100G interconnect hooks UConn into massive research databases

The University of Connecticut announced yesterday that it has connected a new 100G fiber link, giving its faculty an improved ability to collaborate with others around the world on data-intensive research projects.The connection links to a global backbone network called Internet2, which is a specialized research and education infrastructure linking government, corporate and academic organizations together.+ ALSO ON NETWORK WORLD: Microsoft to release next generation of Windows Server in 2016 | iPhone still king of enterprise mobile as usage skyrockets, study finds +To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Wednesday, February 11

Smartphone thefts fall after kill switches come inLaw enforcement officials who pushed hard for vendors to make smartphones a less attractive target for theft by adding “kill switch” features are pleased to know the tactic is working. Statistics to be released Wednesday show smartphone thefts, particularly for iPhones, trending down significantly in New York, London and San Francisco.Anthem hit for failure to communicateInadequate security practices let hackers steal personal information on about 80 million customers of Anthem, and now inadequate follow-up with those victims by the health insurer has attorneys general in ten U.S. states demanding immediate action. Anthem said last week it would offer free credit monitoring and identity theft protection to victims, but since then, the AGs say, it has provided few additional details and no information about how individuals can sign up. They’re demanding that the insurer commit to reimbursing consumers for hack-related losses incurred between the breach and whenever victims get access to credit and identity theft safeguards.To read this article in full or to leave a comment, please click here

Uber rolls out safety features in its ride-hailing app across India

Uber Technologies has started a pilot across Indian cities of new safety features for its ride-hailing app, but the new measures may cut no ice with regulators in Delhi where the service was banned.The app will now let users send driver and vehicle details to their relatives and friends, and will also have an SOS button that will enable riders to contact the local authorities in an emergency.Uber was banned from Delhi in December after the alleged rape of a woman passenger by one of its drivers.It announced in January that to keep the service going, it had applied for a license under the city’s revised Radio Taxi Scheme that places tighter controls on taxi operators.To read this article in full or to leave a comment, please click here

BGP Route Reflector Clusters

BGP Route reflectors are used as an alternate method to full mesh IBGP and helps for scaling. BGP Route reflector clustering is used to provide redundancy in an RR design. Route Reflectors and its clients create a cluster. In an IBGP topologies, every BGP speaker has to be in a logically full mesh. Route reflectors… Read More »

The post BGP Route Reflector Clusters appeared first on Network Design and Architecture.

Drop in smartphone thefts after kill-switch introduction

The number of thefts and robberies of smartphones, particularly iPhones, is on the fall in New York, London and San Francisco, according to data to be released Wednesday.Law enforcement officials, who have been at the forefront of demands to include a “kill switch” in all smartphones, hailed the news as proof that the technology is working as a deterrent.In San Francisco, overall robberies and thefts dropped 22 percent from 2013 to 2014, but those involving smartphones were down 27 percent. Thefts and robberies of iPhones fell 40 percent. In New York, smartphone theft dropped 16 percent overall with iPhone figures down 25 percent. And London saw smartphone thefts from persons drop 40 percent in a year.To read this article in full or to leave a comment, please click here

Wi-Fi backers warn about unlicensed LTE while Ericsson claims speed boost

The Wi-Fi Alliance warned that LTE on unlicensed frequencies could interfere with Wi-Fi and said it plans to collaborate with the 3GPP cellular standards group to help prevent that.Mobile operators are starting to explore the use of the unlicensed 5GHz band for LTE even though many Wi-Fi networks rely on those frequencies. On Tuesday, Ericsson announced it’s testing unlicensed LTE with Qualcomm and that SK Telecom, T-Mobile USA and Verizon are interested in the technology.Most countries set aside large portions of the 5GHz band for use without a license, and Wi-Fi has become a major user of that spectrum. Mobile operators are allowed to use the band even though they have their own licensed frequencies, but LTE wasn’t developed to coexist with other networks in that kind of environment.To read this article in full or to leave a comment, please click here

Apple’s $710 billion market cap sets new record

At the close of trading on Tuesday, shares of Apple rested at $122.02 a share. Not only did the closing price represent an all-time stock high for the company, it also gave Apple a market cap of $710.74 billion. As a result, Apple is now the first U.S. company to close out the trading day with a market cap over $700 billion.Highlighting the financial behemoth that is Apple, here's how Apple's own market cap stacks up against some other notable tech heavyweights: Amazon has a market cap of $172 billion, Google has a market cap of $358 billion, while Microsoft has a market cap of $346 billion.In a broad sense, Tim Cook clearly knows what he's doing. Taking a closer look at Apple's stock price, however, one can't help but mention Apple's capital return program. When Apple began issuing dividends and engaging in stock buybacks, the company's share price saw an immediate boost. For starters, Apple as a dividend stock instantly became more appealing to large funds. More specifically, a number of large mutual funds are governed by rules which only allow them to invest in dividend paying stocks. Second, Apple's stock buyback program helps Continue reading

Using Docker with Vagrant

As part of my ongoing effort to create tools to assist others in learning some of the new technologies out there, I spent a bit of time today working through the use of Docker with Vagrant. Neither of these technologies should be new to my readers; I’ve already provided quick introductory posts to both (see here and here). However, using these two together may provide a real benefit for users who are new to either technology, so I’d like to take a bit and show you how to use Docker with Vagrant.

