Join Us And Paul Vixie On Tuesday To Discuss BIND, Root Servers, And DNS Security

CloudFlare and Gandi have been hosting a speaker series on DNS, previously bringing in the founder of DNS Paul Mockapetris and Dan Kaminsky, who uncovered one of the most critical vulnerabilities in DNS.

Our third and final talk is coming up on June 21st at 6PM PST at the Gandi office in San Francisco (live stream link will be posted on the Meetup page) and you won’t want to miss it, because our speaker is none other than Paul Vixie.

Paul wrote most of BIND Version 8 and hired the team who wrote BIND Version 9, the most widely used DNS software on the Internet. He founded ISC, home of BIND and F-root and later operated C-root.

We'll talk about alternative DNS root servers, email security and spam (Paul founded the first ever anti-spam company), and what needs to be done about DNS and security (Paul added most of BIND’s current security systems).

So come grab a beer and let's geek out about DNS one more time.

RSVP here.

Stuff The Internet Says On Scalability For June 17th, 2016

Hey, it's HighScalability time:


You've seen the Netflix Death Star microservices map. Here's a map of microbes conversing on your skin.

 

If you like this sort of Stuff then please support me on Patreon.
  • 4281: # of unread articles in my HackerNews feed; 23%: of all corporate cash is held by Microsoft, Apple, Google; 400 million: number of new servers needed by 2020; ~25,740TB: storage Backblaze adds per month; 3 bits: IBM stores per memory cell; 488 million: faked comments by China per year; 90%: revenue Spotify makes fron 30% of users; 780 million: miles of Tesla driving data; 4 days: median time to binge watch a season on Netlix; $33: cost of Nike Air Max; $50 billion: amount Apple has paid out to app developers; $270 million: amount Line makes from selling stickers; 4,600: # of trees Apple will plant aorund the Spaceship; 200 million: Google photos users; $1.8 billion: Series F round for Snapchat; 3x: capacity of the roadway with driverless cars; 138%: growth in Alibaba's cloud; 

  • Quotable Quotes:

Cavium Buys Access To Enterprise With QLogic Deal

Might doesn’t make right, but it sure does help. One of the recurring bothers about any technology upstart is that they are smaller Davids usually up against vastly larger Goliaths, usually with a broader and deeper set of technologies covering multiple markets. The best way to get traction in one market, then, seems to be to have significant footing in several markets.

This is the strategy that ARM server chip and switch ASIC maker Cavium is taking as it shells out approximately $1.36 billion to acquire network and storage switch chip maker QLogic. The combination of the two companies will

Cavium Buys Access To Enterprise With QLogic Deal was written by Timothy Prickett Morgan at The Next Platform.

Announcing Our Next Docker Hackathon!

In just a couple of days, over four thousand people will be joining us in Seattle for DockerCon 2016 to learn from top practitioners, take part in hands-on labs, engage with Docker ecosystem innovators and meet others in the Docker Community.

We realize that attendees were bummed when we didn’t announce an in-person hackathon but we have been working hard to remedy this by organizing an online hackathon for participants to hack on the newest features and products coming out of DockerCon!

Continue reading

VeloCloud’s SD-WAN solution facilitates quick expansion for The Bay Club Company

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The Bay Club Company is an operator of private clubs that blend fitness, swimming and tennis. Today the company has 24 clubs across California, but it's growth path could potentially double that by the end of 2017. The Bay Club's expansion strategy includes acquiring smaller clubs and bringing them into the portfolio.IT director Mark Street is charged with bringing the acquired clubs into the Bay Club network as quickly as possible. That connection is essential in order for the club, from a technology point of view, to begin operating and feeling like a Bay Club. Street says it would take 60 to 90 days to bring a new club onto the traditional corporate backbone, but his goal is to be able to fully integrate a new club within a week to help The Bay Club and its members benefit from the new acquisition faster.To read this article in full or to leave a comment, please click here

VeloCloud’s SD-WAN solution facilitates quick expansion for The Bay Club Company

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The Bay Club Company is an operator of private clubs that blend fitness, swimming and tennis. Today the company has 24 clubs across California, but it's growth path could potentially double that by the end of 2017. The Bay Club's expansion strategy includes acquiring smaller clubs and bringing them into the portfolio.IT director Mark Street is charged with bringing the acquired clubs into the Bay Club network as quickly as possible. That connection is essential in order for the club, from a technology point of view, to begin operating and feeling like a Bay Club. Street says it would take 60 to 90 days to bring a new club onto the traditional corporate backbone, but his goal is to be able to fully integrate a new club within a week to help The Bay Club and its members benefit from the new acquisition faster.To read this article in full or to leave a comment, please click here

Belgian hospitals turn to robots to receive patients

Robots have already invaded the operating room in some hospitals, but in Belgium they will soon be taking on the potentially more difficult task -- for robots, at least -- of greeting patients and giving them directions.The Citadelle regional hospital in Liège and the Damiaan general hospital in Ostend will be working with Zora Robotics to test patients' reactions to robot receptionists in the coming months.Zora already has experience programming the diminutive humanoid robot Nao to act as a chatty companion for the elderly, offering it as a form of therapy for those with dementia.Now the Belgian company is working with Nao's newer, bigger sibling, Pepper. Both were developed by French robotics company Aldebaran, now owned by Japanese Internet conglomerate SoftBank.To read this article in full or to leave a comment, please click here

Monitoring VMware NSX SpoofGuard with REST API and Perl

In some prior blogs, we demonstrated leveraging NSX REST API with Python. See prior blogs, Automating Security Group and Policy Creation with NSX REST API and Automating VMware NSX Security Rules Creation using Splunk and Some Code. In this blog, we demonstrate how NSX REST API can be used with the popular Perl programming language.

