Pure Processor Power!

My wife let me build a new desktop as my Christmas present this year. My intent was to build a sweet rig for things like GNS3, Plex, Handbrake and some A/V editing by dropping a hot CPU, high memory capacity, RAIDing a few NAS HDDs together for storage and mirroring 2 smaller economy SSDs for OS and critical programs. Tie them all together with a strong, but economical, motherboard and I could build a pretty sweet rig for under $800, right? Well, this isn’t Linus Tech Tips so I didn’t get to push together everything at once, but I think I did alright.

The Build

So, notes on the build. I budgeted $100 on the motherboard then I chose based on 3 filters:

  1. Integrated USB 3.1 on type A so I can do things like quickly transfer files on a 3.1 thumb drive, stand up good quality heavier Linux and Windows VMs in VmWare Player, or rapidly charge my phone.
  2. DDR3 dual channel. I love the speeds of DDR4, but I don’t need them. I can max this motherboard (64GB) for much cheaper than I could if I picked a DDR4 board. I need memory so I can have Wireshark, GNS3, and a browser all pumping at the same time. This meets that mark without breaking the wallet.
  3. AM3+ socket. I didn’t want to go on-board for graphics and I definitely didn’t want Intel prices. The AMD FX-8370 was perfect and I caught it when the difference between the chip alone vs with the Wraith Cooler was only three dollars.

The Gigabyte 970-Gaming-SLI fit my needs, was 35 bucks under budget, has M.2, plus it’s lightly ruggedized. Other quick notes: the SSD was a cheap solution to get fast boot (less than a sip of coffee on the Windows 10 logo); the vid card was just a cheap video output, but actually plays New Vegas at around 40FPS on high, not bad for the price; PSU was cheap and has enough spare potential to keep the fan quiet even at the max the PC can draw; ADATA RAM, because cheap and effective; Corsair AF series fans are super quiet and look great; HGST Deskstar NAS 3TB because cheap for the high MTTF and raiding in the additions won’t hurt my feelings/wallet; Enermax Ostrog case, cheap and looks nice (though not the best cable management, my CPU bundle sticks out like a sore thumb). I also had 3 160GB WD Blues Sata III 5400 in the drawer, so I striped them together for kicks.


I’m impressed. For less than $600 I’m getting this result out of handbrake.


Wow. I was doing this before on a Dell I15 ultrabook with the I7 4500-U running Ubuntu 14.04. Now you cannot, in any world, compare the performance of an older ultrabook processor to an 8370. Still, this is cut my encoding time to 1/10 of burden. And sure, there are other factors further boosting that number too, so let’s go to the Prime95 results.


BAM! So, when the test queued the workers, the CPU jumped into Turbo on each core before they settled into throughput-per-core. This capture is thirty minutes into the test and I’m writing this as it continues to run. The Mobo/CPU/Wraith are in perfect harmony. It took about ten minutes to climb to 49C and then the board drew a line in the sand. The Wraith picked up speed, taking the CPU back to a steady 46C and the heat spread through the case for another ten minutes before the two other board fans took more speed, but we’re still at 46.5C. Even better, it’s nearly silent. Fan config is Top/out=2xAF140(molex-to-3pin), Rear/out=1xOstrog120mm; Front/in=unknownspare120mm; bottom/in=2xAF120(molex-to-3pin). I just killed Prime95 and the Wraith took the chip to under 30C in ten seconds and at 20 seconds all temp sensors are at normal 25C (my office is cold). Not bad for AMD.

What’s Next?

I’m not done with this guy. I’m going to swap out the vid card for something in the $200 range eventually for a HTPC setup, add two more of those Adata sticks so I can put a ridiculous number of routers in GNS3 or even open two tabs in Chrome (if you don’t get it, check your RAM usage), pull the 3 WD Blue 160s and raid in 3 more of the 3TB HGST HDDs, add a fan controller and temp probes for for the Corsairs, and add an M.2 stick to put my Steam games on. Speaking of which, I put Skyrim on the 3 striped WD Blues. Skyrim moves between loading screens so quickly that I can’t read the tips. First world problems.

