VIRL on Packet Cloud—Some thoughts

For the last couple of days I’ve been messing with Cisco’s VIRL on Packet’s bare metal service. I don’t do enough labbing now to spend multiple thousands of dollars building a lab in my house, and I want something that I can use from anywhere without opening a lot of holes in my home network when I’m on the road, so the Packet service seems like something useful to get running.

Forthwith, some observations and hints for those who might be thinking about doing this. Some of this might be obvious to other folks, I know, but—maybe me writing them down here will be somehow helpful, and save other folks some time.

An observation—this all feels a little (okay, maybe a lot) clunky’ish. There’s a lot of steps, it takes a long time to set up, etc. There are a lot of moving parts, and they interconnect in interesting ways. Maybe this will all get better over time, but for now, if you’re going to do this, plan on spending at least a half a day, probably more, just getting all the pieces to work.

Some places I ran into trouble, and things I needed to configure that I had Continue reading

Chicagoans: TECHunplugged Is Coming October 27, 2016

TECHunplugged is a one-day event where end users, influencers and vendors come together to talk shop. At the Chicago event on October 27, 2016, I’ll be speaking on the following big idea.

How The Network Automation War Might Soon Be Won

Here’s the abstract I proposed to the TECHunplugged team.

Automation in the virtualization world is a long-established feature. A plethora of excellent tools exist to help stand up server infrastructure, operating systems, and applications. This has helped bring much of the IT stack together in a way that makes system deployment a repeatable, predictable task. By contrast, network automation is a struggling, emergent technology. Why is it that the automation of network provisioning has proven so challenging?

Ethan Banks, 20 year IT veteran and co-host of the Packet Pushers podcasts, will explain the network automation challenge from a practitioner’s point of view. He’ll also discuss recent advances in network automation tooling from both the open source and commercial software worlds. Network automation might feel rather behind other IT silos, but there’s significant progress that will change network operations sooner rather than later.

To set context, I’ll explain why automating the network is so hard.

IDG Contributor Network: IoT early warning system helps save people from mudslides

Necessity is the mother of invention.So, it’s no surprise that the best solutions are designed close to where they’re most needed. How do you empower people in remote parts of the world to develop their own solutions? How can their best solution be shared globally with others to maximize the benefit?Responding to disasters in El Salvador Floods and mudslides regularly devastate El Salvador. Villagers can identify impending floods and mudslides, but they are unable to warn others in time. Rugged terrain, lack of power and cellular networks present a formidable communication challenge. Reacción, a team of El Salvadorian experts in electronics, community development and disaster relief, decided to do something about it. Working with local villagers and global experts, they developed an IoT-based early warning system for disasters that’s now shared globally.To read this article in full or to leave a comment, please click here

Inside AMD’s development of the Zen CPU

AMD knew it needed to make radical changes in its Zen CPU chip to become a force in the PC and server markets again.So when the chip designers sat down four years ago to etch out the Zen design, they had two things in mind: to drive up CPU performance as much as possible and to keep power efficiency stable.The company ultimately settled for a 40 percent improvement in Zen over its predecessor, Excavator."We had a hard time convincing the team we were going for 40 percent," said Mike Clark, a senior fellow at AMD. "It was a very aggressive goal, and we knew we had to do it to be competitive."AMD first promoted the 40 percent CPU improvement goal when it introduced Zen in 2015 during an overhaul of its chip roadmap. The company recently demonstrated chips to prove it has achieved the goal.To read this article in full or to leave a comment, please click here

Inside AMD’s development of the Zen CPU

AMD knew it needed to make radical changes in its Zen CPU chip to become a force in the PC and server markets again.So when the chip designers sat down four years ago to etch out the Zen design, they had two things in mind: to drive up CPU performance as much as possible and to keep power efficiency stable.The company ultimately settled for a 40 percent improvement in Zen over its predecessor, Excavator."We had a hard time convincing the team we were going for 40 percent," said Mike Clark, a senior fellow at AMD. "It was a very aggressive goal, and we knew we had to do it to be competitive."AMD first promoted the 40 percent CPU improvement goal when it introduced Zen in 2015 during an overhaul of its chip roadmap. The company recently demonstrated chips to prove it has achieved the goal.To read this article in full or to leave a comment, please click here

19% of shoppers would abandon a retailer that’s been hacked

Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey.The 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. and found that 19% would abandon a retailer entirely over a hack. Another 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.The study also looked at 100 cybersecurity executives and found that 55% said they haven't spent money on cybersecurity in the past yearand 42% said their company didn't have a leader in charge of information security.To read this article in full or to leave a comment, please click here

19% of shoppers would abandon a retailer that’s been hacked

Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey.The 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. and found that 19% would abandon a retailer entirely over a hack. Another 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.The study also looked at 100 cybersecurity executives and found that 55% said they haven't spent money on cybersecurity in the past yearand 42% said their company didn't have a leader in charge of information security.To read this article in full or to leave a comment, please click here

Linux at 25: How Linux changed the world

I walked into an apartment in Boston on a sunny day in June 1995. It was small and bohemian, with the normal detritus a pair of young men would scatter here and there. On the kitchen table was a 15-inch CRT display married to a fat, coverless PC case sitting on its side, network cables streaking back to a hub in the living room. The screen displayed a mess of data, the contents of some logfile, and sitting at the bottom was a Bash root prompt decorated in red and blue, the cursor blinking lazily.I was no stranger to Unix, having spent plenty of time on commercial Unix systems like OSF/1, HP-UX, SunOS, and the newly christened Sun Solaris. But this was different.To read this article in full or to leave a comment, please click here

Who gets to telecommute once Zika’s bite comes closer?

