HP has released the 6127XLG blade switch for the C7000 blade enclosure. This Comware7 based switch is the big brother of the 6125XLG, so while the 6125XLG supported 10G server access, the 6127XLG includes support for the 20G server access … Continue reading →
written by Steve Francia I believe in doing things that matter. I believe that to do great things – you sometimes need to take some risks. In 2014, I had an opportunity to do something that matters. Once or … Continued
In this post, I’m going to show you how to use the Git command-line to check out GitHub pull requests locally. I take absolutely no credit for this trick! I picked this up from this GitHub Gist, and merely wanted to share it here so that others would benefit.
The GitHub gist shows you how to modify the Git configuration for a particular repository so that when you run git fetch it will fetch all the pull requests for that repository as well. This is handy, but what I personally found most helpful was a comment that showed the command to fetch a specific pull request. The command looks like this:
git fetch origin pull/1234/head:pr-1234
Let me break that command down a bit:
The origin in this case refers to the Git remote for this repository on GitHub. If you are using the fork-and-pull method of collaborating via Git and GitHub, then you will have multiple Git remotes—and the remote you want probably isn’torigin. For example, if you want to fetch a pull request from the original (not forked) repository, you’d want to use the name that corresponds to the Git remote for the original repository (I Continue reading
I’m conflicted about the expansion of tech into education. Is another screen really going to enhance learning, or just make kids increasingly distracted?
Please join us in congratulating the following iPexpert students who have passed their CCIE lab!
This Week’s CCIE Success Stories
Eric Williamson, CCIE #49880 (Collaboration)
Paul Raffles, CCIE #49941 (Data Center)
Fabien Roulette, CCIE #49854 (Collaboration)
This Week’s Testimonial
Eric Williamson CCIE #49880 (Collaboration) I would absolutely recommend IPexpert and Andy Vassar for CCIE Collaboration training. One of my favorite parts of the new blueprint change was that the rack rentals went to four hours and the labs increased but they were able to be done in smaller sections. As a person who travels on the road almost every week it was important to have a phone control/view option when coming in on a software VPN. This helped me to keep on track. Thank you Andy for helping me in so many instances, I will be eternally grateful.
Fabien Roulette CCIE #49854 (Collaboration) Thank you very much for the quality of your books and pods on proctorlabs
We Want to Hear From You!
Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!
Biometric technologies may soon replace cumbersome passwords, but the U.S. National Institute of Technology is looking out to a time when you won't even have to press your finger onto a grimy fingerprint reader to gain entry to a computer.NIST has funded a number of companies to make touchless fingerprint readers possible, and is creating a framework for evaluating possible technologies for widespread use.Touchless fingerprint readers could be particularly useful for quickly identifying large numbers of people, such as a queue entering a controlled facility, NIST contends. Germaphobes would also appreciate the technology, as they would not have to touch potentially germy fingerprint readers to gain access to their computers.To read this article in full or to leave a comment, please click here
Blackberry has moved further into the mobile device management space by purchasing Good Technology for US$425 million [m].
Good Technology sells enterprise mobile security products and was Blackberry's competitor. In a January blog post, Blackberry called out Good for claiming it was the first company to add a special billing feature to its products.
A separate blog post on Friday discussing the merger made note of this history, saying the companies have taken "aggressive positions" through the years.To read this article in full or to leave a comment, please click here
Auction house Bonhams will put a pristine Apple-1 personal computer on the block later this month, and has pegged the gavel price at between $300,000 and $500,000.Bonhams has experience selling vintage Apple-1 computers: One it sold last year went for the still-record $905,000 after commissions and taxes.The Apple-1, essentially a stand-alone circuit board sans keyboard, monitor or even power supply, was hand-built by Apple co-founder Steve Wozniak in 1976, and may have been one of the first lot of 50, according to a penned identifier on the back. That mark -- 01-0059 -- was probably an inventory number assigned by the Byte Shop of Mountain View, Calif., the first volume purchaser of the computer.To read this article in full or to leave a comment, please click here
Docker Global Hack Day #3 is just around the corner! Hacking starts on Wednesday, September 16th and runs through Monday, September 21st. Check out the list of local meetups holding events. If you don’t see one in your neck … Continued
1 billion: people who used Facebook in a single day; 2.8 million: sq. ft. in new Apple campus (with drone pics); 1.1 trillion: Apache Kafka messages per day; 2,000 years: age of termite mounds in Central Africa; 30: # of times better the human brain is better than the best supercomputers; 4 billion: requests it took to trigger an underflow bug.