One of Perl’s key strengths is the vast amount of Perl modules/libraries available via the Comprehensive Perl Archive Network (CPAN). There is also a CPAN module included with Perl which is used to automatically download and install additional Perl modules from the CPAN repository. The example Perl code in this post demonstrates a simple program that uses a Perl REST client module/library with NSX REST API to retrieve NSX SpoofGuard information.  Continue reading

Microsoft buys Wand to improve chat capabilities

Satya Nadella wasn't kidding when he said earlier this year that he believed in using chat as a platform for computing. Microsoft just bought Wand, a chat app for iOS, to further that vision. The Wand team will be joining Bing's engineering and platform group, Corporate Vice President David Ku wrote in a post announcing the deal Thursday. The company's team members will be working primarily on Microsoft's push to enable the creation of intelligent chatbots and virtual assistants. To read this article in full or to leave a comment, please click here

China claims exascale by 2020, three years before U.S.

China has set 2020 as the date for delivering an exascale system, the next major milestone in supercomputing performance. This is three years ahead of the U.S. roadmap.This claim is from China's National University of Defense Technology, as reported Thursday by China's official news agency, Xinhua.This system will be called Tianhe-3, following a naming convention that began in 2010 when China announced its first petaflop-scale system, Tianhe-1. The first petascale system was developed in the U.S. in 2008.To read this article in full or to leave a comment, please click here

China claims exascale by 2020, three years before U.S.

China has set 2020 as the date for delivering an exascale system, the next major milestone in supercomputing performance. This is three years ahead of the U.S. roadmap.This claim is from China's National University of Defense Technology, as reported Thursday by China's official news agency, Xinhua.This system will be called Tianhe-3, following a naming convention that began in 2010 when China announced its first petaflop-scale system, Tianhe-1. The first petascale system was developed in the U.S. in 2008.To read this article in full or to leave a comment, please click here

10 major headaches Apple fixed

Improving every Apple platformImage by AppleIt was a jam-packed WWDC, and thankfully Apple gave us much-needed fixes to some of the most frustrating problems in all its major platforms.What were some of your personal headaches that Apple cured with the annnouncement of iOS 10, macOS, watchOS 3, and tvOS?To read this article in full or to leave a comment, please click here

IDG Contributor Network: How behavior online will identify you

Just half an hour of web browsing is enough time for machine learning mechanisms to uncover a person’s personality and produce identifying digital signatures, researchers say.Those traits can include conscientiousness and neuroticism, among other characteristics, the scientists from Universiti Teknologi Malaysia say in their media release published by AAAS, the science society.And it might identify the individual, too."Our research suggests a person's personality traits can be deduced by their general internet usage,” says Dr. Ikusan R. Adeyemi, a research scholar at the university.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How behavior online will identify you

Just half an hour of web browsing is enough time for machine learning mechanisms to uncover a person’s personality and produce identifying digital signatures, researchers say.Those traits can include conscientiousness and neuroticism, among other characteristics, the scientists from Universiti Teknologi Malaysia say in their media release published by AAAS, the science society.And it might identify the individual, too."Our research suggests a person's personality traits can be deduced by their general internet usage,” says Dr. Ikusan R. Adeyemi, a research scholar at the university.To read this article in full or to leave a comment, please click here

Big Chain Deep Dive on Software Gone Wild

A while ago Big Switch Networks engineers realized there’s a cool use case for their tap aggregation application (Big Tap Monitoring Fabric) – an intelligent patch panel traffic steering solution used as security tool chaining infrastructure in DMZ… and thus the Big Chain was born.

Curious how their solution works? Listen to Episode 58 of Software Gone Wild with Andy Shaw and Sandip Shah.

Surveillance reform measure blocked in the wake of Orlando killings

The U.S. House of Representatives voted down an anti-surveillance amendment after some of its members expressed concern about its impact on the fight against terrorism, in the wake of Sunday’s massacre at a nightclub in Orlando.The measure was proposed by Congressman Thomas Massie, a Republican from Kentucky, and Congresswoman Zoe Lofrgren, a Democrat from California, as as an amendment to the Department of Defense Appropriations Act.It would prevent warrantless searches by law enforcement of information on Americans from a foreign intelligence communications database and prohibit with some exceptions the National Security Agency and the Central Intelligence Agency from using any funds appropriated under the Act to require that companies weaken the security of their products or services to enable surveillance of users.To read this article in full or to leave a comment, please click here

Surveillance reform measure blocked in the wake of Orlando killings

The U.S. House of Representatives voted down an anti-surveillance amendment after some of its members expressed concern about its impact on the fight against terrorism, in the wake of Sunday’s massacre at a nightclub in Orlando.The measure was proposed by Congressman Thomas Massie, a Republican from Kentucky, and Congresswoman Zoe Lofrgren, a Democrat from California, as as an amendment to the Department of Defense Appropriations Act.It would prevent warrantless searches by law enforcement of information on Americans from a foreign intelligence communications database and prohibit with some exceptions the National Security Agency and the Central Intelligence Agency from using any funds appropriated under the Act to require that companies weaken the security of their products or services to enable surveillance of users.To read this article in full or to leave a comment, please click here