Florida’s announcement Tuesday that a locally transmitted Zika case turned up Pinellas County, which includes St. Petersburg, moves reported cases of the virus a little closer to Georgia. That’s where Maria Stephens, who is pregnant, works as a senior data research analyst.Stephens was initially skeptical about Zika and paid little attention to the headlines about it.“I don't really respond to dramatization and felt that things were possibly being blown out of proportion,” said Stephens. “I'm a statistician at heart and only listen to numbers, so when my quant-minded OB-GYN shared the figures with me, this threat became a lot more real."To read this article in full or to leave a comment, please click here

Who gets to telecommute once Zika’s bite comes closer?

Florida’s announcement Tuesday that a locally transmitted Zika case turned up Pinellas County, which includes St. Petersburg, moves reported cases of the virus a little closer to Georgia. That’s where Maria Stephens, who is pregnant, works as a senior data research analyst.Stephens was initially skeptical about Zika and paid little attention to the headlines about it.“I don't really respond to dramatization and felt that things were possibly being blown out of proportion,” said Stephens. “I'm a statistician at heart and only listen to numbers, so when my quant-minded OB-GYN shared the figures with me, this threat became a lot more real."To read this article in full or to leave a comment, please click here

Best Android phones: What should you buy?

Choosing a new Android phone isn’t easy. The Android universe is teeming with options, from super-expensive flagship phones, to affordable models that make a few calculated compromises, to models expressly designed for, say, great photography. Chances are that whichever phone you buy, you’ll keep it for at least two years. So choosing the best Android phone for you isn’t a decision you should take lightly. But we can make things easier. Everyone has different priorities and needs, so we’ve made some picks for the best Android phone in several categories. At the bottom of this article, we also list all our recent Android phone reviews—in case you have your eye on a model that doesn’t make our cut.To read this article in full or to leave a comment, please click here

A deeper look at business impact of a cyberattack

Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? After all, the direct costs commonly associated with a data breach are far less significant than the “hidden costs” incurred.Indeed, the “hidden” costs can amount to 90 percent of the total business impact on an organization, and will most likely be experienced two years or more after the event. These are among the findings of a recent study by Deloitte Advisory entitled, “Beneath the Surface of a Cyberattack: A Deeper Look at the Business Impacts.”To read this article in full or to leave a comment, please click here

A deeper look at business impact of a cyberattack

Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? After all, the direct costs commonly associated with a data breach are far less significant than the “hidden costs” incurred.Indeed, the “hidden” costs can amount to 90 percent of the total business impact on an organization, and will most likely be experienced two years or more after the event. These are among the findings of a recent study by Deloitte Advisory entitled, “Beneath the Surface of a Cyberattack: A Deeper Look at the Business Impacts.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Internet use is replacing human memory

There’s more evidence that the internet is changing the way we think. Problem solving and recall are among the things people use the internet for. However, the more one does it, the more reliant on the internet one gets, researchers say.And so much so that people who use Google and other internet tools a lot don’t even try to remember things, a study just published in Memory says.“Memory is changing,” says Dr. Benjamin Storm, the lead author in academic publisher Routledge’s press release. “Our research shows that as we use the internet to support and extend our memory, we become more reliant on it. Whereas before we might have tried to recall something on our own, now we don't bother.”To read this article in full or to leave a comment, please click here

Big Blue Aims For The Sky With Power9

Intel has the kind of control in the datacenter that only one vendor in the history of data processing has ever enjoyed. That other company is, of course, IBM, and Big Blue wants to take back some of the real estate it lost in the datacenters of the world in the past twenty years.

The Power9 chip, unveiled at the Hot Chips conference this week, is the best chance the company has had to make some share gains against X86 processors since the Power4 chip came out a decade and a half ago and set IBM on the path to

Big Blue Aims For The Sky With Power9 was written by Timothy Prickett Morgan at The Next Platform.

NYT says Moscow bureau was targeted by cyberattack

The Moscow bureau of The New York Times was the target of a cyberattack, though there are no indications yet that the hackers were successful, according to the newspaper.The hackers are believed to be Russian, the newspaper said Tuesday evening. It quoted a spokeswoman for the newspaper as saying that it had not hired outside firms to investigate the attempted breach.Earlier in the day, CNN reported that the FBI and other U.S. security agencies were investigating attacks by hackers, thought to be working for Russian intelligence, that targeted reporters at the New York Times and other U.S. news organizations. CNN quoted unnamed U.S. officials briefed on the matter.To read this article in full or to leave a comment, please click here