Quotable Quotes:
Sara Seager: If an Earth 2.0 exists, we have the capability to find and identify it by the 2020s.
Android Dick: But you’re my friend, and I’ll remember my friends, and I’ll be good to you. So don’t worry, even if I evolve into Terminator, I’ll still be nice to you. I’ll keep you warm and safe in my people zoo, where I can watch you for ol’ times sake.
@viktorklang: "If the conversation is typically “scale out” versus “scale up” if we’re coordination-free, we get to choose “scale out” while “scaling up.”
Two French ISPs have asked France's highest court to make public a secret government decree defining how French security services can monitor the Internet.France's foreign intelligence service, the Directorate General of Exterior Surveillance (DGSE) operates under rules set in a secret government decree in 2008. The existence of the decree was revealed by the magazine l'Obs in July this year.The decree's existence has not been denied by the government. While its content remains secret, it is known that it authorizes the DGSE to tap Internet communications entering or leaving French territory on a massive scale.On Thursday, ISPs FDN and FFDN, along with online rights group La Quadrature du Net, revealed that they had filed two suits with the Council of State, seeking a summary judgment and suspension of the unpublished decree. The Council of State is, among other functions, France's highest court for matters involving the administration.To read this article in full or to leave a comment, please click here
For the past several weeks an intelligence-gathering campaign has been using fake LinkedIn recruiter profiles to map out the professional networks of IT security experts, researchers from F-Secure have discovered.LinkedIn can be a great tool to establish new professional relationships and discover job opportunities. However, accepting connection requests from unknown people is a double-edged sword that can put both employees and the companies they work for at risk.There are multiple cases where attackers have used fake LinkedIn profiles to gather sensitive information about organizations and their employees. Knowing who is the manager of a particular department in a company or who is a member of the organization's IT staff can be very useful in planning targeted attacks.To read this article in full or to leave a comment, please click here
Magnetic signals can be used to communicate within the human body, a team of scientists recently said.The newly developed technique sends magnetic fields through biological tissue and could be used for a human-hosted wireless sensor network. Full-body health monitoring might be an application.The proof-of-concept idea, demonstrated recently by electrical engineers from the University of California, San Diego, could one day replace power-hungry Bluetooth for wearable networking, the researchers say.It would also be more secure than existing communications between wearables, they reckon.Signals move easier
Magnetic field-generating coils, wrapped around three parts of the body—head, arm, and leg—allowed signals to move easily from one side of the body to the other in the scientists' experiments.To read this article in full or to leave a comment, please click here
Today’s show, sponsored by Sonus Networks, examines ways to deliver predictable traffic behavior in an environment of congestion via an intelligent network control coupled with application-aware policies driven by business rules.
Yet it remains true that general progress needs peace and co-operation, and that it is greatly hindered by pettiness of mind. In face of others’ superiority, there is only one honorable attitude: to be glad of it, and then it becomes our own joy, our own good fortune.
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Vulnerability risk management has re-introduced itself as a top challenge – and priority – for even the most savvy IT organizations. Despite the best detection technologies, organizations continue to get compromised on a daily basis. Vulnerability scanning provides visibility into potential land mines across the network, but often just results in data tracked in spreadsheets and independent remediation teams scrambling in different directions.