BGP (Border Gateway Protocol) Quiz,Questions and Detailed Answers

BGP (Border Gateway Protocol) a.k.a Bloody Good Protocol quiz ! I prepared 20 Questions in this quiz for you. Intend of this quiz to provide you the BGP design information. This quiz is part of the BGP Review Questions of my upcoming new version of CCDE Workbook. There will be hundreds of questions in it and […]

The post BGP (Border Gateway Protocol) Quiz,Questions and Detailed Answers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Canonical integrates Ubuntu with open source container manager Kubernetes

Containers remain one of the hottest trends in technology thanks to the new ways they’re allowing developers to write new applications. Canonical – the developer of the Linux-based Ubuntu operating system – today is hopping on the container management bandwagon by integrating its popular OS with Kubernetes, an open source project for managing containers at scale. +MORE AT NETWORK WORLD: As Adobe inks deal with Microsoft Azure, Amazon looms + Canonical has been on the leading edge of developing container technology thanks to its heavy focus on Linux. Canonical has developed LXC and LXD, both of which are container platforms. In addition to supporting those open source tools, Canonical CEO Mark Shuttleworth says his goal is to make Ubuntu a platform for using many different higher-level container management tools too, including Kubernetes. To that end, the company has plans to integrate Ubuntu with Docker Swarm and Mesos’s Mesosphere too.To read this article in full or to leave a comment, please click here

Most dangerous cyber celebrities of 2016

Dangerous celebritiesIntel has reeled off the 10th annual McAfee Most Dangerous Celebrities list based on likelihood of getting hit with a virus or malware when searching on the celebs’ names. “Consumers today remain fascinated with celebrity culture and go online to find the latest pop culture news,” said Gary Davis, chief consumer security evangelist at Intel Security. “With this craving for real-time information, many search and click without considering potential security risks.” Last year, DJ Armin van Buuren was #1.To read this article in full or to leave a comment, please click here

Most dangerous cyber celebrities of 2016

Dangerous celebritiesIntel has reeled off the 10th annual McAfee Most Dangerous Celebrities list based on likelihood of getting hit with a virus or malware when searching on the celebs’ names. “Consumers today remain fascinated with celebrity culture and go online to find the latest pop culture news,” said Gary Davis, chief consumer security evangelist at Intel Security. “With this craving for real-time information, many search and click without considering potential security risks.” Last year, DJ Armin van Buuren was #1.To read this article in full or to leave a comment, please click here

Mall takes no chances with Galaxy Note 7

The picture below was snapped in a mall – we don’t know which mall – by an eagle-eyed Reddit user who couldn’t help but notice that a kiosk set up to sell the Samsung Galaxy Note 7 was being guarded by a pair of fire extinguishers.For obvious reasons. Imgur/via Reddit Many are having a good giggle about the photo. None of them work for Samsung, of course.To read this article in full or to leave a comment, please click here

Ansible in GitHub’s Octoverse 2016

 

Recently GitHub released their State of the Octoverse 2016 which shows some really nice statistics and graphs of top projects, languages and organizations working on open source.

GitHub, in the spirit of full transparency, shared the methodology and queries used to generate the report. We used this dataset to understand where Ansible stacks up. One of the drawbacks in the approach where you are just considering single repositories is that you don’t get a good idea of where a single project broken out into multiple repositories would fall. In Ansible’s case, the project is broken down into three repositories:


Let's look at GitHub’s first graphic, Repositories with the most open source contributors. When you just consider Ansible’s Core Project repo we’re just barely out of the top 10 at 11th place.1


Octoverse1.png
What does that number look like if we combine all three repositories that make up the Ansible project?2
Octoverse events actor count

As far as projects go that would have us in 5th just behind Patchwork.
One of the facets that was most strange to me was the inclusion of Comments Continue reading

Don’t Trust Hotel Currency Conversion

Experienced travelers will already know this, but it bears repeating: Don’t trust your hotel to perform currency conversions for credit card transactions. They will rip you off. Leave it to the credit card company.

A few months ago I stayed at a Sheraton hotel in Australia. They swiped my credit card when I checked in, and on check out they asked if I wished to pay with that same card. I did, so I didn’t need to swipe my card again. They sent me an invoice for approximately $265 AUD.

A few weeks later I was processing my expenses, and I realised I’d been charged over $300 NZD. With the exchange rate at the time, it should have been about $275. Looking closer, I realised that they had charged me in New Zealand dollars. They should have charged me in Australian dollars, and let my credit card company sort out the exchange rate.

What’s going on?

Some hotels offer you a choice of currency when paying your bill. This should be an option when you enter your PIN. Do not take this option. It is almost never a good idea. Your credit card company will charge you a fee for Continue reading

Don’t Trust Hotel Currency Conversion

Experienced travelers will already know this, but it bears repeating: Don’t trust your hotel to perform currency conversions for credit card transactions. They will rip you off. Leave it to the credit card company.

A few months ago I stayed at a Sheraton hotel in Australia. They swiped my credit card when I checked in, and on check out they asked if I wished to pay with that same card. I did, so I didn’t need to swipe my card again. They sent me an invoice for approximately $265 AUD.