Packet Pushers: A Recap

A couple weeks ago I had the honor of joining the Packet Pushers Podcast for a discussion on networking careers and the more general IT field. First of all, that was Awesome! I’ve been listening to Ethan Banks and Greg Ferro for going on two years and it was a blast to have the ear of these gentlemen when they’ve had mine for so long. Michael Sweikata and Ryan Booth of Moving Ones and Zeroes also joined in the fun. Together, those four engineers have on the order of 70ish years in IT, and I have four years, six if I include tech support. It felt great to have these 4 guys express interest and concern in my opinions. I came prepared with my thoughts and the input of many of my colleagues, who share in common my lack of tenure and wealth of questions about the future. These four packet pros in turn assuaged many fears and reinforced my love of all things IT. On to the Recap!

What’s a young network pro to do?

When I asked these engineers for advice aimed towards someone in my position as he/she considers a networking career Greg summed it up beautifully: “don’t.” He wasn’t being short or fatalist; instead he and the other 3 addressed my fears that networking is dying. In short, yes, it’s dying. Not the career of building the paths on which data travels; data will always need mobility. Instead, the Network is evolving from a sum of a million parts just barely glued together into essentially a giant mainframe, with some exceptions. With Ethernet speeds shaming the rest of the system one would first think “wow, I’ll be able to transfer this file so fast.” but in reality, why would you move the data to a weak host when those time sensitive bits are already sitting in a bare metal beast?  This mentality has driven progress in computing for about the last ten years. Networking, on the other hand, is finally tuning into the speed IT. Most of the networking field is likely to move into either automation. We all wanted a better way to provision a vlan on 200 switches in a moment, right? Well, it’s finally coming. Add in cloud-integrations, server-centric thin-client workstations, and wireless everywhere and there simply are not as many cables being run at businesses.

But like I said, Data still needs to move. Be it in a hypervisor or a controller, networking pros will still have to lay down paths between hosts, instances, and containers. The rise of automation is simplifying that process, but we still have to make all of the interconnections. Are the jobs going to go away? They say, and I say, No. But the amount of time networking pros spend in front of an SSH terminal is going to steadily decrease in exchange for time spent banging out python, tuning your puppet/chef/ansible deployment, or learning the new SDN solution designed to do it all in a distributed manner.

Cisco, certs, and the future of IT learning.

So what does this do to beloved Cisco? Well, they are going to have to get flexible. Cisco has spent many years conforming the industry to itself, but now we have options. Not just Juniper or HPE, but options to make a network from scratch or from the opensource compilations of many other network pros who want to break the vendor bonds.

So if companies are branching out, what does that do to the cert environment? Nothing, as Ethan Banks explained in the podcast. Cisco’s training arm is a profit model which has adapted over the years to the changes in technology. Quite simply, Cisco is likely continue revamping their cert system to reflect the industry while also seeding a Cisco preference into those certified by Cisco.

But obviously Cisco, Juniper, HPE, etc., are not going to write a “OpenStack Associate” certification. The open and whitebox communities instead going to pull a greater variety of skills for network support. Soon, more job listing will include “Python/Java preferred” or “Security Experience” under “CCNA certified.” Computer science and IT sec are re-entering the network and the jobs will follow that trend.

Let there be Gripes!

If you haven’t ready my post about my attempts at ICND2, check them out. I was incredibly relieved to hear Ethan Banks say he would have trouble passing the CCNA. I’m not going to beat that dead horse, as my mind is geared towards passing the revised ICND2 by Valentines day.

There’s a great bit of conversation on the lack of vendor accountability, insight, and integrity and how that’s driving customers away from the traditional vendors. I don’t have the experience to speak on that topic, but the conversation was still fascinating.

That’s it!

This is just a bit of what was pertinent to me, as a lot of the conversation was above my experience and understanding. All in all, this was a great conversation that addressed much of my aspirations and worries. Link below, check it out, and I recommend the Packet Pushers to any IT pros who want a view beyond their own data-center.


Fixed it!

Fixed the website. Too bad I didn’t get it back up until 3 weeks after the chat with the guys at the Packet Pushers Podcast!

I found the backup file right before I was about to wire a drive and put it in a raid array on my new desktop. Good thing I looked before I lept!

