snaproute Go BGP Code Dive (10): Moving to Established

In the last post on this topic, we traced how snaproute’s BGP code moved to the open state. At the end of that post, the speaker encodes an open message using packet, _ := bgpOpenMsg.Encode(), and then sends it. What we should be expecting next is for an open message from the new peer to be received and processed. Receiving this open message will be an event, so what we’re going to need to look for is someplace in the code that processes the receipt of an open message. All the way back in the fifth post of this series, we actually unraveled this chain, and found this is the call chain we’re looking for—

  • func (st *OpenSentState) processEvent()
  • st.fsm.StopConnectRetryTimer()
  • bgpMsg := data.(*packet.BGPMessage)
  • if st.fsm.ProcessOpenMessage(bgpMsg) {
    • st.fsm.sendKeepAliveMessage()
    • st.fsm.StartHoldTimer()
    • st.fsm.ChangeState(NewOpenConfirmState(st.fsm)) }

I don’t want to retrace all those steps here, but the call to func (st *OpenSentState) processEvent() (around line 444 in fsm.go) looks correct. The call in question must be a call to a function that processes an event while the peer is in the open state. This call seems to satisfy both Continue reading

Deep Learning Architectures Hinge on Hybrid Memory Cube

We have heard about a great number of new architectures and approaches to scalable and efficient deep learning processing that sit outside of the standard CPU, GPU, and FPGA box and while each is different, many are leveraging a common element at all-important memory layer.

The Hybrid Memory Cube (HMC), which we expect to see much more of over the coming year and beyond, is at the heart of several custom architectures to suit the deep learning market. Nervana Systems, which was recently acquired by Intel (HMC maker, Micron’s close partner), Wave Computing, and other research efforts all see a

Deep Learning Architectures Hinge on Hybrid Memory Cube was written by Nicole Hemsoth at The Next Platform.

40% off First Alert Dual Photoelectric and Ionization Sensor Smoke Alarm – Deal Alert

The BRK 3120B smoke detector from First Alert contains technology that many experts are now recommending -- dual sensors. A photoelectric sensor detects slow and smoldering fires, while an ionization sensor can detect often fast moving open flames. Your current detectors may have only one or the other, so if you're due (or overdue) for new ones, it might be something to consider. This model is hardwired with a battery backup (see below for non-hardwired model), so all units interconnect. When an alarm is triggered, indicator lights let you know which detector was the initiator, so there's no guessing. If being used in a public area, the BRK 3120B also has locking features that prevent theft of the battery or the unit itself. It averages 4.5 out of 5 stars from over 220 people (read reviews) and you can buy it now on Amazon for $29.97.To read this article in full or to leave a comment, please click here

Debian Stable 8.5: Like Ubuntu’s early days

I spend a significant portion of my life installing and testing distributions of Linux-based systems. It’s really rather ridiculous.Even obscure ones—ones that never stand a chance of being listed on the likes of DistroWatch—find their way onto my drives. I can’t help it. It’s an addiction.But you know which one I haven’t installed in a long, long while? Debian. Not some Debian-derived system, like the ones that get a lion’s share of the media attention, but pure Debian. I haven’t loaded it in eons. I know, weird, right?So, I installed it. Debian Stable. Code-name “Jessie.” Originally released as version 8.0 in April 2015—then given the ole’ “point-5” update to 8.5 in June 2016.To read this article in full or to leave a comment, please click here

OpenText to buy Dell EMC’s enterprise content division

Canadian enterprise information management vendor OpenText has agreed to buy Dell Technologies' EMC enterprise content division for US$1.62 billion in a deal that, the companies say, will allow them to focus on their core missions.The acquisition of the "highly profitable" Dell EMC Enterprise Content Division will allow OpenText to expand its related services to Asia and Africa and across a larger customer base, including the healthcare and oil production industries, said OpenText CEO and CTO Mark Barrenechea. To read this article in full or to leave a comment, please click here

Docker at Tech Field Day 2016

Save the date!  This coming Thursday Docker is excited to host the delegates of Cloud Field Day at our headquarters for a deep dive into the Docker platform. Cloud Field Day is part of a series of Tech Field Day events that bring together technology companies and IT thought leaders to talk shop with technology and insights.

 

Cloud Field Day will be live and in person at Docker HQ but anyone can join in by participating in the live stream.  Docker will be featured at 1pm on Thursday Sept 15thJoin us by visiting the Cloud Field Day event page.

Cloud field day is just one in a series of Tech Field Day sessions coordinated by IT industry veterans Stephen Foskett and Tom Hollingsworth. Learn more about the whole Tech Field Day series here.

