Chicago bank finds public cloud ready for prime time

In the early 1930s Congress chartered a dozen federal loan banks across the country to help smaller banks provide liquidity for home loans. Today, the Federal Home Loan Bank of Chicago holds $70.7 billion in assets. And Eric Gieger, vice president of IT operations for the bank runs this financial institution from the cloud.Just a few years ago it would have been rare to see financial institutions operating in the public IaaS cloud, but recently there have been more examples. Last year at Amazon’s re:Invent conference Capital One’s CIO Rob Alexander described how the bank is using Amazon’s cloud to host some of the company’s newest applications. Capital One and the FHLB of Chicago show that even the most risk-averse organizations are beginning to embrace public cloud computing.To read this article in full or to leave a comment, please click here

Rackspace’s big pivot pays off

After a tumultuous time period of executive transition, questions about whether the company would be taken private or sold, and debate about the future of its public cloud plans, managed hosting and cloud provider Rackspace made a big pivot last year.The company has always prided itself on “Fanatical Support,” meaning that it will help customers use its infrastructure services. Last year it did what would have been unthinkable a couple of years ago though: It began offering that fanatical support for other cloud providers too.+MORE AT NETWORK WORLD: IDC's pick for the best cloud consultant is... | Geeky ways to celebrate Friday the 13th +To read this article in full or to leave a comment, please click here

Ixia’s CloudLens brings visibility to hybrid cloud environments

The digital business era has brought about many changes to IT. One of the biggest evolutions is the acceptance and usage of the cloud.Cloud computing’s path is similar to the one virtualization traveled about a decade ago. Early on, virtualization was used in labs and for non-mission-critical workloads. But as the technology matured and organizations became comfortable with it, usage exploded.The same thing is happening with cloud, and over the next few years, the industry will see more and more applications and services moved to the cloud. Hybrid Cloud: The time for adoption is upon us For most organizations, however, migrating to the cloud is no simple thing.To read this article in full or to leave a comment, please click here

Ansible as Automation Glue

Ansible

Throughout my time at Ansible, I have endeavoured to put together pertinent demos for customers - when I was 'on the other side of the fence' I always preferred it when a vendor asked about the challenges we faced and prepared the product to show how it would help me.

A few months back a customer told us about their challenge of getting code from development into production, and how it was taking almost a third of a year. They wanted to see how Ansible could help accelerate that workflow.

Since giving that demo I've not stopped asking customers about their challenges, but nine times out of ten they come back with the same answer these days - development to production workflow acceleration. That's when I show the same demo.

ansible

After running through this so many times, I thought it might be useful to record it as a screencast to share it publicly - along with all the Ansible playbooks used to put it together. The demo runs to 18 minutes in total, but covers many aspects of how powerful and flexible Ansible is as a tool - from machine provisioning to configuration management to code deployment to interacting with various Continue reading

Twitter #PassesNoteToFlightAttendant, geeky laughter ensues

Perhaps you noticed the story last week about an economics professor whose math scribblings prior to takeoff from Philadelphia so alarmed a paranoid ninny sitting next to him that she reported the “suspicious behavior” in a note passed to an American Airlines flight attendant. You know, as in math means terrorist so flight delayed two hours. Twitter noticed and this morning the hashtag #PassesNoteToFlightAttendant produced much merriment. Here’s a sampling, the first of which would have blown that ninny’s mind: There’s plenty more if this kind of thing amuses you.To read this article in full or to leave a comment, please click here

Twitter #PassesNoteToFlightAttendant, geeky laughter ensues

Perhaps you noticed the story last week about an economics professor whose math scribblings prior to takeoff from Philadelphia so alarmed a paranoid ninny sitting next to him that she reported the “suspicious behavior” in a note passed to an American Airlines flight attendant. You know, as in math means terrorist so flight delayed two hours. Twitter noticed and this morning the hashtag #PassesNoteToFlightAttendant produced much merriment. Here’s a sampling, the first of which would have blown that ninny’s mind: There’s plenty more if this kind of thing amuses you.To read this article in full or to leave a comment, please click here

Is your data safe when it’s at rest? MarkLogic 9 aims to make sure it is

The database landscape is much more diverse than it once was, thanks in large part to big data, and on Tuesday, one of today's newer contenders unveiled an upcoming release featuring a major boost in security.Version 9 of MarkLogic's namesake NoSQL database will be available at the end of this year, and one of its key new features is the inclusion of Cryptsoft’s KMIP (Key Management Interoperability Protocol) technology.MarkLogic has placed its bets on companies' need to integrate data from dispersed enterprise silos -- a task that has often required the use of so-called ETL tools to extract, transform and load data into a traditional relational database. Aiming to offer an alternative approach, MarkLogic's technology combines the flexibility, scalability, and agility of NoSQL with enterprise-hardened features like government-grade security and high availability, it says.To read this article in full or to leave a comment, please click here

Is your data safe when it’s at rest? MarkLogic 9 aims to make sure it is

The database landscape is much more diverse than it once was, thanks in large part to big data, and on Tuesday, one of today's newer contenders unveiled an upcoming release featuring a major boost in security.Version 9 of MarkLogic's namesake NoSQL database will be available at the end of this year, and one of its key new features is the inclusion of Cryptsoft’s KMIP (Key Management Interoperability Protocol) technology.MarkLogic has placed its bets on companies' need to integrate data from dispersed enterprise silos -- a task that has often required the use of so-called ETL tools to extract, transform and load data into a traditional relational database. Aiming to offer an alternative approach, MarkLogic's technology combines the flexibility, scalability, and agility of NoSQL with enterprise-hardened features like government-grade security and high availability, it says.To read this article in full or to leave a comment, please click here

Book Review: Deep Work by Cal Newport

Deep Work by Cal Newport is highly recommended if you are an information worker who is less productive than you wish you were. I recommended Deep Work even more highly if you feel you are productive, but are not producing the sort of work you desperately want to be.