An Unfortunate Opportunity

I have been given the chance to compare the retired CCNA 200-120 test with the new CCNA 200-125. Did Steve score a sweet deal with Cisco? Nope. Then, you must be retaking the test with the purpose of writing a compare and contrast post. Wrong again. Actually, I don’t have a choice…at least if I want my CCNA.

I failed ICND2. Actually I failed it twice and chose not to write about it until a month later. I needed some time to let the bitter fade.

So why was I bitter? That test was hard. Really hard. I’m an excellent test taker and I enjoy the challenge of a good test, but both attempts were utterly draining. I know Cisco is hard charging to foil the test question banks, but this is getting ridiculous. I noticed when taking CCENT that a lot of questions left me with staring at the screen with a “huh?” in my brain, but I made it through nonetheless. My CCNA attempts were ten times worse.  On my first attempt, I almost ran out of time and scored a 740. I wasted a ton of time just trying to wrap my head around questions. The second time around, I made up for lost time by piling a month of studying on topics where I knew I had trouble, but I still only hit 784. 40 points short. I’m still a tad bitter, both at myself for not studying better and at Cisco. I’m not perfect by any means, but I can ace any practice test on the first attempt; that’s actually the bar I use to determine when to take an exam. Further, I’ve been working in networking for a minute, so I’m comfortable with most topics and I’ve supplemented the technologies I’m short on experience with labs.

So why didn’t I pass? I simply couldn’t figure out the best answer. There was not a single gimme question on the exam. Fortunately, it wasn’t multiple answer heavy, but I was left doubting almost ever choice I made. It was like every question had three good answers and I could have chosen one with just a little more information. Instead, I went with my gut reaction on nearly half of the test.

I could have done better, period. The test was passable and I blame myself for not knowing the material well enough. I do not, however, think I could have had enough preparation and experience to have done well.

But I am still hopeful. I’m hoping the revision of the CCNA exam will have taken a bit of esoteric head-scratching out of the test. I plan to take the revised exam in about six months, but first I want to knock out the CWTS. I need a change of study material for a minute.

I’m way too lazy for this

I broke my website….

As you can tell, I host my website on WordPress. While many of you cringe at the very name, I like WordPress. WordPress may have only recently dropped from the security chatter, mostly due to shouts of “YAHOO” raising the noise floor, and WordPress can be very clunky, but I like it. So, as a bit of a personal challenge, I wanted to host my site myself.


I really only have a few, and I mean a few, regular readers, all of whom I interact with regularly, so I took the site down at my lease-lapse to save a little coin while I built. Exported the config, saved to my daily PC, Dropbox, and my home Samba server. Safe and sound.

Now it’s time to bring it SteveInIT back up.

But, as you can see, there are not 20 posts behind this one. I broke (fixed) it. Well, I lost it. The hard drive in my PC crashed, so the local copy is gone. I can’t find it in my Dropbox at all, which is weird because I don’t ever delete anything from Dropbox. But I still have the Samba server, right? Wrong! Well, maybe wrong. I can’t find it there either. What I can find is the notepad I took to log where I put the exported config copies.I have the filename of the config in my log, so I can search for it, but no luck yet. My Dropbox is even installed in the Samba server, so I should be able to search the whole array and find 2 copies of the config. Again, haven’t yet, but I’ll upload it when I find it.

I have a few things to talk about, so I’m doing that first.

*Edited, since I fixed it.

CompTIA Security+: Fresh look at the Test

Early last week I mentioned that I would be sitting the CompTIA Security+ exam soon. Well, soon has passed and so did I. While I feel I could have done a little better, I’m more than satisfied with my score, but we’ll break down why I feel that way in a moment.

First, disclaimer! This article does not intend to teach any course nor do my opinions of the exam comprehensively address the topics or format of the CompTIA SYO-401 exam. Further, my only experience with taking this exam is in the 401 series exam current to only my experience. CompTIA’s website states that (paraphrasing) they reserve the right to change the exam at any time, and do so even between major revisions, to best keep the exam current.

Glad that’s over, both the exam and the disclaimer.