 

 

 

ICYMI:  Our very own Mike Coleman, spoke at the Tech Field Day Express at VMworld.  In this one hour session, Mike walked a group of vExperts through an introduction to containers, what the new end to end application workflow looks like and an overview of Docker 1.12 with built in orchestration.

 

Intro to Docker

Build, Ship, Run Continue reading

IDG Contributor Network: Does the NSA have a duty to disclose zero-day exploits?

To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.”But now a recent leak has put the group right where it loathes to be—squarely in the headlines. Last month, a group called “The Shadow Brokers” published what it claimed were a set of NSA “cyber weapons,” a combination of exploits, both zero day and long past, designed to target routers and firewalls from American manufacturers, including Cisco, Juniper and Fortinet.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Does the NSA have a duty to disclose zero-day exploits?

To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.”But now a recent leak has put the group right where it loathes to be—squarely in the headlines. Last month, a group called “The Shadow Brokers” published what it claimed were a set of NSA “cyber weapons,” a combination of exploits, both zero day and long past, designed to target routers and firewalls from American manufacturers, including Cisco, Juniper and Fortinet.To read this article in full or to leave a comment, please click here

Aruba pushes new network tools, cloud pricing model

Aruba, a division of Hewlett Packard Enterprise, announced software today that's designed to help companies speed up secure integration of mobile devices and Internet of Things objects into their networks.Called Aruba Mobile First Platform, the software is based on application programming interfaces (APIs) for use by third-party developers and developer teams inside companies to help them boost automation with IoT devices and allow mobile workers to be more efficient.Mobile First is built on Aruba OS 8.0, the company's new operating system, which is deployed as a virtual machine on a server appliance.Also, Aruba announced enhancements to its existing Aruba ClearPass software for Mobile First to make it easier for IT security teams to integrate cloud-hosted services into ClearPass. This means customers can more easily build software workflows for Enterprise Mobility Management packages.To read this article in full or to leave a comment, please click here

Aruba pushes new network tools, cloud pricing model

Aruba, a division of Hewlett Packard Enterprise, announced software today that's designed to help companies speed up secure integration of mobile devices and Internet of Things objects into their networks.Called Aruba Mobile First Platform, the software is based on application programming interfaces (APIs) for use by third-party developers and developer teams inside companies to help them boost automation with IoT devices and allow mobile workers to be more efficient.Mobile First is built on Aruba OS 8.0, the company's new operating system, which is deployed as a virtual machine on a server appliance.Also, Aruba announced enhancements to its existing Aruba ClearPass software for Mobile First to make it easier for IT security teams to integrate cloud-hosted services into ClearPass. This means customers can more easily build software workflows for Enterprise Mobility Management packages.To read this article in full or to leave a comment, please click here

Thousands of Seagate NAS boxes host cryptocurrency mining malware

Thousands of publicly accessible FTP servers, including many from Seagate network-attached storage devices, are being used by criminals to host cryptocurrency mining malware.Researchers from security vendor Sophos made the discovery when they investigated a malicious program dubbed Mal/Miner-C, which infects Windows computers and hijacks their CPUs and GPUs to generate Monero, a bitcoin-inspired cryptocurrency.With most cryptocurrencies, users can generate new units by devoting their computing resources to solving complex math problems needed to validate transactions in the network. This process, known as "mining," provides an incentive for attackers to hijack other people's computers and use them for their own gain.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smartphones to get best encryption possible

In somewhat of a kick in the teeth for law enforcement and spy agencies, a science institute says smartphones will soon be able to take advantage of some of the most spectacular encryption ever known.The Institute of Photonic Sciences (ICFO) says random number generators (RNGs) will soon be able to function without ever repeating the random number and that the quantum-based chips will soon be small enough to fit in a smartphone’s form factor. It would create the fastest and smallest encryption functionality ever.+ Also on Network World: Why smartphone encryption has law enforcement feathers ruffled +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smartphones to get best encryption possible

In somewhat of a kick in the teeth for law enforcement and spy agencies, a science institute says smartphones will soon be able to take advantage of some of the most spectacular encryption ever known.The Institute of Photonic Sciences (ICFO) says random number generators (RNGs) will soon be able to function without ever repeating the random number and that the quantum-based chips will soon be small enough to fit in a smartphone’s form factor. It would create the fastest and smallest encryption functionality ever.+ Also on Network World: Why smartphone encryption has law enforcement feathers ruffled +To read this article in full or to leave a comment, please click here