Background

Vagrant first started shipping with a Docker provider as part of the core product in version 1.6 (recall that Vagrant uses the concept of providers to support multiple backend virtualization solutions). Therefore, if you’ve installed any recent version of Vagrant, you already have the Docker provider as part of your Vagrant installation.

However, while you may have the Docker provider as part of Vagrant, you still need Docker itself (just like if you have the VMware provider for Vagrant, you still need the appropriate VMware product—VMware Fusion on the Mac or VMware Workstation on Windows/Linux) in order to provide the functionality Vagrant will consume. Continue reading

Native TFTP and FTP Server in OSX

As a System Engineer, I do occasionally have to do real field work. When that happens, having access to a TFTP and FTP server is sometimes required. Although the [lack of] UI makes the use counterintuitive, these tools are available in OSX. This post includes the commands required to enable, confirm, and disable both TFTP and FTP in the native Mac environment.

TFTP Server

//load the TFTP daemon (typically starts automatically)
sudo launchctl load -F /System/Library/LaunchDaemons/tftp.plist

//confirm that TFTP is listening (netstat)
netstat -atp UDP | grep tftp
--output--
udp6       0      0  *.tftp                 *.*   //IPv6 Listening                         
udp4       0      0  *.tftp                 *.*   //IPv4 Listening     

//unload the TFTP daemon
sudo launchctl unload -F /System/Library/LaunchDaemons/tftp.plist

//confirm that TFTP is no longer listening (netstat)
netstat -atp UDP | grep tftp
--no output--

TFTP Caveats

  • Default Directory is /private/tftpboot
  • Copying a file from a device to the TFTP server requires it be “pre” created (Hint: sudo touch /private/tftpboot/<filename>)
  • File permissions typically need to be modified (Hint: sudo chmod 766 /private/tftpboot/*)
  • I just use my TFTP directory for transient file transfers

FTP Server

//load the FTP daemon (typically starts automatically)
sudo launchctl load -w /System/Library/LaunchDaemons/ftp.plist

//confirm that FTP is listening (netstat)
netstat  Continue reading

How to set up a new user on your Amazon AWS server

I recently set up a free Amazon AWS server. As I experimented with it, I installed a GUI desktop. Then I encountered some issues that I eventually resolved by creating a new user with its own password and then using that user for the rest of my activities.

For my own reference, and in the hope others will find it useful, here is the procedure I followed:

  1. Create a new userid, with password
  2. Add the new user to the *sudoers* file
  3. Install the AWS server’s public key for the new user
  4. Log in as the new user

I posted the details in my blog post, below.

Why do we need a password?

The default ubuntu userid does not have a password. The Amazon AWS documentation on managing users recommends creating new users with password disabled. So, why set up a new user with a password?

After installing a GUI desktop, you need to a use a password to authenticate operations performed by GUI software such as Ubuntu Software Center. I did not see any problems caused by configuring a user password. I found it was best to work in a “normal” Linux user account that has a password.

Create a Continue reading

Apple’s massive solar farm could power its entire California operations

Apple is investing in a vast solar plant in Northern California that will generate as much electricity as the company uses to power all its operations in the state.Apple will invest $850 million in the plant through a partnership with First Solar, CEO Tim Cook said Tuesday. It will cover 1,300 acres—equal to about 1,000 football fields—in Monterey County, about an hour south of Apples Silicon Valley headquarters.The plant will generate enough energy that it could power Apples entire operations in California, including its data center, retail stores and offices. That’s also enough energy to power 15,000 California homes, Cook said.It doesn’t mean Apple’s stores and offices will consume power directly from the plant. But the investment allows Apple to lock in a low, fixed rate for renewable energy, and probably also obtain renewable energy certificates to offset its carbon foot print.To read this article in full or to leave a comment, please click here

FCIP – The Beginning

FCIP is notably a part of the CCIE Data Center lab exam blueprint. It is also a sticking point for a lot of candidates who have not done a whole lot on the storage networking side. Luckily FCIP has many correlations to the modern-day Ethernet networking that we all know and love, as it’s really just another tunneling technology! After some thought, I have decided to break this down into 2 blog posts. This one will cover FCIP basics, and another that will cover some more advanced FCIP options that you might have to use during the CCIE lab examination.