So, my plan was to go over my final review of annoying tidbits of deprecated protocols evening last, get to bed around 10, have a good night’s rest, and then go rock the test. Didn’t quite happen that way. My seven month old daughter got her six month vaccines a few days ago, so the little febrile ball of adorable decided we were staying up until half-after midnight. I have to give credit to my wife for addressing the baby’s fussiness for the rest of the night, she tried really hard to let me rest before the test, but I was still woken up by her cries every half hour until 4:30a.m. at which point I gave up. I plodded into my office and began to study drooled over the Homeseer home automation system for the next four hours. Trudged my way through the morning and to the testing center we go!

Nothing new to see here. Same place I went to take ICND1, same setup, so let’s get into the meat of it.

I have to hand it to CompTIA because that was one of the more difficult tests I’ve had the pleasure of taking. Yes, pleasure. The exam began with what would be the hardest 3 questions I can remember on any exam. These 3 consecutive lab-like scenarios easily covered two-thirds (objectives 1-4) of the information in my books. They were a very serious brain drain and time burner. No preparation, other than understanding the material, could get you through those. You may find more, less, or none of these questions when you sit, but seriously, do not underestimate the lab questions. I would say that real-world experience with packet analyzers, signing, network design and config, PKI, 802.1x, and Linux command line saved my butt on these. These three alone took a little more than 10 minutes.

After the brain-burners, the rest of the exam was all multiple choice and multiple answer. Let’s break down what I did and didn’t see.

Let me say again that your experience would likely be very different from mine. This was my experience with the question the engine generated for me. This isn’t a study guide.

Topics Encountered and Expected

  • Secure Network Design and Config (VLANs and Firewall/IPS/IDS placement)
  • Preventing Physical Breach, Mitigating Damage. These had really cool backstories to the questions. im deliberately obfuscating “Hackers drove a bulldozer through you data center to defeat K12 rated fence you implemented in response to a recent breach in which a greenpeace member drove a prius through the wall of your power hungry data-center. Which technique would you implement to stop this in the future?” Anti-tank Mines or High Explosive Mines. Anti-tank, which use shaped-charges resulting in a less powerful shockwave while still disabling locomotion; important because no one will authorize new hard drives and the HE mines may exceed the G rating of the bubblegum holding together your 20 gig disks, resulting in an outage.* In all seriousness, I actually would recommend knowing your physical controls in just a tad more detail than your study guide addresses.
  • Management Controls (literally addressed each control that show up in my books)
  • AAA systems and their appropriate use case. I think I saw LDAP, AD, multiple 802.1x strategies, radius v tacacs/+ v MS DC stuff, and a few questions about which wireless encryption best protects ____ authentication scenario.
  • A surprisingly high number of scenarios addressing wireless encryption and wireless MITM attacks.
  • Mobile Device Risks, in nearly all aspects, especially asset loss management and data leakage/theft management.
  • PKI/certs. A ton or PKI fundamentals, controls, architectures, on-wire identification. (If XXXXX data was captured, where the hash, key, data, etc.)

Topics Not Encountered, but Expected

  • Well Knows Ports. There may have been 1, but I wouldn’t bet anything on that. I really think there may not have been a single port question on the test. That’s disappointing, as the previously mentioned deprecated protocols were the ports I was reviewing the night before.
  • Input Validation Techniques. I expected to see a question or two addressing secure php forms or the like. Nope.
  • Data Sharing Relationships. I few years ago I would have told you I hate the corporate jargon and and goings-on of conducting business relations. On the contrary, I discovered that I’m so interested in the security side of this stuff, I was honestly looking forward to these questions.
  • Hardening…anything. Beyond “hey do you care if I put this heavy DMZ just anywhere?” which I wouldn’t quite call hardening anyways, and a round-about mention of port security, Nothing.
  • BYOD.

Topics Encountered and Unexpected

  • Is it foggy or is that just CLOUDS! From reviewing my score-sheet, this is the only area I struggles with, and I knew it when it happened. I used a plethora or different study techniques, guides, and self-study courses. I still did not know enough about cloud security methods. This bugs me so bad, I’ve already looked through 3 books, CompTIA Certmaster and Prof Messer’s vids. None, repeat none, make any mention of the slew of acronyms I’ve never seen before. I’ll have to dig into the Cloud+ and CCNA Cloud materials in my Safari Books Online to try and see where my deficiency is.
  • Fire Suppression Methods. Don’t know why but I didn’t expect to see it. Studied it, but honestly didn’t think it would make the exam.

