Opensource Meetup Presentation

I did a presentation on CoreOS and Service Discovery in Opensource Meetup group last week. Following are related slides and demo recording. CoreOS Overview and Current Status Slides: CoreOS Overview and Current Status from Sreenivas Makam CoreOS HA Demo recording: Scripts used are available here. Service Discovery using etcd, Consul and Kubernetes Slides: Service Discovery using … Continue reading Opensource Meetup Presentation

What does BGP free core mean ?

What is the meaning of BGP free core? BGP refers to an Internet protocol used between different Autonomous System on the Internet. The purpose of this post is not to explain the fundamentals of BGP, as I believe that readers are already familiar with the basic of BGP and IP routing operation. To understand the […]

The post What does BGP free core mean ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

What is RSVP-TE ?

What is RSVP-TE (RSVP Traffic Engineering)?  RSVP-TE refers to a resource reservation protocol that is invented in order to allocate a bandwidth for the individual flows on the network devices. To say it another way, RSVP-TE are extensions to the RSVP protocol specified in the RFC 3209. Although, RSVP-TE has been initially invented as a Quality […]

The post What is RSVP-TE ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

The CEOs of Google and Oracle met for 6 hours Friday but failed to settle their lawsuit

The CEOs of Oracle and Google met for six hours on Friday but failed to reach a deal to end their massive copyright lawsuit over Google's use of Java in Android."After an earlier run at settling this case failed, the court observed that some cases just need to be tried. This case apparently needs to be tried twice," Magistrate Judge Paul Singh Grewal, who mediated the talks, noted on the court's docket.Oracle accuses Google of illegally copying a key part of the Java platform into its Android operating system, making billions in profit for Google and, according to Oracle, crushing Java’s chance of success in smartphones, tablets and other products.To read this article in full or to leave a comment, please click here

Chrome extensions will soon have to tell you what data they collect

Google is about to make it harder for Chrome extensions to collect your browsing data without letting you know about it, according to a new policy announced Friday.Starting in mid-July, developers releasing Chrome extensions will have to comply with a new User Data Policy that governs how they collect, transmit and store private information. Extensions will have to encrypt personal and sensitive information, and developers will have to disclose their privacy policies to users.Developers will also have to post a "prominent disclosure" when collecting sensitive data that isn't related to a prominent feature. That's important, because extensions have tremendous power to track users' browsing habits and then use that for nefarious purposes.To read this article in full or to leave a comment, please click here

Chrome extensions will soon have to tell you what data they collect

Google is about to make it harder for Chrome extensions to collect your browsing data without letting you know about it, according to a new policy announced Friday.Starting in mid-July, developers releasing Chrome extensions will have to comply with a new User Data Policy that governs how they collect, transmit and store private information. Extensions will have to encrypt personal and sensitive information, and developers will have to disclose their privacy policies to users.Developers will also have to post a "prominent disclosure" when collecting sensitive data that isn't related to a prominent feature. That's important, because extensions have tremendous power to track users' browsing habits and then use that for nefarious purposes.To read this article in full or to leave a comment, please click here

Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations have been infected with a backdoor in unpatched versions of JBoss that could be used at any moment to install ransomware such as Samsam. That's according to Cisco's Talos threat-intelligence organization, which on Friday announced that roughly 3.2 million machines worldwide are at risk. Many of those already infected run Follett's Destiny library-management software, which is used by K-12 schools worldwide.To read this article in full or to leave a comment, please click here

Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations have been infected with a backdoor in unpatched versions of JBoss that could be used at any moment to install ransomware such as Samsam. That's according to Cisco's Talos threat-intelligence organization, which on Friday announced that roughly 3.2 million machines worldwide are at risk. Many of those already infected run Follett's Destiny library-management software, which is used by K-12 schools worldwide.To read this article in full or to leave a comment, please click here

That man who ‘deleted his entire company’ with a line of code? It was a hoax

The owner of a Web hosting company who claimed to have erased his entire business from the Internet with a single script command appears to have made the whole thing up.Marco Marsala of Italy posted a cry for help on the popular Server Fault forum earlier this week, claiming he’d accidentally erased all the data on his servers including backups.“I run a small hosting provider with more or less 1,535 customers and I use Ansible to automate some operations to be run on all servers,” Marsala wrote. “Last night I accidentally ran, on all servers, a Bash script with a rm -rf {foo}/{bar} with those variables undefined due to a bug in the code above this line.To read this article in full or to leave a comment, please click here

Thanks, Obama: TV will never be the same, and consumers will love it

It’s fitting that President Obama launched a new initiative to open up TV set-top boxes to competition 20 years after the Telecommunications Act of 1996 because consumers are in for as radical a makeover of television today as they experienced with the transformation of telephone communications back then. This isn’t Kansas anymore!In the next few years, consumers’ expectations for TV will be radically different, and in a decade, today’s TV will look as antiquated as cordless phones and answering machines look today.Opening up the set-top box means much more than market competition to lower the price and break the stranglehold that cable companies have over equipment leases that tie consumers to their TV. It means set-top boxes can include other features, such as Google Cast (renamed from Chromecast) AppleTV, Amazon Prime or Roku.To read this article in full or to leave a comment, please click here

A new approach to detecting compromised credentials in real-time  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Last year the Federal Financial Institutions Examination Council (FFIEC) issued a statement to notify financial institutions about the growing trend of cyber attacks designed to steal online credentials. While this is certainly a big issue for banks and credit unions, concern about stolen credentials extends far beyond the financial services industry. Basically any organization with valuable data is at risk of an attack initiated with seemingly legitimate credentials.To read this article in full or to leave a comment, please click here

A new approach to detecting compromised credentials in real-time  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Last year the Federal Financial Institutions Examination Council (FFIEC) issued a statement to notify financial institutions about the growing trend of cyber attacks designed to steal online credentials. While this is certainly a big issue for banks and credit unions, concern about stolen credentials extends far beyond the financial services industry. Basically any organization with valuable data is at risk of an attack initiated with seemingly legitimate credentials.To read this article in full or to leave a comment, please click here