FCIP is used for extending a Fibre Channel (FC) network over an IP backbone. It encapsulates FC in IP so that SCSI and non-SCSI FC frames can be sent over an IP network. Normally most organizations are not going to do this simply for the sake of extending their FC network (why extend a lossless network over a lossy medium?), but rather for backup or replication jobs that need to occur between storage systems that are across some geographical distance. A typical deployment scenario is shown below:

20141229_01

Here we have two SANs separated by an IP network. Now, the Continue reading

What Intel’s $300 million diversity pledge really means

As controversy flares over workforce diversity in tech, Intel’s Rosalind Hudnell is working on an ambitious plan to spark change that could forever alter hiring practices at IT companies.She realizes, though, that change has to start from within the company, and that it won’t come overnight. Hudnell, Intel’s chief diversity officer, is responsible for implementing the company’s much-publicized US$300 million initiative to bring more women and under-represented minorities into its workforce by 2020. The challenges are many.The effort comes as an intense debate rages over what’s perceived as the technology industry’s sexist culture. Microsoft’s CEO Satya Nadella, for example, apologized after igniting a firestorm when he said in a public interview that not asking for pay raises is “good karma” for women.To read this article in full or to leave a comment, please click here

Using Docker with Vagrant

As part of my ongoing effort to create tools to assist others in learning some of the new technologies out there, I spent a bit of time today working through the use of Docker with Vagrant. Neither of these technologies should be new to my readers; I’ve already provided quick introductory posts to both (see here and here). However, using these two together may provide a real benefit for users who are new to either technology, so I’d like to take a bit and show you how to use Docker with Vagrant.

Background

Vagrant first started shipping with a Docker provider as part of the core product in version 1.6 (recall that Vagrant uses the concept of providers to support multiple backend virtualization solutions). Therefore, if you’ve installed any recent version of Vagrant, you already have the Docker provider as part of your Vagrant installation.

However, while you may have the Docker provider as part of Vagrant, you still need Docker itself (just like if you have the VMware provider for Vagrant, you still need the appropriate VMware product—VMware Fusion on the Mac or VMware Workstation on Windows/Linux) in order to provide the functionality Vagrant will consume. Continue reading

The meaning of Cloud

The term “Cloud” refers to a software development and delivery methodology that consists of decomposing applications into multiple services (a.k.a. “micro-services”) such that each service can be made resilient and scaled horizontally, by running multiple instances of each service. “Cloud” also implies a set of methodologies for the application delivery (how to host the application) and application management (how to ensure that each component is behaving appropriatly). The name, “Cloud”, seems to only capture the delivery piece of the equation, which is the proverbial tip of the iceberg.
An example that would help us break down the jargon into something a bit more concrete: a simple web application that lets a user add entries to a database table (e.g. “customers”) and perform some simple queries over this table. This is what is known as a CRUD application, from the initials of Create, Read, Update, Delete.
The “classic” version of this application would be a VisualBasic/Access (in the pre-Web days), .NET/SQLServer or Ruby On Rails/MySQL application. The software component is responsible to generate a set of forms/web pages for the user to input its data, execute some validation and access the database. In most application development frameworks (e.g. RoR), this example can be made to Continue reading

Microsoft fixes IE memory problems

Internet Explorer is getting major repairs, as Microsoft has issued 41 patches to fix memory vulnerabilities in its browser.The Internet Explorer patches are part of the company's routine monthly release of security and bug fixes for its software products, called "Patch Tuesday." Microsoft Office and both the desktop and server editions of Windows are also getting fixes in this batch.Overall, Microsoft issued patches to cover 56 different vulnerabilities, which are bundled into nine separate security bulletins.Three of the bulletins are marked as critical, meaning they fix vulnerabilities that could be exploited by malicious attackers without user intervention. System administrators should tend to critical vulnerabilities as quickly as possible. These bulletins cover Internet Explorer and both the server and desktop editions of Windows.To read this article in full or to leave a comment, please click here

File storage service Rapidshare to shutter in wake of legal woes

After years of legal trouble, the once-popular online file storage and sharing company Rapidshare is closing up shop.In a message posted to its website Tuesday, Rapidshare said it will stop active service on March 31. "We strongly recommend all customers to secure their data. After March 31st, 2015 all accounts will no longer be accessible and will be deleted automatically," the message said.MORE ON NETWORK WORLD: 12 Free Cloud Storage options It did not say why it is shutting down. However, legal troubles related to copyright infringement have plagued the company for years.To read this article in full or to leave a comment, please click here