February 18, 2014

Why a great networking engineer is like an application whisperer
The hard-to-swallow truth is that applications have always run the show when it comes to networks. This reality can be extra difficult to accept in organizations where the systems team is fronted by a less senior and often frazzled sys admin who -- if not wearing a red fire helmet and rubber boots -- at least always carries the faint scent of smoke and ash. Nonetheless, it is a truth we must come to terms with.

Getting your features out
Now we are at a point where we actually branch. Feature Branches evolve around the idea that each functional implementation is done in its own branch. The branches are pushed to the central repository, so each feature branch is available for each developer. Once the implementation is done, the developer starts a pull-request, and the changes are discussed in the team and merged to the master.

SDN in action: Pertino service lets users turn up a network without buying hardware
Pertino’s SDN is made up of two parts: A control plane that houses all of the information about the users, security credentials and network topology; and a data plane running on top of cloud-based virtual machines that can scale horizontally and are fault tolerant. This architecture allows for massively large scaling, segmentation among users’ networks and insulation from downtime from service providers Pertino works with, such as Amazon Web Services, Rackspace and others.

3 Leadership Tips for a Particular Kind of Entrepreneur: the Successor
The challenges of taking over a business from a father (or any powerful executive) are not insignificant. The transition at one client of mine was so unsuccessful that the father had to return from retirement to salvage the business from the son's ineptitude. I've seen companies succeed under a second generation's leadership, and I've watched others fall into bankruptcy only a few years after the change occurred.

Diebold's Mattes believes company can succeed by re-igniting its innovation
In a move to drive home the need to re-ignite innovation, Mattes and his management team brought 140 key employees from operations in 17 countries to Canton in late January. They spent three days at Kent State University at Stark studying new products and hearing about the need to work more with customers. "Diebold is not short of great people," Mattes said, while being interviewed during a break in the meeting. The company is filled with employees who have brilliant ideas, he said.

Data Profiling – Four Steps to Knowing Your Big Data
“Know thy data” is one of the fundamental principles of sound data science.1 Another name for this is data profiling. The article “Big Data – Naughty or Nice?” listed six foundational concepts of data science.2 Along with #2 “Know thy data,” the article listed five other data science “commandments” ... We expand on data profiling here by elucidating the following four steps toward knowing your data: data preview and selection; data cleansing and preparation; feature selection; and data typing for normalization and transformation.

SDN security issues: How secure is the SDN stack?
The SDN controller is a prime target for hackers because it is both a central point of influence in a network and a potential central point of failure. "If somebody is not paying attention to [the controller], it becomes an extraordinarily high-profit target for an attacker, who could very easily compromise [it], modify some of your code base and rescript control of your traffic in such a way that it's ex-filtrating data or stashing data somewhere where an attacker can sniff it," said Dave Shackleford, security consultant with Voodoo Security and lead faculty member at IANS.

PseudoCQRS, a Framework for Developing MVC Applications
With CQRS, the state of the customer object is held in memory, and the things that you persist to the data store are the actual events that occurred in the system that affected that customer. As you have a record of all those events, if you shut the application down and then start it up again, you can just run through all the events to restore the state of the Customer object, and the rest of the system. PseudoCQRS was created because we wanted to apply the CQRS pattern to an existing application - one that already has all the state information stored on a database

Whatever happened to the IPv4 address crisis?
The day of reckoning still looms -- it's just been pushed out as the major Internet players have developed ingenious ways to stretch those available numbers. But these conservation efforts can only work for so long. ARIN currently has "approximately 24 million IPv4 addresses in the available pool for the region," according to President and CEO John Curran. They're available to ISPs large and small, but Curran predicts they will all likely be handed out by "sometime in 2014."

A Chromebook offers Defensive Computing when traveling
Even using a Chromebook normally, with a Google account, still provides safety because Chrome OS encrypts all your files. There is no way another person using the same Chromebook can see anything of yours (assuming you don't give out your Google password). If you are going to lose a computing device, you want it to be a Chromebook. Your files are protected even if someone removes the solid state hard drive. And, unlike other operating systems, the encryption is stress free. That is, a Chromebook user does not have to enable anything, run anything or even remember anything, to have their files encrypted.

Quote for the day:

"Success in life comes not from holding a good hand, but in playing a poor hand well. " -- Kenneth Hildebrand