Day Two Cloud 058: Using Curiosity And Mistakes To Advance Your Career

Today's Day Two Cloud gets into career advancement with guest Sam Erskine. Curiosity is key, and the mistakes you make can actually lead to new knowledge and opportunities. Sam is head of cloud engagement for a large consulting firm and has worked in a variety of IT roles. He's distilled his career experiences into a helpful five-step process, which we explore.

The post Day Two Cloud 058: Using Curiosity And Mistakes To Advance Your Career appeared first on Packet Pushers.

SD-WAN’s Musical Chairs, Tools, and the State of Support

A gaggle of networking geeks sits around the virtual roundtable and has a conversation on current events. Topics include the ever moving SD-WAN market landscape, our favorite (and least favorite) tools that have emerged since plunging into pandemic mode, and an honest discussion on whether or not support from our major vendors has been deteriorating or not.

 

A considerable thank you to Unimus for sponsoring today’s episode. Unimus is a fast to deploy and easy to use Network Automation and Configuration Management solution. You can learn more about how you can start automating your network in under 15 minutes at unimus.net/nc.
Tom Hollingsworth
Guest
Chris Cummings
Guest
Tony Efantis
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post SD-WAN’s Musical Chairs, Tools, and the State of Support appeared first on Network Collective.

Introducing IP Lists

Introducing IP Lists

Authentication on the web has been steadily moving to the application layer using services such as Cloudflare Access to establish and enforce software-controlled, zero trust perimeters. However, there are still several important use cases for restricting access at the network-level by source IP address, autonomous system number (ASN), or country. For example, some businesses are prohibited from doing business with customers in certain countries, while others maintain a blocklist of problematic IPs that have previously attacked them.

Introducing IP Lists

Enforcing these network restrictions at centralized chokepoints using appliances—hardware or virtualized—adds unacceptable latency and complexity, but doing so performantly for individual IPs at the Cloudflare edge is easy. Today we’re making it just as easy to manage tens of thousands of IPs across all of your zones by grouping them in data structures known as IP Lists. Lists can be stored with metadata at the Cloudflare edge, replicated within seconds to our data centers in 200+ cities, and used as part of our powerful, expressive Firewall Rules engine to take action on incoming requests.

Introducing IP Lists
Creating and using an IP List

Previously, these sort of network-based security controls have been configured using IP Access or Zone Lockdown rules. Both tools have a number of Continue reading

NVM Install and Usage Ubuntu 2004

Node version manager (NVM) allows you to run different version of Node on your system which is very helpful for testing and ensuring that the Node version you test on is the same as the Node version you run in production. This is just a quick post on how to install and use (NVM) on Ubuntu...

Rust Traits: Defining Behavior

Before jumping into any programming language, you often hear about its “heavy hitters” - the features that usually make the highlight reel when someone “in the know” is trying to summarize the strong points of the language. In 2015, as I was learning Go, I would often hear things like concurrency support, channels, concurrency support, and Interfaces. Also concurrency support. With Rust, thus far the highlights have included things like strong support for generics, lower-level control, and an emphasis on memory safety manifested in the unavoidable ownership model.

CEX (Code EXpress) 12. Using Python modules.

Hello my friend,

In the previous blogpost we have shared how some thoughts how you can parse the CSV file and how in general to work with external files. But the beauty of the programming languages including Python, is that there are always more than one way of doing things. And with learning it more, you are opening new ways.

Automate all the things

Raise of the 5G in the Service Provider world, micro services in Data Centres and mobility in Enterprise networks significantly changes the expectations about the way the network operate and the pace the changes are implemented. It is impossible to meet those expectation without automation.

At our network automation training, either self-paced or instructor lead, you will learn the leading technologies, protocols, and tools used to manage the networks in the busiest networks worldwide, such as Google data centres. However, once you master all the skills, you will be able to automate the network of any scale. You will see the opportunities and you will exploit them.

Secret words: NETCONF, REST API, gRPC, JSON , XML, Protocol buffers, SSH, OpenConfig, Python, Ansible, Linux, Docker; and many other wonderful tools and techniques are waiting for you Continue reading

Next Platform TV for July 21, 2020

On today’s program we talk with Nvidia co-founder, Chris Malachowsky alongside University of Florida Provost and VP, Joe Glover, about a sizable AI investment; we focus on an end-user Kubernetes journey through the lens of telematics giant, ABAX; we talk AI in manufacturing (where it is today versus what is hyped) with Brian McCarson of Intel; and for today’s Rapid Insights segment we talk quantum for the utilities industry with IEEE pro, Carmen Fontana.

