NetSol’s new con; renewing unwanted .xyz domains

My friend Michael Williams, a private investigator based in Santa Barbara, Calif., is really pissed off with Network Solutions. This is what made him mad: Mike Williams That’s from an email message he received from Network Solutions a couple of weeks ago and Mike’s problem is that he doesn’t own the domain mswssi.xyz. While Mike does own the domains mswssi.com, mswssi.net, and mswssi.org this was a domain he knew nothing about so the letter made no sense. Mike called Network Solutions customer service and discovered that he had been “given” the domain by the company but, to his knowledge, had never been told anything about it. To read this article in full or to leave a comment, please click here

Using Vagrant and Docker Machine Together

In this post, I’m going to show you a quick tip I used today to combine the power of Vagrant with that of Docker Machine to quickly and easily create Docker-enabled virtual machines (VMs) on your laptop. This could be useful in a variety of scenarios; I leave it as an exercise for the reader to determine the best way to leverage this functionality in his or her own environment.

In my case, I needed to be able to easily create/destroy/recreate a couple of Docker-enabled VMs for a project on which I’m working. The problem I faced was that the tools I would normally use for such a task—Vagrant and Docker Machine—each had problems when used on their own:

  • Vagrant has a Docker provisioner, but I could only get it to install the latest released version of Docker. In my case, I needed to run a test version (specifically, the RC2 build of Docker 1.8.0).
  • Docker Machine has various back-end drivers that can create VMs into which Docker is provisioned, but the VMware Fusion driver for Machine only works with Boot2Docker. In my case, I needed to run Ubuntu 14.04 in the VMs.

As it turns Continue reading

How to set up a local account in Windows 10 during or after installation

You can setup a local account in Windows 10 during a clean installation, as well as after installing Windows 10 using a Microsoft account. The process is a bit more straightforward than it was with Windows 8.If you wanted to create a local account in Windows 8.1, Microsoft made you jump through hoops and numerous screens before finally selecting "Sign in without a Microsoft account (not recommended)." Skip down to the second half if you want to know how to create a local account while installing Windows 10.To read this article in full or to leave a comment, please click here

How to setup a local account in Windows 10 during or after installation

You can setup a local account in Windows 10 during a clean installation and you can also setup a local account after installing Windows 10 using a Microsoft account. The process is a bit more straightforward than it was in Windows 8. If you wanted to create a local account in Windows 8.1, Microsoft made you jump through hoops and numerous screens before finally selecting “Sign in without a Microsoft account (not recommended).” Skip down to the second half if you want to know how to create a local account while installing Windows 10.To read this article in full or to leave a comment, please click here

Salesforce taps Instagram’s new API with tailored marketing tools

Users of Salesforce’s Marketing Cloud on Tuesday gained easier access to Instagram’s roughly 300 million users thanks to an integration made possible by a new API.Marketers can now use Salesforce’s cloud software to buy and manage Instagram advertising, publish content and offer customer service on the photo and video sharing site, among other capabilities.Making the new integration possible is Instagram’s Ad API, which was originally announced in June. At the time, the site said it would initially open up the application programming interface just to a select group of Facebook marketing partners and agencies.To read this article in full or to leave a comment, please click here

Who goes there? CA will know with Xceedium buy

In a move to round out its portfolio of enterprise identity management software, CA Technologies is acquiring security software provider Xceedium.The purchase will allow CA to offer to enterprises more comprehensive coverage of who is allowed on their sensitive networks and systems, according to CA.Identity management is proving to be an increasingly vital component to securely managing the enterprise. It is the process of assigning each employee or contractor a systems account, and then limiting that user to only those systems that he or she has a legitimate reason to use.The recent breach at the U.S. Office of Personnel Management might have been thwarted, for instance, through tighter access controls.To read this article in full or to leave a comment, please click here

Docker

written by Brian Goff, Technical Alliances at Docker, Inc. Integration allows Oracle users to easily distribute applications built and deployed in Oracle Solaris Zones Over the last year, I’ve had the opportunity to work closely with Oracle on a few … Continued

EFF-led group wants to give do-not-track some bite

For years now, checking the “do-not-track” option on your browser has been little more than wishful thinking on the part of users who care about privacy online. But now a group led by the Electronic Frontier Foundation is looking to make that a more meaningful action.The EFF and others have published a standard policy it hopes advertisers, analytics companies and publishers will adopt in order to respect the wishes of users who don’t want to be tracked online. Getting the support needed to make a real difference will be an uphill battle, they acknowledge.To read this article in full or to leave a comment, please click here

EFF-led group wants to give do-not-track some bite

For years now, checking the “do-not-track” option on your browser has been little more than wishful thinking on the part of users who care about privacy online. But now a group led by the Electronic Frontier Foundation is looking to make that a more meaningful action.The EFF and others have published a standard policy it hopes advertisers, analytics companies and publishers will adopt in order to respect the wishes of users who don’t want to be tracked online. Getting the support needed to make a real difference will be an uphill battle, they acknowledge.To read this article in full or to leave a comment, please click here

CEO Rich Napolitano Named to the 2015 CRN Top 100 Executives List

We’re thrilled that CEO, Rich Napolitano has been named to CRN®’s Top 100 list of the IT industry’s foremost channel leaders. CRN’s annual list recognizes the efforts of agile decision-makers who play an integral role in evolving the way the channel does business. These 100 leaders, picked by the CRN editorial staff, represent the pre-eminent innovators, influencers, disrupters and channel sales leaders in the IT channel today.