A few weeks later I was processing my expenses, and I realised I’d been charged over $300 NZD. With the exchange rate at the time, it should have been about $275. Looking closer, I realised that they had charged me in New Zealand dollars. They should have charged me in Australian dollars, and let my credit card company sort out the exchange rate.

What’s going on?

Some hotels offer you a choice of currency when paying your bill. This should be an option when you enter your PIN. Do not take this option. It is almost never a good idea. Your credit card company will charge you a fee for Continue reading

Meet Apache Spot, a new open source project for cybersecurity

Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator."The idea is, let's create a common data model that any application developer can take advantage of to bring new analytic capabilities to bear on cybersecurity problems," Mike Olson, Cloudera co-founder and chief strategy officer, told an audience at the Strata+Hadoop World show in New York. "This is a big deal, and could have a huge impact around the world."To read this article in full or to leave a comment, please click here

Meet Apache Spot, a new open source project for cybersecurity

Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator."The idea is, let's create a common data model that any application developer can take advantage of to bring new analytic capabilities to bear on cybersecurity problems," Mike Olson, Cloudera co-founder and chief strategy officer, told an audience at the Strata+Hadoop World show in New York. "This is a big deal, and could have a huge impact around the world."To read this article in full or to leave a comment, please click here

Exascale Capabilities Underpin Future of Energy Sector

Oil and natural resource discovery and production is an incredibly risky endeavor, with the cost of simply finding a new barrel of oil tripling over the last ten years. Discovery teams want to ensure they are only drilling in the most lucrative locations, which these days means looking to increasingly inaccessible (for a bevy of reasons) sources for hydrocarbons.

Even with renewable resources like wind, there are still major financial risks. An accurate prediction of shifting output and location for expensive turbines are two early-stage challenges, and maintaining, monitoring, and optimizing those turbines is an ongoing pressure.

The common thread

Exascale Capabilities Underpin Future of Energy Sector was written by Nicole Hemsoth at The Next Platform.

How Uber Manages a Million Writes Per Second Using Mesos and Cassandra Across Multiple Datacenters

If you are Uber and you need to store the location data that is sent out every 30 seconds by both driver and rider apps, what do you do? That’s a lot of real-time data that needs to be used in real-time.

Uber’s solution is comprehensive. They built their own system that runs Cassandra on top of Mesos. It’s all explained in a good talk by Abhishek Verma, Software Engineer at Uber: Cassandra on Mesos Across Multiple Datacenters at Uber (slides).

Is this something you should do too? That’s an interesting thought that comes to mind when listening to Abhishek’s talk.

Developers have a lot of difficult choices to make these days. Should we go all in on the cloud? Which one? Isn’t it too expensive? Do we worry about lock-in? Or should we try to have it both ways and craft brew a hybrid architecture? Or should we just do it all ourselves for fear of being cloud shamed by our board for not reaching 50 percent gross margins?

Uber decided to build their own. Or rather they decided to weld together their own system by fusing together two very capable open source components. What was Continue reading

Save 30% on Bowers & Wilkins P5 Mobile Headphones By Going Recertified – Deal Alert

In leading recording studios around the world, music that will soon be heard everywhere is first heard through Bowers & Wilkins loudspeakers. With these P5 mobile hi-fi headphones, the sound you hear is completely natural – as close to the sound of the original recording as they can possibly take you. There are no gimmicky effects like exaggerated bass or artificially enhanced treble, which become tiring with extended listening. A closed-back design with rigid metal faceplates and sealed earpads ensures that all the detail and dynamic range of your music is kept intact, while preserving just enough ambient sound to give you a sense of place. Perfect for listening to music on the go, P5's high-quality sound and luxury materials are supported by smart design and user-friendly features. The P5s average 4 out of 5 stars from over 280 people on Amazon (read reviews). Their typical list price is $241.53, but if you buy them recertified you save 30% and get them for just $167.99. B&W recertified products have been tested and updated to ensure they meet Bowers & Wilkins high quality standards, and all recertified products come with a two-year warranty. See the recertified P5s now on Continue reading

Down the rabbit hole, part 2: To ensure security and privacy, open source is required

I am currently embarking on a quest to make my entire life as private and secure as possible—while still having a good time and enjoying the fruits of the modern world. In this article, I won’t go into why I am doing this. For that, see my article introducing this endeavor.What I’d like to talk about right now are some pretty high-level things—laying out the ground rules, if you will, for what I’m trying to accomplish.First, let me start by saying none of this is about open source or free software. Licensing of software, while extremely important, is not the focus here. This is about privacy and security and absolutely nothing else.To read this article in full or to leave a comment, please click here

Down the rabbit hole, part 2: To ensure security and privacy, open source is required

I am currently embarking on a quest to make my entire life as private and secure as possible—while still having a good time and enjoying the fruits of the modern world. In this article, I won’t go into why I am doing this. For that, see my article introducing this endeavor.What I’d like to talk about right now are some pretty high-level things—laying out the ground rules, if you will, for what I’m trying to accomplish.First, let me start by saying none of this is about open source or free software. Licensing of software, while extremely important, is not the focus here. This is about privacy and security and absolutely nothing else.To read this article in full or to leave a comment, please click here