taxes work.

Let's do a little story problem:

  • You invest in a broad basket of stocks for $100,000
  • You later sell them for $110,000
  • Capital gains rate on this is 20%
  • How much taxes do you owe?

Obviously, since you gained $10,000 net, and tax rate is 20%, you then owe $2,000 in taxes.

But this is only because losses offset gains. All the stocks in your basket didn't go up 10%. Some went up more, some actually lost money. It's not unusual that the losing stocks might go down $50,000, while the gainers go up $60,000, thus giving you the 10% net return, if you are investing in high-risk/high-reward stocks.

What if instead we change the tax code to only count the winners, ignoring the losing stocks. Now, instead of owing taxes on $10,000, you owe taxes on $60,000. At 20% tax rate, this comes out to $12,000 in taxes -- which is actually more than you earned on your investments.

Taxing only investments that Continue reading

Your Guide to LinuxCon and ContainerCon Europe

Hey Dockers! We had such a great time attending and speaking at LinuxCon and ContainerCon North America, that we are doing it again next week in Berlin – only bigger and better this time! Make sure to come visit us at booth #D38 and check out the awesome Docker sessions we have lined up:

Keynote!

Solomon Hykes, Docker’s Founder and CTO, will kick off LinuxCon with the first keynote at 9:25. If you aren’t joining us in Berlin, you can live stream his and the other keynotes by registering here.

Sessions

Tuesday October 4th:

11:15 – 12:05 Docker Captain Adrian Mouat will deliver a comparison of orchestration tools including Docker Swarm, Mesos/Marathon and Kubernetes.

12:15 – 1:05 Patrick Chanezon and David Chung from Docker’s technical team along with Docker Captain and maintainer Phil Estes will demonstrate how to build distributed systems without Docker, using Docker plumbing projects, including RunC, containerd, swarmkit, hyperkit, vpnkit, datakit.

2:30 – 3:20 Docker’s Mike Goelzer will introduce the audience to Docker Services in Getting Started with Docker Services, explain what they are and how to use them to deploy multi-tier applications. Mike will also cover load balancing, service discovery, scaling, security, deployment Continue reading

Atlanta Ignites with Continued SharePoint and OneDrive Innovation!

This past week, Atlanta was host to about 25,000 visitors for Microsoft Ignite. During the Day 1 keynote, Jeff Teper, Corporate Vice President for OneDrive and SharePoint, took the stage for 15 minutes to introduce the continued investments Microsoft has made in SharePoint that were previewed in San Francisco on May 4, 2016. The SharePoint announcements were only part of an incredible array of announcements across the Office 365 family, including some major infrastructure and security announcements and some awesome features for Office that I can’t wait to try!To read this article in full or to leave a comment, please click here

Docker Weekly Roundup | September 25, 2016

 

weekly-roundup.png

The last week of September 2016 is over and you know what that means; another Docker news roundup. Highlights include, a new commercial relationship between Docker and Microsoft, general availability of Docker containers on Windows Server 2016, and consolidation of Docker documentation on GitHub! As we begin a new week, let’s recap our five hottest stories:


Weekly #roundup: Top 5 #Docker stories for the Continue reading

IPv6 Transition Mechanisms | Dual-Stack -Tunnelling – Translation

IPv6 Transition Mechanisms The only available public IP addresses are IPv6 addresses. But vast majority of the content is still working on IPv4. How IPv6 users can connect to the IPv4 world and How IPv4 users can reach to the IPv6 content ? This is accomplished with the IPv6 transition mechanisms. In this post, I […]

The post IPv6 Transition Mechanisms | Dual-Stack -Tunnelling – Translation appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Survey on IXP Routing and Privacy

Marco Canini from UC Louvain is working on an IXP research project focused on bringing privacy guarantees into Internet routing context. They’re trying to understand the privacy considerations of network operators and have created a short survey to gather the initial data.

Researchers from UC Louvain have been involved in tons of really useful projects including BGP PIC, LFA, MP-TCP, Fibbing, Software-defined IXP and flow-based load balancing, so if you’re connected to an IXP, please take your time and fill in the survey.