Welcome to Technology Short Take #128! It looks like I’m settling into a roughly monthly cadence with the Technology Short Takes. This time around, I’ve got a (hopefully) interesting collection of links. The collection seems a tad heavier than normal in the hardware and security sections, probably due to new exploits discovered in Intel’s speculative execution functionality. In any case, here’s what I’ve gathered for you. Enjoy!
- Graham Smith writes about switching his NSX-T lab to use single N-DVS Edge nodes.
- Here’s another useful article from Eric Sloof on bridging between GNS3 and NSX-T. Lots of network engineers are familiar with GNS3, and showing how to integrate it with NSX-T for testing and simulation is, I think, going to be helpful.
- The inimitable Ivan Pepelnjak provides a primer on Azure networking.
- Sebastian Cohnen of StormForger shares some results from network performance testing of AWS Fargate. Note that this article is a couple of years old, so some things may have changed since it was written.
- Daniel Teycheney discusses starting your network automation journey.
- This article from Carlos Fenollosa talks about his experience with a new 2020 MacBook Pro compared to his 2013-era MacBook Air. While there is some discussion of software in here (given Apple’s tight coupling it can’t be avoided), the article mostly focuses on hardware aspects of Apple’s latest lineup of laptops. Personally, I appreciated Carlos’ balanced review.
- This is one of those times when an article belongs in multiple categories—in this case, hardware and security. This article describes a new attack that “breaches the security guarantees” of Intel SGX.
- Oh, and while we’re talking about Intel CPU exploits, here’s another one.
- This article explains how to use a “stacked filesystem” encryption solution named eCryptfs to encrypt directories on Linux. If you’re interested in doing something like this for cloud storage, this other article shows how to use encryption with
- ZDNet covered the news of Check Point fixing a well-known memory corruption security hole in the GNU C Library.
- If you say that Linux malware doesn’t exist…read this article.
- The Citizen Lab uncovers Dark Basin, described in their words as a “massive hack-for-hire operation.”
Cloud Computing/Cloud Management
- Michael McCune shares a look at debugging the Kubernetes autoscaler using Cluster API and Docker.
- Jean-Paul Smit takes a look at Pulumi in the context of using it with C# to deploy Azure API Management. Read his blog post here.
- Stellios Williams shares how to download a ZIP of a private GitHub repository via the GitHub API (something he’s doing inside a Lambda function as part of automatic deployments of his Hugo-based site).
- Patrick Kremer shares a workaround for DNS resolution for home labs when using corporate VPNs.
- Here’s a short list of “new generation” command-line tools. I’ve adopted a couple of these myself (
- Allan Odgaard (of TextMate fame) slams macOS “Catalina” on the basis of performance.
- Want to run Linux on your Surface Pro 4? You’re in luck.
- Nick Gerace shares why he uses Fedora.
- Chip Zoller shares his GitHub Actions-based CI/CD for Hugo on AWS. Building a pipeline for automatic deploys of this site is something I’ve been talking about doing for a while, so Chip’s article was useful. I also learned about the
s5cmdutility, though for now I think I’ll stick with
- If you’re thinking of renaming the “master” branch of your Git repositories to something else, Scott Hanselman shows how easy it can be.
- Cormac Hogan takes a look at using “manually” or “statically” configured Persistent Volumes with Cloud Native Storage (CNS) on vSphere.
- JJ Asghar walks through running Fedora CoreOS on VirtualBox.
- Kyle Galbraith talks about how communication and curiosity can matter more than technical skills when it comes to a successful career in technology.
OK, that’s all for now. As always, I’d love to hear from you, so feel free to find me on Twitter and let me know what you think of these posts. If you have suggestions for improvement, I’d love to hear those, too!