iOS 9 rumor roundup

With WWDC now less than a month away, it's only a matter of time before Apple takes the wraps off of iOS 9, the mobile software that will power Apple's next iteration of iPhones.While typical iOS updates involve the rollout of hundreds of new features, iOS 9 will reportedly be a bit different. Indeed, with a growing chorus of users complaining that iOS has become too unwieldy and a bit buggy, iOS 9 will purportedly focus more on under the hood enhancements rather than a bombardment of cool new features.In that vein, it's fair to look at iOS 9 as the mobile version of Snow Leopard, Apple's 2009 OS X release that was designed primarily to increase machine stability and improve overall system performance.To read this article in full or to leave a comment, please click here

Liveblog from ONUG Day 2

Yesterday’s Liveblog was a success, so let’s try again. Today I’ll be covering the ONUG Town Hall meeting on the topic “Will the DevOps Model Deliver in the Enterprise?”, featuring such luminaries as:

  • Najam Ahmad (Facebook)
  • Mike Dvorkin (Cisco)
  • Tim Gerla (Ansible)
  • Dimitri Stiliadis (Nuage Networks)
  • Marc Woolward (vArmor)

This has the potential to be a great discussion; based on lunch with Dvorkin I can confirm that he is in great form. Please join me by following along below!

If you liked this post, please do click through to the source at Liveblog from ONUG Day 2 and give me a share/like. Thank you!

Linked lists

Python has a rather handy list method. It allows you to add and remove items at will. How it actually does this is rather elaborate and you can read all about it over here. C doesn’t give you the same flexibility. When you create an array, it is of X size. That size cannot change … Continue reading Linked lists

Adrian Cockcroft to Speak @ DockerCon 2015

In his keynote from DockerCon 2014 EU, Adrian Cockcroft (Technology Fellow at Battery Ventures and former Cloud Architect at Netflix) shares his thoughts on the future of microservices, summarizes the differences and commonalities across various microservices architectures and shows how they are evolving. Adrian’s … Continued

Smartphones from Xiaomi and Micromax pressure established manufacturers

Indian smartphone manufacturer Micromax and Xiaomi from China have given the low-end segment a shake up with their latest products, and even if the devices don’t go on sale around the world, their launches will likely be felt globally.The Micromax Yu Yuphoria the Xiaomi Mi 4i’s combination of impressive specs and aggressive pricing will put pressure on the likes of Samsung Electronics and Motorola Mobility to step up their efforts in the segment for sub-US$200 smartphones.“It’s more pain for the established vendors. These devices have the potential to reset customer expectations,” said Ben Wood, chief of research at CCS Insight.The Yu Yuphoria was launched on Tuesday in India. It’s an LTE smartphone that will cost about $110 without a contract in that country. It has a 5-inch, 720 x 1280 pixel screen and a Snapdragon 410 processor. The specification also includes an 8-megapixel main camera and a 5-megapixel front camera, as well as 2GB of RAM and 16GB of integrated storage. While smartphones in this price category used to look as cheap as they were, the Yuphoria has a metal frame to help it look more premium.To read this article in full or to leave a Continue reading

Asian nations increasingly hit by espionage groups

Multiple cyberespionage groups are specifically targeting government and military organizations from countries in Asia and the Pacific region with the goal of gathering geo-political intelligence, according to new security research.Some of the groups have been active for years, but the extent of their operations are only now coming to light.One Chinese-speaking group, dubbed Naikon, has been operating for five years and has had a “high volume, high profile, geo-political attack activity,” researchers from Kaspersky Lab said Thursday in a report.The group has targeted top-level government, military and civilian organizations from the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar (Burma), Singapore, Nepal, Thailand, Laos and China.To read this article in full or to leave a comment, please click here

Let’s Review: OSPF LSA Types

With my Written exam for CCIE: R/S coming up soon (Cisco Live 2015) I figured this would be a good time to back over some basics, and when it comes to OSPF what is more basic than OSPF LSA Types! LSA Type 1 – These are also known as Router LSA’s, every router participating in […]

My Top 10 Things to Look Forward to at Cisco Live 2015

  10. John Chambers Keynote This year will mark John Chambers last Cisco Live Keynote as CEO of Cisco, ending his 20 year run in the position.  In case you may have missed the announcement, starting on July 26th, Chuck Robbins will take over as CEO.  This keynote will be John’s farewell and perhaps the welcoming […]

The post My Top 10 Things to Look Forward to at Cisco Live 2015 appeared first on Fryguy's Blog.

