Diving into OpenStack Network Architecture - Part 1 (Ronen Kofman's Blog) OpenStack networking has very powerful capabilities but at the same time it is quite complicated. In this blog series we will review an existing OpenStack setup using the Oracle OpenStack Tech Preview and explain the different network components through use cases and examples. The goal is to show how the different pieces come together and provide a bigger picture view of the network architecture in OpenStack. This can be very helpful to users making their first steps in OpenStack or anyone wishes to understand how networking works in this environment. According to the recent Icehouse user survey and the one before it, Neutron with Open vSwitch plug-in is the most widely used network setup both in production and in POCs (in terms of number of customers) and so in this blog series we will analyze this specific OpenStack networking setup. The setup we are using for the examples is the one used in the Oracle OpenStack Tech Preview. # ovs-vsctl show 7ec51567-ab42-49e8-906d-b854309c9edf tag: 1
Amazon Route 53 | Product Details The Domain Name System (DNS) is a globally distributed service that is foundational to the way people use the Internet. DNS uses a hierarchical name structure, and different levels in the hierarchy are each separated with a dot ( . ). Consider the domain names www.amazon.com and aws.amazon.com. In both these examples, “com” is the Top-Level Domain and “amazon” the Second-Level Domain. There can be any number of lower levels (e.g., “www” and “aws”) below the Second-Level Domain. Route 53 is an “authoritative DNS” system. The name for our service (Route 53) comes from the fact that DNS servers respond to queries on port 53 and provide answers that route end users to your applications on the Internet. Route 53 provides a simple set of APIs that make it easy to create and manage DNS records for your domains. CreateHostedZone: Creates a new hosted zone to contain your DNS data. See our Technical Documentation for more detailed information about these APIs.
The Social Video Blueprint - A Social Video Checklist of Tips This is our ninth and final installment of the Social Video Blueprint series--which would have appeared last week were it not for a few hiccups. Throughout the last 10 weeks, we've explored social video from all angles, from its very definition to some of the best practices that lead to success. So today we're going to draw some actionable conclusions, and create a checklist for social video excellence. This post was made possible by Sharethrough, the social video distribution platform that offers guaranteed viewership and maximized sharing for branded video content. Social Video Blueprint Conclusions & Action Items Drawing from the entire series, I want to look at a few main conclusions about social video: Forget Advertising You're not advertising anymore when you step into the social video world. Embrace Social Media With social video, you're looking for discussion, dialog, and interaction around your video and your brand. Experiment Creatively Seek Help Where Needed Social Video Checklist
Defensible network architecture For the nearly 20 years since Zwicky, Cooper and Chapman first wrote about Firewalls the firewall has been the primary defense mechanism of nearly every entity attached to the Internet. While perimeter protection is still important in the modern enterprise, the fact is that the nature of Internet business has vastly changed and the crunchy perimeter and squishy inside approach has long since become outdated. You can’t deny what you must permit and the primary attack vectors today appear to be email and browser exploits; two aspects of your business model that you cannot do without and which can give the bad guys a foothold inside your perimeter protections. As the Sony, Target, Home Depot, and many other breaches have shown, once the bad guys are into the network they are content to dig in, explore, and exfiltrate large amounts of data and will often go undetected for months. What is needed is a security architecture that focuses on protecting data and detecting anomalies. Segregation
10 comparisons between Google Apps and Office 365 Google Apps and Office 365 are the leading contenders in the cloud-based business application space. Scott Matteson compares the two products. TechRepublic ran an article back in July titled "Google Apps v. Since then I've done some further checking and found some interesting tidbits about Google Apps and Microsoft Office 365 which may be of use to those considering these options, or who are merely interested in the subject of cloud-based applications. Although this is the "Google in the Enterprise" blog, my role here isn't to exhort the benefits of Google Apps over Office 365. Key points With that in mind, here are ten key points about the two products to help keep you informed. 1. When it comes to the programs most office workers use on a daily basis, both Google Apps and Office 365 each offer fulfilling counterparts with plenty of collaborative capabilities. Table A In some respects they seem like twins. 2. 3. 4. 5. 6. Email archiving is a popular feature. 7. 8. 9. 10. In Conclusion
How Power-line Networking Works" Power-line networking is one of several ways to connect the computers in your home. It uses the electrical wiring in your house to create a network. Like HomePNA, power-line networking is based on the concept of "no new wires." The convenience is even more obvious in this case because while not every room has a phone jack, you will always have an electrical outlet near a computer. Because it requires no new wiring, and the network adds no cost to your electric bill, power-line networking is the cheapest method of connecting computers in different rooms. In this article, we'll talk about power-line networking and the technology used to make it happen.
Google app engine or amazon web services Hacking for Beginners One of the best things about computers is how dynamic they are. There is so much information about computers and it changes constantly. As a hacker, you are at the leading edge of changes to technology. This makes it a very exciting and interesting field of study and can even lead to some awesome job opportunities as a computer security expert. Hacking School explains what it means to be a hacker and teaches practical techniques for becoming a hacker. Hackers are often misrepresented as “evildoers” bent on stealing money and personal information from individuals and businesses. White Hat Hackers are benevolent security experts that do not seek profits from illegal network access. Black Hack Hackers are the people who use their knowledge of computers for illegal or unethical purposes. The point – use your computer knowledge to promote learning and security; not to be a thief or criminal. Programming The single best thing you can do to become a hacker is learn to program. Network Hacking
24 Cloud Storage Solutions for Small Businesses Cloud storage can save your business. Disasters happen, devices get misplaced and you never know when you'll need access to your files on the go. Whether a spill fries your machine, your mobile device gets lost or stolen or you need instant access to your documents, cloud storage places all of your data at your fingertips. Cloud storage serves several purposes. It can act as a Web-based external hard drive without the clunky hardware; a data backup source for disaster recovery; a file-sharing platform to collaborate with or send supersize files to clients and colleagues; and a productivity tool for anytime, anywhere access to your files from any device. JustCloud JustCloud is a simple, fast and secure online storage provider. Hightail (Formerly YouSendIt) Hightail helps professionals around the world securely share and control files from anywhere. OpenDrive [For a side-by-side comparison of the best online data storage services, visit our sister site Top Ten Reviews.] Mozy Carbonite Mankayia
Equation Group: Meet the NSA 'gods of cyber espionage' Over the last couple of years we have been hearing about ever more sophisticated pieces of malware. From Stuxnet and Flame to Gauss and most recently Regin, all have shown increasing levels of technical prowess and all have been linked in some way with the US government. These were thought to be the pinnacle of a huge investment in offensive cyber capabilities by the world's wealthiest country. That was, until we learned about Equation. Described by Kaspersky Lab, the Moscow-based security company which uncovered it, as "an almost omnipotent cyberespionage organisation", the group has been called the "God of cyberespionage" and may have been operating undetected for almost two decades. While Kaspersky's report reveals much about the group, it barely touches the surface of the capabilities of what is likely the most highly-prized jewel in the NSA's cyberespionage crown. What is the Equation group? Finally, an advanced keylogger known as Grok is referenced in the Equation team's source code.