Archive

Category Archives for "Networking"

Arm introduces Neoverse high-performance CPUs for servers, 5G

There have been some interesting developments in the Arm-as-a-server processor field, from Cavium’s success to Amazon offering much cheaper instances on its home-brew Arm processors. But now Arm Holdings itself is getting into the fray, and it's offering is a whopper.Last October, Arm announced the Neoverse platform designed specifically for cloud computing and edge network environments. This week it revealed the Neoverse N1 and E1 platforms, and they are impressive. Usually when Intel and AMD introduce new server chips, they are basically the same chips with faster clocks and more cores. But these two chips are very different in design and meant for different use cases.To read this article in full, please click here

Arm introduces Neoverse high-performance CPUs for servers, 5G

There have been some interesting developments in the Arm-as-a-server processor field, from Cavium’s success to Amazon offering much cheaper instances on its home-brew Arm processors. But now Arm Holdings itself is getting into the fray, and it's offering is a whopper.Last October, Arm announced the Neoverse platform designed specifically for cloud computing and edge network environments. This week it revealed the Neoverse N1 and E1 platforms, and they are impressive. Usually when Intel and AMD introduce new server chips, they are basically the same chips with faster clocks and more cores. But these two chips are very different in design and meant for different use cases.To read this article in full, please click here

Arm introduces Neoverse high-performance CPUs for servers, 5G

There have been some interesting developments in the Arm-as-a-server processor field, from Cavium’s success to Amazon offering much cheaper instances on its home-brew Arm processors. But now Arm Holdings itself is getting into the fray, and it's offering is a whopper.Last October, Arm announced the Neoverse platform designed specifically for cloud computing and edge network environments. This week it revealed the Neoverse N1 and E1 platforms, and they are impressive. Usually when Intel and AMD introduce new server chips, they are basically the same chips with faster clocks and more cores. But these two chips are very different in design and meant for different use cases.To read this article in full, please click here

Philippines Adopts the Multistakeholder Model for Policy Development

Yesterday in Manila, the Philippines launched its national information and communications technology (ICT) framework, which lays out how digital transformation will empower citizens and the economy as a whole.

The National ICT Ecosystem Framework (NICTEF), is a successor to the Philippine Digital Strategy initiative from 2011-2016. Its plans, programs, and projects will be updated periodically as the government continually considers comments from all sectors of society and other indicators and results.

The release of NICTEF is remarkable in many ways. It was developed in a collaborative way, with stakeholders from multiple sectors engaged in dialogue and discussions to help inform and build an inclusive framework.

NICTEF is a living document. Subcommittees will gather ongoing feedback and updates will be made available on the framework’s website.

Considering the faltering international cooperation in Internet policymaking and the trend towards unilateral policies, it takes determination and belief for a government to embark on a landmark multi-year initiative that has at its core a multistakeholder approach.

This commitment is all the more remarkable for a developing country like the Philippines, where the levels of Internet use and literacy vary greatly from region to region. The Department of Information Communications Technology (DICT) recognized right from Continue reading

Developing good BGP neighbour relationships @ APRICOT 2019

Routing Security is featuring heavily on the APRICOT 2019 programme, which is being held on 23-28 February 2019 in Daejeon, South Korea. This helps build on the MANRS initiative being supported by the Internet Society,

On Wednesday, 27 February (09.30-13.00 UTC+9) there will be a Routing Security session that will discuss the latest problems, developments, and how routing security measures can be implemented. Speakers include Job Snijders (NTT) who’ll be discussing changes to BGP in the coming 18 months; Töma Gavrichenkov (Qrator Labs) on how BGP hijacks can be used to compromise the digital certificates used to secure online transactions; and from Anurag Bhatia (Hurricane Electric) who’ll analyse the top misused ASNs.

During the second part of the session, Tashi Puntsho (APNIC) will cover the practical issues and implications of deploying your own RPKI Certificate Authority; Tim Bruijnzeels (NLnet Labs) will discuss the use of route servers at Internet Exchange Points; whilst Ed Lewis (ICANN) will discuss the issues with using the RIR Whois databases.

Following on from this, our colleague Andrei Robachevsky will be raising awareness of the MANRS Initiative during the FIRST Technical Colloquium (16.30-18.00 UTC+9).

FIRST is the global organisation of Computer Security Continue reading

How to identify shell builtins, aliases and executable files on Linux systems

Shell builtins are commands that are loaded into memory when a shell — such as bash, sh, or zsh — is invoked. The reason for this is that keeping these commands in memory helps ensure that these commands will be run very efficiently whenever someone uses them. They run faster because they don't have to first be loaded into memory. They're "built in."Determining whether commands that you use are builtins, aliases, or executable files on your system that are loaded as needed requires the use of several interesting commands. These include type, which, and compgen. So, let's take a look at how these commands work and what they can tell us.To read this article in full, please click here

How to identify shell builtins, aliases and executable files on Linux systems

Shell builtins are commands that are loaded into memory when a shell — such as bash, sh, or zsh — is invoked. The reason for this is that keeping these commands in memory helps ensure that these commands will be run very efficiently whenever someone uses them. They run faster because they don't have to first be loaded into memory. They're "built in."Determining whether commands that you use are builtins, aliases, or executable files on your system that are loaded as needed requires the use of several interesting commands. These include type, which, and compgen. So, let's take a look at how these commands work and what they can tell us.To read this article in full, please click here

BGP: What is it, how can it break, and can Linux BGP fix it?

Border Gateway Protocol (BGP) is one of the most important protocols on the internet. At the same time, when it breaks, it is one of the most potentially catastrophic.

As the internet grows ever larger and becomes ever more complex, having a well-configured BGP is crucial to keeping everything running smoothly. Unfortunately, when a BGP is not configured correctly, there can be disastrous consequences.

This blog will provide a brief explanation of what BGP is, and then dive into some of the common protocol issues and pitfalls. We cannot go too deep into the intricacies of BGP – those can (and do) fill entire books. However, we can provide an overview of how Linux (which has a standardized BGP protocol set and in-depth monitoring, analysis, and control tools) can be used to alleviate some of these common issues.

What is BGP?

BGP is a routing protocol that relies on TCP, designed for providing routing information in and between autonomous systems (ASes). In large networks, BGP is responsible for informing all hosts that need to know of the ways a packet can travel from site A to site B – and, if a site or router goes down, how to reroute the packet so Continue reading

Cisco warns on HyperFlex security vulnerabilities

Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system.  HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here

Cisco warns on HyperFlex security vulnerabilities

Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system.  HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here

Cisco warns on HyperFlex security vulnerabilities

Cisco this week identified two “High” security vulnerabilities in its HyperFlex data-center package that could let attackers gain control of the system.  HyperFlex is Cisco’s hyperconverged infrastructure that offers computing, networking and storage resources in a single system. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The more critical of the two warnings – an 8.8 on Cisco’s severity scale of 1-10 – is a command-injection vulnerability in the cluster service manager of Cisco HyperFlex Software that could let an unauthenticated, attacker execute commands as the root user.To read this article in full, please click here