Rich has been at the helm of Plexxi since November 2014. He brought with him a simple formula to success: bring high quality and disruptive products to market through partners that are looking to carve a new path in the market. With channel partners like CloudGov Technologies and Arrow Electronics, Plexxi is bringing this vision to the market and ushering in the next era of IT.

CRN also named Plexxi a 2015 Emerging Vendor, and reporter Michael Novinson recently spoke exclusively with Rich about our newly announced channel distribution agreement with Arrow Electronics and how this helps move the industry further faster.

“We are at a major transition point and opportunity in the IT landscape. This transformation will not only upend the networking industry as we know but will transform the Continue reading

Senate heads toward vote on CISA cyberthreat info sharing bill

The U.S. Senate could take a preliminary vote as soon as Wednesday on a controversial bill intended to encourage businesses to share cyberthreat information with each other and with government agencies, despite concerns that the legislation would allow the widespread sharing of personal customer data.Senate leaders are attempting to iron out compromise language to address privacy concerns in the Cybersecurity Information Sharing Act (CISA), but if no compromise is reached Senate Majority Leader Mitch McConnell will schedule a so-called cloture vote on Wednesday morning, said a spokesman for McConnell, a Kentucky Republican.A cloture vote would limit debate on the bill and move the Senate toward final passage, potentially before the Senate leaves for a four-week summer recess this weekend.To read this article in full or to leave a comment, please click here

First Look: AnsibleFest San Francisco 2015

Untitled_design

We are happy to announce that AnsibleFest will be returning to San Francisco this November. After a sell-out AnsibleFest in New York City, we have moved the West Coast event to an even larger location. 

If you are new to Ansible, AnsibleFest is a day-long conference bringing together hundreds of Ansible users, developers and industry partners to share best-practices, case studies and Ansible news. AnsibleFest is for anyone who is passionate (or becoming passionate) about Ansible.

Attendees include DevOps engineers, operations engineers, open source fans, systems engineers, system administrators, operations staff, release engineers, DBAs, network engineers and security professionals.

Again, we are offering Super Early Bird pricing for just $275 a ticket through August 31st. Don't miss out as we are only offering a limited number of Super Early Bird tickets at this time.

We are also accepting speaker applications here.

Here is a sample of what to expect at AnsibleFest San Francisco 2015.

See all of the presentations here.

Learn More About AnsibleFest San Francisco 2015

 

FAA has approved more than 1,000 drone exemptions

The Federal Aviation Administration today said it has issued 1,008 exemptions to businesses wanting to fly unmanned aircraft in the national airspace.The FAA said most of the exemptions allow aerial filming for uses such as motion picture production, precision agriculture and real estate photography. The agency also said it has issued grants for new and novel approaches to inspecting power distribution towers and wiring, railroad infrastructure and bridges.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2015 (so far!)+To read this article in full or to leave a comment, please click here

Improve Your Open Networking Experience with Cumulus® VX™

In past jobs, when I was responsible for the architecture and engineering of networks, my peers and I would often spend measurable time working in the lab and testing out the setup of new network designs or approaches that we were looking to implement.

As anyone who has had to build a lab themselves will attest, you never have enough gear, power or space to do all of the testing you would like.  Between the problems of having to build the network from gear that’s been cast-off from the production network to not being able to run the latest software, you can end up questioning your testing results.  From being limited on cooling and power to having to find and run the cables to connect it all together, it can be a lot of work that may not answer everything you need for production.

In the compute space, this has been less of an issue in recent years. With the introduction of accessible virtualization, the application teams could simulate entire solution stacks on their desktop.  While you wouldn’t want to run your production environment on many of them, you could at least simulate all of the components in the solution and verify what you were doing different was viable. Continue reading

MikroTik unveils new RouterOS development cycle

 

[adrotate banner=”4″]

 

As we all patiently await the release of RouterOS (RoS) v7 beta, MikroTik has announced a change in the way RoS development is organized.  There will now be three different tracks of development:

Bugfix only – When a current build is released, only fixes to known bugs will be added to this branch of development

Current – Current release will contain bugfixes and new features

Release Candidate – The release candidate will remain the development build for the next “current” release.

 

Graphical Overview of the new development cycle

MikroTik-bugfix-map

Image and notes below are from here

A small addendum: the Bugfix only will only contain verified fixes, and no new features. The Current release contains the same fixes but also new features and other improvements, sometimes also less critical fixes than in Bugfix. And finally the Release Candidate is more likely to a nightly build. We will not to intensive testing before publishing these, only quick check if upgrade can be done and if most features work fine.

Origin

The idea originally came out of this thread and after a flurry of positive commentary, it became a working practice shortly therafter.

We plan to make sub-version releases Continue reading

MikroTik unveils new RouterOS development cycle

 

[adrotate banner=”4″]

 

As we all patiently await the release of RouterOS (RoS) v7 beta, MikroTik has announced a change in the way RoS development is organized.  There will now be three different tracks of development:

Bugfix only – When a current build is released, only fixes to known bugs will be added to this branch of development

Current – Current release will contain bugfixes and new features

Release Candidate – The release candidate will remain the development build for the next “current” release.

 

Graphical Overview of the new development cycle

MikroTik-bugfix-map

Image and notes below are from here

A small addendum: the Bugfix only will only contain verified fixes, and no new features. The Current release contains the same fixes but also new features and other improvements, sometimes also less critical fixes than in Bugfix. And finally the Release Candidate is more likely to a nightly build. We will not to intensive testing before publishing these, only quick check if upgrade can be done and if most features work fine.

Origin

The idea originally came out of this thread and after a flurry of positive commentary, it became a working practice shortly therafter.

We plan to make sub-version releases Continue reading