Lessons that insurrection selfies hold for legitimate enterprises

The pro-Trump rioters who invaded the Capitol on January 6 came with smartphones to record and celebrate what they thought was a righteous effort to prevent president-elect Joe Biden from taking office two weeks later.Now those electronic devices, along with the GPS data they generated, are being used to track the location of rioters within the building as federal law enforcement officials continue to make arrests and build criminal cases.Among the acts being investigated: breaking through police barriers, smashing windows, and assaulting police officers and media members. Five people died including a Capitol Hill police officer who was bludgeoned with a fire extinguisher.To read this article in full, please click here

Lessons that insurrection selfies hold for legitimate enterprises

The pro-Trump rioters who invaded the Capitol on January 6 came with smartphones to record and celebrate what they thought was a righteous effort to prevent president-elect Joe Biden from taking office two weeks later.Now those electronic devices, along with the GPS data they generated, are being used to track the location of rioters within the building as federal law enforcement officials continue to make arrests and build criminal cases.Among the acts being investigated: breaking through police barriers, smashing windows, and assaulting police officers and media members. Five people died including a Capitol Hill police officer who was bludgeoned with a fire extinguisher.To read this article in full, please click here

Offloading Authentication and Authorization from Application Code to a Service Mesh

Tetrate sponsored this post. Zack Butcher Zack is a Tetrate engineer. He is an Istio contributor and member of the Istio Steering Committee and co-author of 'Istio: Up and Running (O’Reilly: 2019).' In an upcoming Ramaswamy Chandramouli, we’ll be presenting recommendations around safely and securely offloading authentication and authorization from application code to a service mesh. We’ll be discussing the advantages and disadvantages of that approach. This article presents an overview of the paper that will be presented later this month, at

Study: Cloud transformation necessary for digital transformation

Cloud migration is a necessary step for digital transformation, which is proceeding faster than planned at many enterprises because of the COVID-19 pandemic, according to research from Cloud Industry Forum (CIF), a cloud computing organization based in the United Kingdom.The cloud is an important steppingstone for getting off legacy on-prem technologies and outfitting today's more flexible, remote workforce. Supporting a remote workforce requires a digital transformation, and to do that, companies need the cloud – public, private, or hybrid. CIF found that in many sectors, remaining productive during lockdown depended on their cloud-readiness.To read this article in full, please click here

XML-to-JSON Information Loss, Cisco Nexus OS Edition

Last week I wrote about the interesting challenges you might encounter when using data generated by a Junos device in an Ansible playbook. Unfortunately it’s not just Junos – every system built around XML-based data structures might experience the same issues, including Cisco Nexus OS.

To be fair to Ansible developers: it’s not an Ansible problem, the problem is caused by fundamental incompatibility between XML and JSON encodings, and the naive use of standard XML Python libraries. It’s just that engineers who might stumble upon that problem commonly use Ansible.

XML-to-JSON Information Loss, Cisco Nexus OS Edition

Last week I wrote about the interesting challenges you might encounter when using data generated by a Junos device in an Ansible playbook. Unfortunately it’s not just Junos – every system built around XML-based data structures might experience the same issues, including Cisco Nexus OS.

To be fair to Ansible developers: it’s not an Ansible problem, the problem is caused by fundamental incompatibility between XML and JSON encodings, and the naive use of standard XML Python libraries. It’s just that engineers who might stumble upon that problem commonly use Ansible.

Network Break 316: New CPU CEO Bids VMware Adieu; NSA Says Check Your DoH

This week's Network Break opines on the breach of Ubiquiti customer data via a third-party cloud service, Pat Gelsinger's appointment to the CEO role at Intel, and the NSA offers advice for enterprises on deploying DNS over HTTPS (DoH). We also cover how a chip shortage is stalling auto production and more tech news.

The post Network Break 316: New CPU CEO Bids VMware Adieu; NSA Says Check Your DoH appeared first on Packet Pushers.

Tools 4. Checking bandwidth between your servers, VMs, containers or even PIs and Android/Apple phone using iperf

Hello my friend,

We hope you are doing well and staying safe during this COVID times. To make your stay a bit more pleasant, we are offering you and interesting read, which will give you ideas how to test network performance between your endpoints, which can be any Server, virtual machine (VM), container, or even Raspberry PI node. Yes, we continue our troubleshooting series. Take a brew, and get started.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Can automation help with fixing your network issues?

Automation is your extra pair of hands. Or even more than that. Capability to create the network automation solutions, from a basic scripts for info collection or simple configuration to complicated logic, which takes into account exiting environment and is integrated with your other OSS/BSS, is one of the key skills, what allows you to build a successful career in the constantly changing network field.

We have created a new training, which is focused only on the Nornir Continue reading

Is Computing A Right?

Recently, the idea of a cloud computing service delivered as a public utility was pitched to me. The idea was that computing power made available to those who would otherwise be unable to afford it would be a societal good. For example, imagine an academic group that needs compute for a research project. Or municipalities that would benefit their citizenry by leveraging a cloud-as-utility.

The post Is Computing A Right? appeared first on Packet Pushers.

The History of the Cisco TAC

The Cisco Technical Assistance Center, or TAC, was as responsible for the growth of computer networking as any technology or other organization. TAC trained the first generation of network engineers, both inside Cisco and out, creating a critical mass of talent that spread out into the networking world, created a new concept of certifications, and set a standard that every other technical support organization has sought to live up to since. Join Joe Pinto, Phil Remaker, Alistair Woodman, Donald Sharp, and Russ White as we dive into the origins of TAC.

download

Survey: Native SD-WAN monitoring tools are not enough

(Editor’s note: A recent Enterprise Management Associates survey of 303 WAN managers found that native monitoring is an important factor in choosing SD-WAN products, but many respondents say additional third-party monitoring tools are also needed. This article by EMA Vice President of Research Networking Shamus McGillicuddy explores some of the survey results  included in the report “Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic” that is based on the survey.)To read this article in full, please click here

Lessons Learned From A Regional Provider Network

Running and building a regional provider network is a challenging proposition. When your network is your profit center, every decision is made through a different lens. Add a global pandemic on top and you’re certainly going to walk away with a few lessons learned. In this episode we talk with Marek Isalski about his experiences building and operating a regional provider network in the UK.

Show Notes

    • Faelix Overview 
      • How did Faelix get started?
      • What services does Faelix offer?
      • How many people are on your team?
    • Move from Mikrotik to VyOS
      • Motivated by a few factors, including CVE-2018-19299
    • Using NetBox as a single source of truth
      • How do we do logical topology stuff, like OSPF, BGP, in netbox?
      • Have open-sourced our project for mixing saltstack + netbox + vyos
    • Recent bugs encountered:
      • FRR (RPKI crash in early 2020)
      • FRR (ospfv3 crash in late 2020)
      • Intel i40e NIC drivers (late 2020)
    • Standing up three new POPs in the height of travel restrictions of 2020
    • Presentations/Recordings
      • UKNOF:
      • NetMCR: Networkers in & around the Manchester
      • etc…

Links

Marek Isalski
Guest
Tony Efantis
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Continue reading