Questions for Photography Enthusiasts

It’s no secret that I’m something of a photography enthusiast. To me, photography is a relaxing puzzle of how to assemble all the various pieces—setting, lighting, exposure, composition, etc.—to create just the right image. I’m not an expert, but that’s OK; I just do this for fun and to relax. If you’d like to see a small sampling of some of the photos I’ve taken, I publish some of them here on 500px.com.

I know that a fair number of folks in the IT industry are also photo enthusiasts, and so I was curious to hear some feedback from fellow enthusiasts about their photography workflows. In particular, I’m curious to know about how others answer these questions:

  • What formats do you use with your photos? (I’ve been shooting in RAW—NEF, specifically, since I’m a Nikon guy—then converting to Adobe DNG for use with Lightroom.)
  • How do you handle long-term storage of your photos? (Once I have the photos in DNG in Lightroom, then I’ve been archiving the RAW files on my Synology NAS.)
  • What pictures do you keep—all of them, or only the best ones? (So far, I’ve been keeping all the RAW files, archiving when Continue reading

SDN Market Sizing Redux

In April 2013, Plexxi teamed up with SDNCentral to take a look at how the SDN market might emerge. The original post along with supporting info graphic and written analysis can be found here. At a high level, the major takeaway was that we predicted that between 30 and 40 percent of the networking market would be influenced by SDN by 2018. At the time, this was BY FAR the most aggressive take on SDN. IDC had been projecting a little more than $3B by 2018, which would put their estimates somewhere around 5% of the overall networking spend.

So 18 months later, how do I feel about the analysis?

SDN spend is largely substitutive

In the original analysis, I made the point that SDN spend is not likely to be net-new dollars coming into the networking industry but rather a shift in dollars from traditional networking equipment to SDN-enabled equipment.

How’d I do? I’d say that this was spot on. Of course, this was the easiest of the predictions at the time. It is rare that dollars are created; they are usually shifted from somewhere else. Here, all I was really predicting was that the somewhere else was other Continue reading

Questions for Photography Enthusiasts

It’s no secret that I’m something of a photography enthusiast. To me, photography is a relaxing puzzle of how to assemble all the various pieces—setting, lighting, exposure, composition, etc.—to create just the right image. I’m not an expert, but that’s OK; I just do this for fun and to relax. If you’d like to see a small sampling of some of the photos I’ve taken, I publish some of them here on 500px.com.

I know that a fair number of folks in the IT industry are also photo enthusiasts, and so I was curious to hear some feedback from fellow enthusiasts about their photography workflows. In particular, I’m curious to know about how others answer these questions:

  • What formats do you use with your photos? (I’ve been shooting in RAW—NEF, specifically, since I’m a Nikon guy—then converting to Adobe DNG for use with Lightroom.)

  • How do you handle long-term storage of your photos? (Once I have the photos in DNG in Lightroom, then I’ve been archiving the RAW files on my Synology NAS.)

  • What pictures do you keep—all of them, or only the best ones? (So far, I’ve been keeping all the RAW files, archiving when Continue reading

Openstack distribution

In the last few months, following were some acquisitions that happened: Cisco acquiring Metacloud, EMC acquiring Cloudscaling, HP acquiring Eucalyptus. Metacloud and Cloudscaling have Openstack based distributions, Eucalyptus has a cloud OS similar to Openstack. This set of acquisitions prompted me to look little closely at Openstack distributions and following blog is a result of this. … Continue reading Openstack distribution

Response: http2 explained


Been researching HTTP2 protocol on the basis that is will, more or less, be the dominant protocol on the Internet and everywhere else. Aside from the sense of excitement I get from looking at solving old problems, HTTP2 is a huge change for networking and this site has the best explanation I’ve found so far. Check […]

The post Response: http2 explained appeared first on EtherealMind.

Using Ping Sweep to Find MTU Ceiling

Earlier this week I had breakfast with a very interesting group. One of those present had an extensive history with Cisco systems. We talked about his tenure and several of the projects that he had been involved in. For some reason, one that caught my attention was the sweep option that we find in the extended Ping utility. Although it is hard to believe, there was a point in time that this gem didn’t exist.

I’ve written a few articles about the challenges of path MTU discovery and the issues that arise when it misbehaves. Today’s article looks specifically at using a ping sweep and how it can be used to quickly identifying the path MTU ceiling. The topology used for testing is simple and shown below. Notice that the two top routers are connected by a link with a lowered MTU (1492).

