Archive

Category Archives for "Networking"

El cierre de Sri Lanka de los servicios basados en la web genera enormes costos sociales

Un reciente cierre de varios servicios populares basados en la Web en Sri Lanka tuvo como objetivo frenar la violencia de la mafia, pero la acción del gobierno tuvo varias consecuencias imprevistas.

El cierre, ordenado por la administración del presidente Maithripala Sirisena, afectó a Facebook, WhatsApp, Instagram y el servicio de llamadas basado en la web Viber. Los servicios se cerraron el 7 de marzo y fueron restaurados el 14 y 15 de marzo.

El gobierno intentó cortar las comunicaciones entre los organizadores de turbas violentas, pero el cierre tuvo un gran impacto en una amplia franja de usuarios de Internet, dijo Sagarika Wickramasekera, presidente del Capítulo Internet Society’s Sri Lanka.

[Read the March 14 statement of the ISOC Sri Lanka Chapter.]

 

Leer la nota en inglés


Para obtener más información sobre los cierres de Internet y su costo social y económico, consulte por favor:

 

 

The post El cierre de Sri Lanka de los servicios basados en la web genera enormes costos sociales appeared first on Internet Society.

Sri Lankan Shutdown of Web-Based Services Creates Huge Social Costs

A recent week-long shutdown of several popular Web-based services in Sri Lanka was intended to clamp down on mob violence, but the government action had several unintended consequences.

The shutdown, ordered by President Maithripala Sirisena’s administration, affected Facebook, WhatsApp, Instagram, and Web-based calling service Viber. The services shut down on March 7 and were restored on March 14 and 15.

The government’s tried to cut off communications between organizers of violent mobs, but the shutdown had a huge impact on a wide swath of Internet users, said Sagarika Wickramasekera, president of Internet Society’s Sri Lanka chapter.

Because of the loss of social media and calling services, “those who had loved ones in the violence-ridden areas had to go through stressful period of time without any contact with them,” she said.

Facebook-based volunteer groups, civil society activists and other social movements lost contact with their audiences, she added. “This reduced the circulation of validated content and education hence the peace and harmony,” Wickramasekera added. “People had to rely on rumors.”

Businesses and other organizations use WhatsApp and Viber as productivity tools, and their customer communications were disrupted. Small businesses and home-based workers “who were totally depended on social media marketing Continue reading

Most insurance carriers not ready to use IoT data

You might think that the Internet of Things (IoT) was custom made for the insurance industry. After all, what could be more useful to all those actuarial tables than detailed, real-world information from billions of IoT sensors in a wide variety of devices? In fact, we’re already seeing the beginnings of insurance uses of IoT, including auto insurance companies that give discounts for drivers willing to have their vehicles—and their driving habits—tracked.But according to a new IoT and the State of the Insurance Industry Study from LexisNexis, the message hasn’t penetrated very far into the famously conservative field. Top-line results from the survey reveal a clear disconnect between what insurance companies think about IoT and what they’re actually doing about it.To read this article in full, please click here

Infoblox Integration in Ansible 2.5

The Ansible 2.5 open source project release includes the following Infoblox Network Identity Operating System (NIOS) enablement:

  • Five modules
  • A lookup plugin (for querying Infoblox NIOS objects)
  • A dynamic inventory script

For network professionals, this means that existing networking Ansible Playbooks can utilize existing Infoblox infrastructure for IP Address Management (IPAM), using Infoblox for tracking inventory and more. For more information on Infoblox terminology, documentation and examples, refer to the Infoblox website

Let’s elaborate on each of these Ansible 2.5 additions. All of the following examples (and many more) are provided in the network automation community project, under the infoblox_ansible Github repo. The integrations for Ansible require that the control node (where Ansible is being executed from) have the infoblox-client installed. It can be found here and installed with pip issuing the pip install infoblox-client command.

Ansible Infoblox Modules

There are five new modules included with Ansible 2.5. They can be currently found in the development branch of the documentation:

Here is an example playbook on configuring a IPv4 network using the Continue reading

The Week in Internet News: Good Time to Be in IoT Security

Good time to be in IoT security: Spending on Internet of Things security products and services will rise to $1.5 billion in 2018, up 28 percent from 2017, estimates Gartner. IoT security spending will skyrocket to $3 billion a year in 2021, according to a story in DarkReading.

Facebook breached? It was hard to avoid the recent news involving Cambridge Analytica, the data analytics firm used by Donald Trump’s presidential campaign. The company acquired data on about 50 million Facebook users – getting the data from a researcher – in an effort to build voting profiles for those people. Facebook has called the unauthorized use of its user data a “breach of trust,” while some critics have suggested it’s a plain old data breach, according to a story on Time.com. Meanwhile, Facebook founder Mark Zuckerberg told CNN he’s happy to comply with congressional requests to testify “if it’s the right thing to do.”