Topics Not Encountered and Unexpected

Wait, what?

The Test in General

Overall, the test was actually quite well rounded. While not every buzzword and definition appeared as a choice, most of my materials either framed a question, fuzzed the question, or appeared as an answer. I get the feeling CompTIA fuzzed these questions quite a lot to both create confusion in those who spent a bit less time preparing and also just to try to get everything in the exam. I think the average question was 4-6 sentences with only one or two sentences of useful information.

Process of elimination would have also been hit or miss. Many potential answers were similarly worded, the correct acronym was often mixed into alphabetically alike groups, or there would be two or three very correct answers. With wordplay, I tend to do best going with my gut. On the other hand, when more than one answer is correct, often a small clue stood out on the fourth read through or the correct answers would all make up items in the more correct group. Some questions were very subjective, but I tried to imagine what the best practice would be if I was the IEEE and this critical production system could wait 10 years for RFCs to address the issue. I’m not joking. I tried to think “what would a room full of more experienced engineers likely do if no one was yelling at them.”

Other than what I mentioned above, the test and questions were well structured. I got the impression that the test become less difficult as I went on. It honestly seems to follow objectives 1-6 in order, but that’s probably all in my head. The questions managed to both camouflage the details while also somehow being very succinct and reasonable to comprehend. Challenging, but not hard as long as you understand the material. I am more than satisfied with my score, but I was very unsure when I ended the test. I feel like a test capable of vouching for skills should shake up the test-taker even if you score a perfect 900. That’s the hallmark of a test capable of conveying your skills to an employer.

That’s all I remember right now. As with A+ and CCENT, I used many study tools. The ones I recommend are at the bottom of this post, though I will go ahead and say to try finding the most recent references possible, assuming a reputable source, as I imagine my cloud deficiency has something to do with my 2 year old books. I cannot stress the importance of exposing yourself to security chatter, especially if you’re a more junior engineer, like myself, with a limited exposure to the material. There are a ton of Sec news sites, relays, and blogs like Krebs on Security, Daily Dave, CSO Online, etc., but my favorite way to stay current is by listening to podcasts. Details also below. I will likely annotate this post after looking back through some materials, so give yourself a reminder to check back in a couple weeks or you can always subscribe to my blog. I would be quite humbled, and I could use a good humbling.

*Don’t use mines. Bad form.

My Favorite Study Aids

I’m subjectively scoring them on how well they prepare you for the test including material, costs, and how closely the medium addresses/simulates the exam.

  • (7/10) Web – CompTIA Certmaster for Security+ SYO-401
  • (8/10) Web – Examcompass.com Security+ Practice Quizes
  • (9/10) Android App – CompTIA Security+ SYO-401 Prep by Darril Gibson and Konnect L.L.C.
  • (8/10) CompTIA Security+ Certification Guide SYO-401, 2nd Edition by Glen E. Clarke
  • (6/10) Mike Meyers’ CompTIA Security+ Certification Guide Newer, but put me to sleep. Better cloud coverage and slightly more real-world relevance, but more detail than tested.
  • (infinite/10) 3 Podcasts: Risky Business, TWIT’s SecurityNow, and Defensive SecurityA great way to turn your commute into a general background and goings-on of IT Sec.

Supporting my Path

My desk bookshelf looks awesome. A+, Sec+, Network+, Linux+, CWTS, CEH, command line guides for Cisco and HP, python and html guides, a stack of LinuxUser magazines, MCSA 2012, O’Reilly, Cisco Press, ExamCram, Odom, Lammle, Tracy, a few printed comical RFCs, and that’s without getting into the mess that is my Safari Books Online queue. Am I going to get certified is each topic? No, likely not, but I really hope to use something from each.