SAP design chief talks details of Apple deal

SAP isn't necessarily known for its design chops or world-class user experience, but the enterprise software giant hopes its new partnership with Apple can change that. "We felt that a partnership with Apple can take that to the next level, both with Apple's expertise in design, but also the ability to optimize those designs natively on iOS devices," says Sam Yen, SAP's chief design officer.Apple and SAP began exploring potential partnerships more than a year ago, according to Yen, and their respective CEOs met in late 2015 to start to formalize the deal. The goal of the pact is to rethink the entire mobile enterprise experience, according to Yen. Apple's iOS is widely used in enterprise, and "76 percent of all global business transactions are done on SAP systems," according to Yen, so it was a "no brainer" for the two companies to combine their strengths.To read this article in full or to leave a comment, please click here

Enterprise networkers have organized: Here are their demands

A user group for enterprise IT managers is taking on software-defined networking, calling for new technologies they say would better serve enterprise needs.On Tuesday, the Open Networking User Group (ONUG) announced initiatives behind four technologies that it says would help enterprises build and run their networks better.There’s no shortage of platforms and protocols for software-defined infrastructure, including things like OpenFlow, OpenStack and ONOS (Open Network Operating System). But they were developed around the needs of vendors and service providers more than of enterprises, ONUG founder Nick Lippis said. His group wants to push along a few more pieces that aren’t there yet.To read this article in full or to leave a comment, please click here

Enterprise networkers have organized: Here are their demands

A user group for enterprise IT managers is taking on software-defined networking, calling for new technologies they say would better serve enterprise needs.On Tuesday, the Open Networking User Group (ONUG) announced initiatives behind four technologies that it says would help enterprises build and run their networks better.There’s no shortage of platforms and protocols for software-defined infrastructure, including things like OpenFlow, OpenStack and ONOS (Open Network Operating System). But they were developed around the needs of vendors and service providers more than of enterprises, ONUG founder Nick Lippis said. His group wants to push along a few more pieces that aren’t there yet.To read this article in full or to leave a comment, please click here

5 security experts share their best tips for ‘fringe’ devices

What is a ‘fringe’ device in IT? For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day. As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.To read this article in full or to leave a comment, please click here

5 security experts share their best tips for ‘fringe’ devices

What is a ‘fringe’ device in IT? For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day. As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.To read this article in full or to leave a comment, please click here

UK court declines to force alleged British hacker to decrypt his data

The U.K.'s National Crime Agency (NCA) failed in its attempt to use what critics described as a legal backdoor to force a suspected hacker to provide the decryption key for data on multiple devices.Lauri Love, 31, was arrested by U.K. authorities in 2013 under suspicion of hacking into computers belonging to multiple U.S. government agencies including NASA, the FBI, the Federal Reserve, and the Army.Love is the subject of separate indictments in courts in New Jersey, New York, and Virginia and faces extradition to the U.S. An extradition hearing is scheduled for the end of June.To read this article in full or to leave a comment, please click here

UK court declines to force alleged British hacker to decrypt his data

The U.K.'s National Crime Agency (NCA) failed in its attempt to use what critics described as a legal backdoor to force a suspected hacker to provide the decryption key for data on multiple devices.Lauri Love, 31, was arrested by U.K. authorities in 2013 under suspicion of hacking into computers belonging to multiple U.S. government agencies including NASA, the FBI, the Federal Reserve, and the Army.Love is the subject of separate indictments in courts in New Jersey, New York, and Virginia and faces extradition to the U.S. An extradition hearing is scheduled for the end of June.To read this article in full or to leave a comment, please click here

DR versus DIS: What’s the Diff?

OSPF and IS-IS, both link state protocols, use mechanisms that manage flooding on a broadcast link, as well as simplify the shortest path tree passing through the broadcast link. OSPF elects a Designated Router (or DR) to simplify broadcast links, and IS-IS elects a Designated Intermediate System (or DIS—a topic covered in depth in the IS-IS Livelesson I recently recorded). Beyond their being used in two different protocols, there are actually subtle differences in the operation of the two mechanisms. So what is the difference?

Before we dive into differences, let’s discuss the similarities. We’ll use the illustration below as a basis for discussion.

Broadcast network operation in link state protocols

Q1 and Q2 illustrate the operation of a link state protocol without any optimization on a broadcast network, with Q1 showing the network, and Q2 showing the resulting shortest path tree. Q3 and Q4 illustrate link state operation with optimization over a broadcast link. It’s important to differentiate between building a shortest path tree (SPT) across the broadcast link and flooding across the broadcast link—flooding is where the primary differences lie in the handling of broadcast links in the two protocols.

Let’s consider building the SPT first. Both protocols operate roughly the same in this Continue reading

Community is Key

So in case anyone didn’t know, I got to speak at Interop Las Vegas 2016 last week. It was an amazing experience, and I think it changed my professional outlook on a lot of things.  I had never attended a large conference like this before, and it was slightly daunting in that respect, to say […]

The post Community is Key appeared first on Packet Pushers.