Common Networking Protocols in LAN, WAN and Datacenter

Spanning Tree, Link Aggregation , VLAN and First Hop Redundancy protocols are used in Campus, Service Provider Access and Aggregation and in the Datacenter environment. There are definitely other protocols which are common across the Places in the Networks but in order to keep this article short and meaningful I choose these four. I will… Read More »

The post Common Networking Protocols in LAN, WAN and Datacenter appeared first on Network Design and Architecture.

China-based hackers used Microsoft’s TechNet for attacks

Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security vendor FireEye.The group, which FireEye calls APT (advanced persistent threat) 17, is well-known for attacks against defense contractors, law firms, U.S. government agencies and technology and mining companies.TechNet is highly trafficked website that has technical documentation for Microsoft products. It also has a large forum, where users can leave comments and ask questions.APT17—nicknamed DeputyDog—created accounts on TechNet and then left comments on certain pages. Those comments contained the name of an encoded domain, which computers infected by the group’s malware were instructed to contact.To read this article in full or to leave a comment, please click here

VCDX-NV Interview: Nemtallah Daher Discusses VMware NSX Certification

Nemtallah Daher is Senior Network Delivery Consultant at the consulting firm AdvizeX Technology. Recently he took some time out of his day to talk with us about why, as a networking guy, he thinks learning about network virtualization is critical to further one’s career. 

***

I’ve been at AdvizeX for about a year now. I do Cisco, HP, data center stuff, and all sorts of general networking things: routing, switching, data center, UCS. That kind of stuff. Before coming to AdvizeX, I was a senior network specialist at Cleveland State University for about 20 years.

I started at Cleveland State in 1988 as a systems programmer, working on IBM mainframe doing CICS, COBOL and assembler. About 2 years after I started at Cleveland State, networking was becoming prevalent, and the project I was working on was coming to an end, so they asked me if I would help start a networking group. So from a small lab here, a building here, a floor there, I built the network at Cleveland State. We applied for a grant to get some hardware, applied for an IP address, domain name, all these things. There was nothing at the time, so we Continue reading

Review: 7 Android apps that track your expenses

Traveling these days is a hassle, no matter why you're going, or where -- and the necessity to track your expenses along the way just adds to the irritation. A good app, though, can make things a lot easier -- not only during the trip but afterwards, when you have to report it all to your (or your company's) accountant.The following seven Android apps have been created to help users track and report on their expenses. Some are strictly for business purposes; others can be used for both personal and work finance tracking. All of these have been updated within the last six months and have earned a rating of at least 4 out of 5 stars on Google Play by at least 100 users.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, May 14

U.S. House votes to end NSA bulk data collectionThe dragnet collection of U.S. phone records by the National Security Agency exposed by former NSA contractor Edward Snowden nearly two years ago is finally on its way to being a relic of history. The U.S. House of Representatives voted 338 to 88 in favor of a bill that prohibits the practice. However, the USA Freedom Act does extend an expiring provision in the anti-terrorism Patriot Act that allows the NSA to collect U.S. telephone and business records, but with a more limited scope.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, May 14

U.S. House votes to end NSA bulk data collectionThe dragnet collection of U.S. phone records by the National Security Agency exposed by former NSA contractor Edward Snowden nearly two years ago is finally on its way to being a relic of history. The U.S. House of Representatives voted 338 to 88 in favor of a bill that prohibits the practice. However, the USA Freedom Act does extend an expiring provision in the anti-terrorism Patriot Act that allows the NSA to collect U.S. telephone and business records, but with a more limited scope.To read this article in full or to leave a comment, please click here

Validating and searching JSON

When it comes to dealing with network automation, you can find yourself battling with many things, including dealing with XML and JSON data structures as you build apps that consume or spit out data.

Recently I’ve been using ‘jq’ to provide my JSON validation (i.e. I’ve not missed a quotation, colon, comma, curly or square bracket) when building data in JSON. Its primary function and purpose is to search through JSON data to find something in the data set, or reduce the data set to an area of focus, thus also validating your application is generating what it should be generating! A ‘lightweight and flexible command line JSON processor’ if you take the website description which is here: http://stedolan.githib.io/jq/

So how do you use this jq?

Here’s a simple JSON example with an ‘error’.

{
	"name":"App1",
	"OS":["Linux", "Windows", "Solaris", "OSX"],
	"Author":"David Gee",
	"Email":"[email protected]",
	"Twitter":"@davidjohngee"
	"Version":"alpha-v0.1",
	"IP_Address":"192.0.2.1:5000"
}

Using ‘jq’ I can not only validate the structure, but in the case of a script, I can also parse out the key/value I need. But first, let’s see where our error is.

$ jq '.' tst.json 
parse error: Expected separator between  Continue reading