I have my CCENT, next week I test for Security+, then after I will finish the second half of CCNA R&S. I have optimistic plans of getting both CCIE R&S and Sec as well as CASP in the next 8 years. I am very interested in ISP or Big Data network security right now, though I reserve the right to change my interest. Specifically I like learning about the configuration of those, distinctly different, networks and their threats. So, what’s with the rest of the alphabet soup plaguing my shelves?

The majority of my book collection is non-networking and non-security. My last full-time job was as a network/sysadmin, with a large portion of my time on the support and systems side. So why am I, as a driven and focused IT dude, wasting so much time on everything else? Simply: Understanding.

When I first moved into the Cisco world, I optimistically planned to have a CCNA in under 3 months. I was set-back a bit by medical issues in my family, but the biggest barrier has been my lack of knowledge around supporting systems. There’s no point in having a network without packets to move. With that in mind, each book focuses on a personally novel skill-set in my overall understanding of how the layer 1-4 network provides services to the layer 4-7 computing infrastructure. For example, My A+ books taught me far more about how all computer, from switches all the way to mainframes, actually work. Server+ and MCSA helped me with domain administration in my last job, which opened me up to light up a FreeRadius server in my home lab, expanding my understanding of AAA, on an Ubuntu 14.04 server I learned how to use from Linux+ books. That job also allowed me to build skills desktop virtualization, including VMware Player and Oracle Virtualbox; skills I would need to troubleshoot images in GNS3.

Now, I know what you’re thinking: “You can Google much of how to do this.” That’s true, very true, but on listening to Ethan, Greg, and Drew of the Packet Pushers Podcast, as well as Steve Gibson of TWIT’s Security Now, I’ve decided to try my best to be a well-rounded “Full-Stack” engineer. Yes, I’m tooting my own horn a bit, but I also think this is a requirement for the IT pros of the future, especially for small and medium sized companies. Will a company want to consult an expensive net engineer for each Vmotion? No, they will want their virtualization team to have the skills needed to complete the job. Do you as the IPS pro want to break something each time you tweak a rule? Of course not, so you have an understanding of the application traffic on your network and how that application interacts with supporting services both on your network and in the cloud. Best of all, what beautiful world would we live in if most Java or (god-forbid) Flash devs had an in-depth understanding of application attacks, defensive code, and security in depth? Imagine a corporate application designed to cooperate with NIPS, HIPS, host firewall/AV, the expensive black box, and everything in between. Told you it’s a beautiful image!

I want to be the network engineer who can sit at the table with the dev folks, systems guys, database team, and management and work together with an understanding of how my piece of the puzzle best fits together with not just the adjacent pieces, but the overarching picture. I’m young and naive, but I think my assortment of books supports that goal and it’s who I’m striving to be.

Charter acquires Time Warner Cable: The Modern David and Goliath


You really can’t keep track of everything in the tech world, there’s just too much to possibly see, hear, and read it all. This, however, how did I miss this?

I was helping a friend shut down a local office and he asked if I would mind calling Charter on his behalf. So I call them up, go through the security questionnaire, place the cancellation order, and then Charter rep does the normal  scripted “Please don’t leave! Why are you leaving? I can be better! Are you moving this office to another location to which we can move the service?” “No, the office was combined with another office and they already have a Time Warner contract at that location.” “Oh, well that’s good to hear Since we recently acquired Time Warner.” Suddenly my heart’s skipping beats, I break out in a cold sweat, and I can’t catch my breath as I utter “oh, ok…” and try to get off the phone quickly.

I used to work in ISP tech support, so I know the acquisition rumor-wheel well enough; I cling to the hope that it’s all a sick joke. Nope. Reuters, LA Times, Business Weekly, etc. They all say the same thing. Charter has acquired Time Warner Cable, and many smaller ISPs as well. Oh yeah, and this all happened in the last two months while I was blissfully ignorant.

I’m shocked and scared. Charter has disappointed me with fragile infrastructure, terribly inconsistent line tech and premises tech resolutions for the same issue (5 different guys, 5 different problems?), and the fact that after I punch in an account number on their IVR the support person still asks me for the number again. It’s like five hundred digits long! Yes, this is anecdotal, I know.

