One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...
High Tech
FlexPOD for Infrastructure as a Service
The other day, I went to a presentation of FlexPOD and was impressed.  FlexPOD is a collaboration of efforts from Cisco, VMWare, and NetApp.  What it offers is a highly flexible framework to grow IT datacenters they are calling Infrastructure as a service (IIAS). If...
Installing Java 7 JDK, Eclipse 4.3 (Kepler) and the Eclipse GWT Plugin on Ubuntu 12.04.3
As a provider of engineering services, the majority of my projects involve developing GWT applications, and I do all my work almost exclusively in Ubuntu. Ubuntu 12.04, specifically, has many convenient features and I highly recommend it to anyone looking to get their...
Unix 101: Utilize the “Screen” Command
In my previous post, I highlighted 5 great commands to improve administering your Unix machines within your infrastructure. The very first command I mentioned was screen, which allows you to run multiple pseudo-terminal "windows" within one shell session. Screen also...
5 Unix Commands You Might Not Be Using (But Should Be!)
Pretty much every day I do some system administration on one of our many Linux servers that we support as part of our managed IT services. It occurred to me that I use a bunch of utilities and tools within Linux to make my job easier and wanted to share my top 5 Unix...
Today’s Growing IoT Problem: Embedded Software Security – An Interview with Cambashi’s Peter Thorne
When it comes to the Internet of Things (IoT) and connectivity, embedded software security is a top concern for a growing number of manufacturing companies and their software engineers. The worldwide market for embedded security software is forecasted to rise to $2.95...