Blockchain takes over the world: Google is planning to roll out a Blockchain feature for its cloud-computing service, The Verge reports. The company could potentially license its Blockchain service for other firms to run on their servers. Meanwhile, Chinese telecom and networking vendor Huawei Continue reading

Working with calendars on Linux

Linux systems can provide more help with your schedule than just reminding you what day today is. You have a lot of options for displaying calendars — some that are likely to prove helpful and others that just might boggle your mind.date To begin, you probably know that you can show the current date with the date command.$ date Mon Mar 26 08:01:41 EDT 2018 cal and ncal You can show the entire month with the cal command. With no arguments, cal displays the current month and, by default, highlights the current day by reversing the foreground and background colors.$ cal March 2018 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Also read: 5 top Linux server distros for enterprises | Sign up: Receive daily Network World updates If you want to display the current month in a “sideways” format, you can use the ncal command.To read this article in full, please click here

IDG Contributor Network: Are you ready for the GDPR in May?

[Note: The author of this article is not a lawyer and this article should not be considered legal advice. Please consult a privacy specialist.]The basic news The GDPR covers all personal data your company stores on data subjects in the EU – whether or not your company has nexus in the EU. Personal data is defined as data that can be used to identify a person.  It’s similar to the concept of personally identifiable information (PII) that we have in the US, but it is broader. PII typically includes actual identifying elements like your name, social security number, and birthday, focusing mainly on the data required to fake your identity with a lender. Personal data includes what the US calls PII, plus any data that can be used to identify you in any way, which includes things as basic as an email address, online personality (e.g. twitter handle), or even the IP address where you transmitted a message from.To read this article in full, please click here

IDG Contributor Network: Are you ready for the GDPR in May?

[Note: The author of this article is not a lawyer and this article should not be considered legal advice. Please consult a privacy specialist.]The basic news The GDPR covers all personal data your company stores on data subjects in the EU – whether or not your company has nexus in the EU. Personal data is defined as data that can be used to identify a person.  It’s similar to the concept of personally identifiable information (PII) that we have in the US, but it is broader. PII typically includes actual identifying elements like your name, social security number, and birthday, focusing mainly on the data required to fake your identity with a lender. Personal data includes what the US calls PII, plus any data that can be used to identify you in any way, which includes things as basic as an email address, online personality (e.g. twitter handle), or even the IP address where you transmitted a message from.To read this article in full, please click here

Network Break 177: Dell Launches New Branch CPE; Sonic In The Spotlight

Take a Network Break! In this week’s show, Dell EMC rolls out new branch hardware to run VNFs, the Sonic switch OS gets its turn in the open networking spotlight, and Innovium announces sampling of its Teralynx programmable ASIC.

The IEEE ratifies a standard for 25Gbps over single-mode fiber, Dropbox embraces security researchers, and Micro Focus suffers a massive drop in value.

Cryptojacking roars onto the threat scene, and Orbitz reports that attackers may have breached a legacy site, exposing up to 880,000 customers.

Get links to all these stories after our sponsor message.

Sponsor: ThousandEyes

ThousandEyes gives you performance visibility from every user to every app over any network, both internal and external, so you can migrate to the cloud, transform your WAN, troubleshoot faster and deliver exceptional user experiences. Sign up for a free account at thousandeyes.com/packetpushers and choose a free ThousandEyes t-shirt!

Show Links:

Dell EMC Takes on Cisco, Launches Open uCPE for SD-WAN – SDX Central

Dell EMC Takes Open Networking to the Edge for Next-Generation Access – Dell EMC

Innovium announces OCP SAI and open-source SONiC solution to accelerate TERALYNX market adoption – Innovium

Apstra Demonstrates Open Networking SONiC over Mellanox at OCP Summit Continue reading

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State.BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] “Any device, any manufacturer – as long as they talk BACnet, we can integrate them,” says Tom Walker, system design specialist in the facility automation services group at Penn State. “It’s a really neat protocol, but you have to know the quirks that come with deploying it, especially at scale.”To read this article in full, please click here

Stateful vs Stateless firewalls: Which one to use when?

Firewalls provide traffic filtering and protects the trusted environment for the untrusted. A firewall can be stateful or stateless A stateful firewall is capable of tracking connection states, it is better equipped to allow or deny traffic based on such knowledge.  A TCP connection for example goes through the handshake (SYN-SYN+ACK-SYN), to EASTABLISHED state, and … Continue reading Stateful vs Stateless firewalls: Which one to use when?