Time Warner, on the other hand, oh my dear sweet Time Warner. Okay, so I’ve actually only worked with them 3 times, so grain-of-salt warning. Two were run-of-the-mill: one IP address issue and one truck roll with the line tech arriving within a half hour of my call (yeah, I know he was probably just around the corner). Now, what really impressed, I had a business issue that required collaboration with Time Warner engineering, and an engineer called me within five minutes of placing the request, spent half on hour on the line without every sounding frustrated or annoyed, and seriously had the knowledge-base of like a CCNP/CCIE.

But Charter has gobbled them up, positioning themselves as the second largest digital cable/data provider, for subscriber count. What does this even mean? My personal experiences aside, let’s break this down.

In this corner, the heavyweight champion, Comcast Xfinity!

Comcast is huge and expensive, even more-so than Donald Trump’s hands. Comcast pioneered the aggressive tactics that allowed it to eat up so many cute little small/medium sized ISPs. This put them in the position to collaborate with AT&T to form a lobbying Goliath who could stomp out any attempt to form WISPs or municipal ISPs. The strategy of legislatively emaciating competition while buying up the little guys has lent Comcast the opportunity to slowly deprecate their lower-bandwidth packages without lowering prices. AT&T picks up the scraps with their data packages typically below 12Mbps (the limit of unbonded DSL) and Comcast gets to keep raising the cost.

But, you’re paying for more bits, so you should pay more, right? Sort-of. We are conditioned to think that getting more of something means paying more for it, but the issue is more complex than that. ISP level networking infrastructure seems comparable in price for the last 15 years. The big boxes process more bandwidth with less latency, but their overall cost is typically about the same just because that’s how computing evolves over time: more data processed with less power, materials, and expenses. So over time, the actual cost to move a bit of data (ha) drops like a rock, courtesy of Moore’s Law and the wave of “efficiency” that is Software-Defined Networking, while Comcast raises package prices. The other ISPs see the ridiculous profit margin and follow suit.  Comcast has set atop the golden throne that is high bandwidth for too long. Enter David.

And the Contender, Charter Spectrum!

I don’t like Charter, but as a man of science, I reserve the right to change my mind based on breaking or better quality information. Charter is putting itself in a position to do just that.

Worst case scenario first. Should Charter team up with the lobbying supergiants, we end up with a situation in which Goliath pummels congress and consumer with right fist Comcast and left fist AT&T, all the while Charter, our David, slings lobbyist after lobbyist into the mayhem from atop Goliath’s shoulders. Should things go that way, it’s gonna get ugly.

But, I don’t think it will. Charter has already agreed to place nice with consumers and content providers alike in exchange for antitrust approval from the DOJ. “Charter would not be permitted to charge usage-based prices or impose data caps and would be prohibited from charging interconnection fees, including to online video providers…” Upon further research, it turns capping seems not to carry much weight in Charter’s strategy. This agreement, however, addresses a Time Warner strategy reminiscent of cellular data plans. Further clarification from Artechnica “…Charter doesn’t impose data caps and overage fees on its Internet customers, TWC offers optional plans with limits of 5GB or 30GB a month. The plans ostensibly provide discounts of $5 to $8 a month, but customers who go over the limits can be charged another $25 per month. Charter said it would get rid of these overage fees, pledging that the merged Charter/TWC would not impose any data caps.

Charter plays ball with the Dept of Justice and becomes a giant of it’s own.

What does this mean for us?

Bandwidth is stupid expensive. Comcast is setting the bar for rates, and they have no real competition. Had. Charter doesn’t even need to slash prices. I think they should just hold off on price hikes for a few years. Now that Charter and Comcast share many large cities, they are going to have to duke it out. I imagine Comcast will attempt to use legislation and community investment to throw the heavy right hook while Charter pummels the giant with a storm of low prices. Who will win in the end? Hopefully us. I would be perfectly happy with one dollar per Mbps and that’s still like a 50% profit margin. Businesses and consumers alike would be able to redirect those savings into, well, stuff. Buying stuff is good for the economy. Therefore, Charter’s acquisition of Time Warner is good for the economy*.

*I’m not an economist and yes I am aware of the composition logical fallacy. I’m trying to be an optimist. Don’t take this from me.

Why I DON’T support Fiber in the Data-Center

Sales Reps, plug your ears.