Ping Sweep MTU Discovery

Let’s step through the process that an administrator might go through when a networked application isn’t working correctly. He or she would likely determine the endpoints and confirm reachability. For this example, I am testing a connection between 192.168.1.1 and 192.168.4.4. The ping command is the tool of choice for confirming reachability.

Basic Continue reading

Storage Primer

Storage is a very critical component in the current IT domain. Choosing the right Storage platform and software is a critical part of a good Data center whether it is internal or external cloud. Even though I understood some Storage basics, I never ventured deep to understand the different storage technologies available. I tried to … Continue reading Storage Primer

Disappointed With Check Point

I have recently started working with Check Point products again, after a 5-year break. This has given me a different perspective on how they are progressing. It has been disappointing to see that they’re still suffering from some of the same old bugs. Some of the core functionality is now showing its age, and is no longer appropriate for modern networks.

When you’re using a product or technology on a regular basis, it can be hard to accurately gauge progress. Maybe it feels like there are only incremental changes, with nothing major happening. But then you come across a 5-year old system, and you realise just how far we’ve come. If you don’t think iOS is changing much, find some videos of the first iPhones.

The opposite is when it feels like there are many regular enhancements…but when you step back you see that core product issues are not dealt with. It can be hard to see this when you’re working at the coal-face. You need to step away, work with other products and systems, then return.

That’s what I’ve done with Check Point recently. Through much of the 2000s, I did a huge amount of work with Check Point firewalls. Continue reading

Plexxi Pulse – This Week at Strata + Hadoop World

This week we joined thousands of thought leaders, analysts, vendors and end-users at the O’Reilly Strata + Hadoop World in New York. This event brings together the business and science of Big Data, allowing attendees to learn about emerging technologies through case studies and guest speakers. It’s been a busy week featuring excellent speakers from all over, including The New York Times and Cloudera. While we’re veterans of other industry events such as Interop and VMworld, we’re newbies here, so it’s exciting to experience this all for the first time. Judging by how things have gone so far, you can bet we’ll be back next year for more.

In this week’s PlexxiTube video of the week, Dan Backman highlights how Plexxi integrates with VMware.

Below are our best reads of the week – enjoy!

Data Center SDN growing 65% this year

In a recent article in Network World, Jim Duffy highlights the massive growth within the datacenter market – evidenced by a 65 percent growth in 2014 as reported by the Dell’Oro Group. Personally, I think it will be interesting to see if SDN survives as a separate feature out of the larger networking market. If the datacenter Continue reading

Congratulations on the Birth of SocketPlane!

I wanted to take a quick moment to offer up my congratulations, and share the news about SocketPlane. Their press release announcing that they had received investment from LightSpeed Venture Partners says: SAN FRANCISCO, October 15, 2014 – Today SocketPlane, an … Continue reading

If you liked this post, please do click through to the source at Congratulations on the Birth of SocketPlane! and give me a share/like. Thank you!

The FBI’s statements are Orwellian

Recently, FBI Director James Comey gave a speech at the Brookings Institute decrying crypto. It was transparently Orwellian, arguing for a police-state. In this post, I'll demonstrate why, quoting bits of the speech.


"the FBI has a sworn duty to keep every American safe from crime and terrorism"
"The people of the FBI are sworn to protect both security and liberty"

This is not true. The FBI's oath is to "defend the Constitution". Nowhere in the oath does it say "protect security" or "keep people safe".

This detail is important. Tyrants suppress civil liberties in the name of national security and public safety. This oath taken by FBI agents, military personnel, and the even the president, is designed to prevent such tyrannies.

Comey repeatedly claims that FBI agents both understand their duty and are committed to it. That Comey himself misunderstands his oath disproves both assertions. This reinforces our belief that FBI agents do not see their duty as protecting our rights, but instead see rights as an impediment in pursuit of some other duty.


Freedom is Danger

The book 1984 describes the concept of "doublethink", with political slogans as examples: "War is Peace", "Ignorance is Strength", and Continue reading

Workload Mobility and Reality: Bandwidth Constraints

People talking about long-distance workload mobility and cloudbursting often forget the physical reality documented in the fallacies of distributed computing. Today we’ll focus on bandwidth, in a follow-up blog post we’ll deal with its ugly cousin latency.

TL&DR summary: If you plan to spread application components across the network without understanding their network requirements, you’ll get the results you deserve.

Read more ...