Book Recomendation: “The Phoenix Project”

Book Recomendation: “The Phoenix Project”

Other than the main character being a manager, it is amazing how close this book mirrors my career path so far. This is fiction, but does a good job introducing business and cloud concepts. I would definitely recommend this for anyone in IT. The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win by Gene Kim My rating: 3 of 5 stars A story that anyone from an IT operations background can relate to. The various character personalities keep it interesting and even relatable still! It helps provide motivation to use ITIL methodologies, Kanban process, cloud computing, and more. My only critique is that it's a slow start with an abrupt end. I'm interested to read "The DevOps Handbook" now to see the real world advice and stories. View all my reviews...
Read More
IPv6

IPv6

As of a couple of weeks ago, I began my adventure into IPv6. My ISP does not currently support native IPv6, so I used Hurricane Electric's (HE) tunnel broker service http://tunnelbroker.net. I also opted to use their DNS service (minimally) and start their IPv6 certification process. While they have some documentation it is still a bit lacking. I had to fill in some gaps, but overall it's enough to get started. There is plenty of documentation out there about IPv6 and even how to get it setup for your home router, so I'm not going to duplicate that effort. Instead I'd like to take a look at the packets and supposed performance benefits of IPv6.  Setup But first, it is worth noting my overall experience and a couple of "gotchas." After setting up my account at tunnelbroker and assigning myself a /48 (who doesn't need a septillion addresses!?) for my LAN and DMZ, I setup my router using stateful addressing and multiple subnets. Being...
Read More

Online Privacy

A couple of years ago I had the privilege of attending a seminar about electronic privacy and security led by former FBI computer crimes investigator Michael Bazzell. If this is your first time hearing that name or digging into this topic I highly encourage you to visit his websites, listen to his podcasts, and/or read his book. His blog is a great place to start. You can find it here: https://computercrimeinfo.com/wp/. During his presentation he explained the many ways our private information is obtained without our consent; either through social engineering, data mining, or outright hacking. At the end of the presentation, he even gave a live demonstration showing a wifi pineapple device that he setup earlier in the day to spoof the guest wifi of the facility. In doing so, he collected personal information from a handful of smartphones in the room (including pictures, web sites visited during the presentation, and more). Needless to say, I was impressed with his...
Read More