Next Platform TV for July 21, 2020 was written by Nicole Hemsoth at The Next Platform.

History of Networking: Scott Bradner and the Early Internet at Harvard

Scott Bradner was given his first email address in the 1970’s, and his workstation was the gateway for all Internet connectivity at Harvard for some time. Join Donald Sharp and Russ White as Scott recounts the early days of networking at Harvard, including the installation of the first Cisco router, the origins of comparative performance testing and Interop, and the origins of the SHOULD, MUST, and MAY as they are used in IETF standards today.

download

Containerized Python Development – Part 2

This is the second part of the blog post series on how to containerize our Python development. In part 1, we have already shown how to containerize a Python service and the best practices for it. In this part, we discuss how to set up and wire other components to a containerized Python service. We show a good way to organize project files and data and how to manage the overall project configuration with Docker Compose. We also cover the best practices for writing Compose files for speeding up our containerized development process.

Managing Project Configuration with Docker Compose

Let’s take as an example an application for which we separate its functionality in three-tiers following a microservice architecture. This is a pretty common architecture for multi-service applications. Our example application consists of:

  • a UI tier – running on an nginx service
  • a logic tier – the Python component we focus on
  • a data tier – we use a mysql database to store some data we need in the logic tier

The reason for splitting an application into tiers is that we can easily modify or add new ones without having to rework the entire project.

A good way to Continue reading

Publish-Subscribe: Introduction to Scalable Messaging

Matthew O’Riordan A serial entrepreneur and seasoned developer with over 15 years of hands-on development experience. Matthew is the CEO of Ably, an Infrastructure-as-a-Service (IaaS) provider. He was co-founder and technical director of Aqueduct, a leading digital agency in London and Founder of easyBacklog, a SaaS agile backlog management tool. Matthew co-founded Econsultancy, a global digital marketing publishing, training and research business, with Ashley Friedlein and exited via a £25m trade sale to Centaur Media plc in 2012. The publish-subscribe (or pub/sub) messaging pattern is a design pattern that provides a framework for exchanging messages that allows for loose coupling and scaling between the sender of messages (publishers) and receivers (subscribers) on topics they subscribe to. Messages are sent (pushed) from a publisher to subscribers as they become available. The host (publisher) publishes messages (events) to channels (topics). Subscribers can sign up for the topics they are interested in. This is different from the standard request/response (pull) models in which publishers check if new data has become available. This makes the pub/sub method the most suitable framework for streaming data in real-time. It also means that dynamic networks can be built at internet scale. However, building a messaging infrastructure at Continue reading

U.S. Tribes Have until August 3rd to Apply to Help Bring Internet to Their Communities

See how the Makah Tribe launched an emergency network on EBS spectrum during COVID-19

The Makah Tribe has lived around Neah Bay at the northwest tip of what is now Washington State since time immemorial. It is a breathtaking landscape of dense rainforest and steep hills, far removed from any major urban center.

But for all its beauty, the hills, forests, and remoteness have made it difficult for the community to access quality high-speed Internet – and even cell and radio service.

In some areas, cell service was so poor that only certain spots worked: one community member had to go outside and stand beside a rhododendron bush to make a call or send a text. While Facebook is the main way people stay connected, many couldn’t access it. The local clinic struggled to use electronic records – it sometimes took upwards of 40 minutes just to get into the system. Even emergency responders, such as police and the fire department, couldn’t rely on the dispatch system that required Internet connectivity to operate.

And then the coronavirus began to sweep the world. The Makah closed the reservation to outsiders to protect the community. And its connectivity challenges became even more problematic. Continue reading

Jinja2 Tutorial – Part 4 – Template filters

This is part 4 of Jinja2 tutorial where we continue looking at the language features, specifically we'll be discussing template filters. We'll see what filters are and how we can use them in our templates. I'll also show you how you can write your own custom filters.

Jinja2 Tutorial series

Contents

Overview of Jinja2 filters

Let's jump straight in. Jinja2 filter is something we use to transform data held in variables. We apply filters by placing pipe symbol | Continue reading

Data-center survey: IT seeks faster switches, intelligent computing

The growth in data use and consumption means the needs of IT managers are changing, and a survey from Omdia (formerly IHS Markit) found data-center operators are looking for intelligence of all sorts, not just the artificial kind.Omdia analysts recently surveyed IT leaders from 140 North American enterprises with at least 101 employees working in North American offices and data centers and asked them what features they wanted the most in their networking technology.The results say respondents expect to more than double their average number of data-center sites between 2019 and 2021, and the average number of servers deployed in data centers is expected to double over the same timeline.To read this article in full, please click here