A few weeks ago Matt Oswalt wrote an interesting blog post on principles of automation, and we quickly agreed it’s a nice starting point for a podcast episode.
In the meantime Matt moved to StackStorm team so that became the second focus of our chat… and then we figured out it would be great to bring in Matt Stone (the hero of Episode 13).
Read more ...*|MC:SUBJECT|* Black Friday & Cyber Monday Black Friday Thru Cyber Monday Special Discount Starts November 24 at 5PM PST Thru November 28 9PM PST 30% OFF On Below Products ! CCDE In-Depth New CCDE Workbook buy now » Live/Instructor-Led Online CCDE Training buy now » Self Paced CCDE Training Lifetime Access buy now »
The post Don’t miss this opportunity appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
As part of my ongoing investigation of the usability of various Linux distributions and desktop environments, I’ve been working with Fedora 25. As part of the investigation I need to see how to perform certain tasks, one of which is working with Ansible. As a result, I needed to install Ansible 2.2 on Fedora 25, and it turns out it wasn’t as simple as pip install ansible.
I generally prefer to run Ansible in a Python virtualenv, but I don’t believe that it will make any difference to this procedure. However, I’m happy to be corrected if someone knows otherwise.
To create a Python virtualenv, you’ll first need virtualenv installed. I prefer to install virtualenv globally for all users using this command:
sudo -H pip install virtualenv
Once virtualenv is installed, then create a virtualenv for Ansible:
virtualenv ~/Envs ansible
Then activate the virtualenv:
source ~/Envs/ansible/bin/activate
At this point, you can try a pip install ansible, but it will fail. First, you need to install some additional development libraries that are required in order to install Ansible:
sudo dnf install libffi-devel redhat-rpm-config python-devel openssl-devel
Once those packages are installed, then you’re finally ready to install Ansible into Continue reading
In this blog how we will discuss how to integrate Bare metal devices with Juniper Contrail (SDN Controller) by using EVPN-VXLAN.
My earlier blogs on Contrail can be viewed on links Blog-1, Blog-2 ,
Reference Topology

Problem statement “Gust VM spawned inside SDN environment needs to communicate with Bare Metal Device (same sub net or different sub net here we will discuss former use case only).
Solution “EVPN based control plane will be established between MX Router and Contrail Controller to exchange ARP entries between them, VxLAN based forwarding plane will be configured for communication between Guest VMs and Bare Metal Devices”
Solution components:-
At the annual Supercomputing Conference (SC16) last week, the emphasis was on deep learning and its future role as part of supercomputing applications and systems. Before that focus, however, the rise of novel architectures and reconfigurable accelerators (as alternatives to building a custom ASIC) was swift.
Feeding on that trend, a panel exploring how non-Von Neumann architectures looked at the different ways the high performance computing set might consider non-stored program machines and what the many burgeoning options might mean for energy efficiency and performance.
Among the presenters was Gagan Gupta, a computer architect with Microsoft Research, who detailed the …
FPGAs Give Microsoft a “Von Neumann Tax” Break was written by Nicole Hemsoth at The Next Platform.
Cisco VIRL is the ideal testing environment when you want to test your Ansible playbooks with various Cisco network operating systems (IOS, IOS XE, NX-OS or IOS XR). The “only” gotcha: how do you reach those devices from the outside world?
It was always possible to reach the management interface of devices running with VIRL, and it got even simpler with VIRL release 1.2.
A few weeks ago, several of Cumulus Networks’ passionate employees headed to Barcelona to connect with other cloud-enthusiasts at the 2016 OpenStack Summit in Barcelona. We were there to visit our customers, partners, talk about our solutions, and connect with other industry experts. Here are the highlights.

If you were lucky enough to attend the event, you may have met one of our infectious leaders (CTO and Co-founder) JR Rivers. He was manning our booth along with the EMEA team and a few marketing and product members. The team was there to connect with partners, talk about our technology, and of course, pass out our new rocket turtle.
We’d like to give a special shoutout to JR who unwrapped more than 800 #RocketTurtles! They were an instant hit, and have been spotted in various parts of Barcelona.


By visiting our booth or our partners’, Mellanox, Red Hat, Dell and Midokura, attendees were able to enter a chance to win a Lego Mindstorm EV3. Congrats to our winner, Jules Chevalier!
One of the highlights of the event for us was connecting with other industry folks in Continue reading
Advanced Persistent Threats
Coming to a network near you, or maybe your network!
There are things that go bump in the night and that is all they do. But once in a while things not only go bump in the night, they can hurt you. Sometimes they make no bump at all! They hurt you before you even realize that you’re hurt. No, we are not talking about monsters under the bed or real home intruders; we are talking about Advanced Persistent Threats. This is a major trend that has been occurring at a terrifying pace across the globe. It targets not the typical servers in the DMZ or the Data Center, but the devices at the edge. More importantly, it targets the human at the interface. In short, the target is you.
Now I say ‘you’ to highlight the fact that it is you, the user who is the weakest link in the security chain. And like all chains, the security chain is only as good as its weakest link. I also want to emphasize that it is not you alone, but myself or anyone or any device for that matter that accesses the network and uses its Continue reading
It’s the age of IT transformation. Spurred on by developers, adoption of Docker containers has empowered application teams to transform the way they build, ship and run applications, allowing for faster and more frequent delivery. Initially seen as a tool mainly for developers, Docker is now at the center of key enterprise initiatives, and has attracted the attention of IT operations teams. Enterprise IT ops teams use Docker to maintain control over their environment and boost security as they embrace cloud strategies like hybrid cloud and multi-cloud.

Docker at AWS re:Invent 2016
This adoption of Docker within the cloud is why we are excited to be at AWS re:Invent 2016. If you’re going to be at the show, we hope you stop by booth #622. Docker employees will be showing live demos, and will be on hand to answer questions. We’ll of course be passing out free Docker swag as well.
This year we’ll be showing two types of demos at the booth:
1. Docker Datacenter (DDC) demo – In this demo attendees will learn about Docker Datacenter, our commercial solution that delivers an enterprise container management platform. The platform is supported by Docker Continue reading
The post Worth Reading: Installing a back door on locked PCs appeared first on 'net work.