It’s Fast!

It’s Long Range!

But, It’s Expensive!

That’s why I don’t recommend fiber in small to medium sized data centers. Sorry for the title shock, but we are excluding big data, where I wouldn’t use an ounce of copper.

GBICs have come WAY down in price. You can get a Cisco compatible SFP+ for almost under $60, which is awesome, but fiber is so expensive! Two meter patch cables in SMF/MMF run anywhere from $25 to $120 depending on the environment and connector. That’s ridiculous. A gigabit quality two meter CAT5e costs…nothing. Admit it, you have this lying around just about everywhere; there’s plenty to cannibalize.

But but…my Cisco rep says blah blah fiber ten gig. A two meter CAT6a cable is a whopping four bucks.

But vMotion and DDOS and containers and other buzzwords! CAT7a and CAT8a may not be floating around your IT closet yet, but they are rapidly picking up use, they’re cheaper, and have been tested all the way up to 40Gbps.

But Steve, if that’s true, my sales rep lied to me.

No they didn’t they just dint tell you everything. Cisco, Juniper, HPE, etc., they all need to make a buck if we want them to stay in business…and we do. Unfortunately, IT Depts all over the world are seen as the disgusting back office in which money flows the wrong way. This is even more apparent at small scale. Our parts are expensive and that hurts the small-medium business owners.

So, what can you do to save business owner tears? Help them filter the sales rep noise. Just because you have 500 employees and you know who Oracle is doesn’t mean you need a fiber switch or SMF between each piece of metal. Get some bubble gum, a metal coat hangar, an RJ-45 clip (preferably one with the clip still attached), and make your own gigabit ethernet cable.

^Dont actually do that, you’ll need 4-8 hangers for a successful pinout.

Here’s what inspired this mini-rant. http://www.cablinginstall.com/articles/2016/05/ethernet-alliance-base-t-applications.html


Way to go Time Warner!

Semi-pleasant surprise today. We had a modem connected up for client and strange things started happening. Applications were failing, a few users were complaining, and the internet was downright wonky.

So I remote in to one of the client’s computers and start poking around. Everything is normal till I run an ipconfig. Are those IPv6 addresses on the Ethernet interface? It’s not a MAC address…It’s not fe80 link local…

Okay, open google, whatsmyip.com

Your IPv6 Address Is: redacted
Your IP Details:
ISP: Time Warner Cable
Services: None Detected
City: redacted
Region: redacted
Country: United States

Holy frickin crap the modem pulled IPv6

The PCs pulled IPv6


Well sort of. We still have services to migrate to v6. The client isn’t v6 ready, which caused all the wonkiness in the network. So unfortunately we had to request switching to IPv4 only service at this site, but I’m still ridiculously excited.

I may be overdoing it a bit, but I don’t get to see this often. I primarily deal with Charter-Spectrum and Comcast. Both companies do their job well; however, I have yet to see a native IPv6 pull from either one. Both claim to have a large v6 footprint. I’ve talked to both companies too many times in reference to public facing modem IPs when helping people set up web servers or remote services, and it’s always public v4 or a private 10 dot for ISP/Carrier-grade NAT. So, all three companies say they have rolled out v6, but, in my experience, I’ve only seen v6 from Time Warner.

We need this. We’re out, straight up out, of IPv6 under ARIN. Business is not propelling v6 migration, but we know why. Everyone has said it and I’m going to say it again: There’s no Return-On-Investment for IPv6. Developers don’t want v6, it’s extra work. Standards aren’t doing it; instead, the IETF has spent all their time trying to fix old problems instead of pushing innovation. Someone has to drive this.

I want the ISPs to be the bigger people and force it.

I’m not saying do it overnight. I want to see ISPs quietly phase in dual-stack then set reasonable end-of-service dates for IPv4. I know that puts a financial burden on the  ISP, but it’s the ISPs who seem set to profit the most from the resale of IPv6 blocks anyways. I didn’t see ISPs doing that at the moment, but tripping over a native public v6 address today has restored my hope.

Time Warner, thank you for giving me an awesome Friday and inspiring me to continue to be an IPv6 Evangelist.