Podcast Episode 117 – How to Succeed in Podcasting and Technical Marketing with CloudBytes Podcast creator, Brian Knudtson

Brian Knudtson is the host of the CloudBytes Podcast and has also worked as a customer, value-added reseller, vendor, and service provider, including roles in web development, system administration, post-sales deployment, pre-sales architecting, public cloud design, and technical marketing.

We discuss the keys to successful podcasting and have an extensive discussion on how we came up in technology and made the jump to finding career success inside the tech vendor community.  Brian shares what his skills secrets have been to technical marketing and what could unlock great things for other technologists looking to map out their career growth.

Check out the CloudBytes podcast on iTunes here:  iTunes

Listen to the CloudBytes on Spotify here:   Spotify

Connect with Brian on Twitter and read his blog here

Read more about the VMUnderground here: https://blog.vmunderground.com/

Listen to the episode here: https://discopossepodcast.com/episode-117-how-to-succeed-in-podcasting-and-technical-marketing-with-cloudbytes-podcast-creator-brian-knudtson/

Listen and Subscribe on iTunes here:

Podcast Episode 117 – How to Succeed in Podcasting and Technical Marketing with CloudBytes Podcast creator, Brian Knudtson

PODCAST LINK: https://discopossepodcast.com/episode-117-how-to-succeed-in-podcasting-and-technical-marketing-with-cloudbytes-podcast-creator-brian-knudtson/




Podcast Episode 116 – How Networking can Cut Costs for Healthcare and Insurance and Why the Industry is Broken, with Steve Watson of Trendbreakers

Steve Watson is a CFO and CHRO, and but not an insurance salesman. He is, however, the founder of Trendbreakers, a connector, and an educator who has used his network to help folks improve their health and insurance benefits while lowering annual premiums.

Steve shares how his role as a CFO and CHRO have shaped his career, how mission work influenced his life, and we explore into very interesting areas of discussion around nurturing your business and employee relationships, the crossover between finance and Human Resources, plus why the health care industry is broken, and how to fix it.

Listen to the episode here: https://discopossepodcast.com/episode-116-how-networking-can-cut-costs-for-healthcare-and-insurance-and-why-the-industry-is-broken-with-steve-watson-of-trendbreakers/

Listen and Subscribe on iTunes here:

Podcast Episode 116 – How Networking can Cut Costs for Healthcare and Insurance and Why the Industry is Broken, with Steve Watson of Trendbreakers

PODCAST LINK: https://discopossepodcast.com/episode-116-how-networking-can-cut-costs-for-healthcare-and-insurance-and-why-the-industry-is-broken-with-steve-watson-of-trendbreakers/




Ask the Expert: The Hyperconnected Data Center – My Interview with Yvonne Deir of CoreSite

I am super happy to bring another great BrightTALK interview that I was a part of recently at AWS re:Invent 2019 with CoreSite’s Yvonne Dier, Strategic Director of Sales.  We had a chance to discuss where the hyperconnected data center is headed in 2020 which covers the core challenges (get it…core challenges…zing!) faced by organizations and technology teams as more cloud adoption occurs but latency risks impact the ability to get the best value and performance on cloud infrastructure in hybrid deployments.

CoreSite is tackling how next-generation data centers will power digital transformation, the impact of 5G and the IoT, and we even touch on the classic on-premises vs cloud data center debate.

You can watch the interview here at the BrightTALK site which is free if you aren’t already a member (hint:  you should join up because there’s a ton of great content!)




Resizing your AWS VPC NAT Instance to a Lower Cost Instance Type

Let’s say that you wanted to run a lab using AWS and you need to set up a VPC. Thats a very common design that takes advantage of creating a secured Virtual Private Cloud within your AWS environment to isolate resources. There are 2 options for setting up your VPC networking for those who are going to access it directly, or with a software VPN.

There is VPC with a Single Public Subnet:

vpc-single-public

Then there is VPC with Public and Private Subnets:

vpc-public-with-private

There are also 2 hardware VPN options, but that is a different configuration that is less likely for many smaller lab configurations or for many small production environments.

VPC is Free…sort of

Setting up your VPC resources is entirely free. The costs will only come when you deploy your EC2 instances and if you attach Elastic IP addresses within the environment. Elastic IP addresses are also only charged when the are allocated but not associated, but that’s a blog post all unto itself that will come later.

One of the features you need to enable in the case of running a VPC with public and private subnets NAT (Network Address Translation) so that your EC2 instances can reach the outside world for updates and other internet resources. That is because you will have to bridge the private network to the internet segment in order to gain access. The access is only for retrieval of data, and is not what is used for the internet to access your privately hosted instances.

When you create your VPC, the NAT options are presented in the VPC wizard:

nat-gateway

Using a NAT Gateway will be done for those who want to use a software VPN and a consistent Elastic IP address. Details on the pricing configuration of software VPN is here (http://aws.amazon.com/vpc/pricing/)

The other link in the right side allows us to configure a NAT instance instead:

nat-instance

The only catch here is that when you select from the drop down, we only have sizes m1.small or other larger (aka more expensive) options available:

nat-instance-sizing

Prices for m1.small range by region, and in this case, we also have the ability to use reserved instances (pre-purchased at lower rate) or on-demand. Since many of us will want a lab environment, on-demand instances are the ideal way to go.

Once we spin up our environment, we will have an EC2 instance running for the NAT Instance. I’ve labeled mine NAT Instance – DiscoDemo so that I remember what it is:

nat-instance-discodemo

I’m looking to reduce the size of the instance to the smallest possible, which happens to be t1.micro so this is where we do that.

Stopping and Resizing your EC2 NAT Instance

Note that you will only be shutting off your EC2 instance for a minute, and this does not affect inbound connectivity to the VPC at all. This only affects the access from your private subnet EC2 resources out to the internet.

To resize our instance, we have to stop it first. We do this by selecting the instance in the list, and using the Actions button to select the Instance State | Stop option.

Make sure to choose stop and DO NOT SELECT TERMINATE. Terminating will destroy the instance, whereas stopping it just powers it down temporarily.

stop-nat-instance

There will be a warning about losing ephemeral storage data, but because this is only a NAT Instance, we don’t need to worry at all.

stop-warning

It takes a minute or two for the instance to stop, and the progress will be indicated in the EC2 console:

stopping

Once the instance is stopped, go back to the Actions button and choose Instance Settings | Change Instance Type:

change-instance-type

In the drop-list, change the selection to t1.micro:

instance-sizes

Now, you can start the instance which will start it using the t1.micro flavor size instead of m1.small:

start-nat-instance

You’ll be asked to confirm starting the instance:

start-sure-0

The instance will start up as a t1.micro and will stay that size to save you a few dollars on your instance costs. The only reason that you would need a larger size is if you have serious throughput because each flavor has network and storage capabilities attached to it.

What’s interesting is that the m1 series of instances is what we call “previous generation”, but the other options in the current M3 flavor sizes doesn’t include a small or tiny instance flavor. This is the reason that we may want to opt for the t1.micro option.

Now you are all set with the smallest size and lowest cost NAT instance option for your VPC.