Archive

Category Archives for "Networking"

IDG Contributor Network: How IoT is shaping the smart office of the future

The Internet of Things (IoT) has already firmly embedded itself into America’s homes, industries, and infrastructure, and now it’s tackling that final frontier of the market, the office. Increasingly, America’s savviest businesses are adopting IoT tech into their office environments to ease their employees’ workloads, save serious money on overhead and by reducing fraud, and to gather valuable data which can be used to optimize their operations.So how exactly are IoT solutions being applied to office dilemmas, and is the increasingly trendy “smart office” anything more than a temporary fad? A quick look at the union between smart tech and America’s workspaces shows that this phenomenon is anything but temporary, and will fundamentally reshape how we work and run our businesses well into the future.To read this article in full or to leave a comment, please click here

Cisco adds telemetry to storage networks

Fiber Channel (FC) storage networks have always been somewhat of a black box. Servers and storage devices are plugged in, and things magically seem to work.For the most part, storage-area networks (SANs) are reliable and perform well – and they better because the applications that rely of FC-SANs are typically the most important ones in the company. But what happens when things aren’t working? A poorly performing SAN might mean that the database with critical customer information isn’t available or financial records can’t be pulled up. Also on Network World: 10 Most important open source networking projects Historically, troubleshooting SANs has been difficult because the FC switches give off little data that can be used to identify the source of a problem. Typically, engineers would need to deploy a physical test access port (TAP) or packet broker in front of the product to capture the data. This may seem like a reasonable strategy until one prices out TAPs and learns the price per port is about 5-10x a FC port. Companies that go down this route often buy a few and deploy them only when there is a problem. This causes the engineering team to always be in Continue reading

Can We Expand the Multistakeholder Model for Internet Governance? A Feasibility Report

What can be done to expand the usage of the multistakeholder model for Internet governance?

Collaborative decision making has been at the heart of how the Internet has grown and developed since its earliest days. Multistakeholder approaches are used across the Internet ecosystem and have helped create the opportunities made possible by the Internet today. But as we outlined in our Global Internet Report 2017, more work is needed to expand the use of multistakeholder processes in order to tackle some of the most pressing challenges facing the future of the Internet.

As I wrote last summer, the Internet Society commissioned a feasibility study on expanding the use of the multistakeholder model for Internet governance , including three focus areas:

  • Demonstrating the efficacy of the model
  • Capacity building
  • Research

I would like to thank Larry Strickling and Grace Abuhamad, who have led this work. Their report is based on interviews with a wide range ICT experts from academia, industry, the technical community, civil society and governments.  It details a possible framework for such an initiative, as well as the resources required. It also makes clear that any new initiative should support and complement existing initiatives such as the Internet Governance Forum Continue reading

Scary Linux commands for Halloween

With Halloween so fast approaching, it’s time for a little focus on the spookier side of Linux. What commands might bring up images of ghosts, witches and zombies? Which might encourage the spirit of trick or treat?crypt Well, we’ve always got crypt. Despite its name, crypt is not an underground vault or a burial pit for trashed files, but a command that encrypts file content. These days “crypt” is generally implemented as a script that emulates the older crypt command by calling a binary called mcrypt to do its work. Using the mycrypt command directly is an even better option. $ mcrypt x Enter the passphrase (maximum of 512 characters) Please use a combination of upper and lower case letters and numbers. Enter passphrase: Enter passphrase: File x was encrypted. Note that the mcrypt command creates a second file with an added ".nc" extension. It doesn't overwrite the file you are encrypting.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How consumer demand is driving development of the Internet of Things

Few industries are as impacted by consumer demand as the Internet of Things (IoT) and the plethora of sectors reliant on in; when consumers demand a new gadget or a new service, an innovative startup springs up seemingly overnight to meet those demands. Similarly, few consumer goods are as customizable or responsive to changing user preferences as the gadgets and software that make up the commercial IoT. So how can savvy IoT enthusiast rely on consumer demand to better the IoT businesses?One can’t find success in the field of IT or within the IoT in general without understanding how crucial consumer demand is to the industry as a whole. More than anything else, this demand is driving the extraordinarily rapid development of the IoT, which could reach a dizzying 50 billion connections by 2020, according to Brookings.To read this article in full or to leave a comment, please click here

QCT Open Data Center Technology Poised to Help Telcos ‘Win 5G Battles’

QCT Open Data Center Technology Poised to Help Telcos ‘Win 5G Battles’ SAN JOSE, California — Quanta Cloud Technology’s (QCT) latest data center technology brings the benefits of disaggregation and composable infrastructure to cloud service providers and telco service providers, said Mike Yang, president of QCT at today’s Q.synergy 2017 event. The Rackgo R portfolio is based on the Intel Rack Scale Design (RSD) software framework, which... Read more →

Devaluing Data Exposures

I had a great time this week recording the first episode of a new series with my co-worker Rich Stroffolino. The Gestalt IT Rundown is hopefully the start of some fun news stories with a hint of snark and humor thrown in.

One of the things I discussed in this episode was my belief that no data is truly secure any more. Thanks to recent attacks like WannaCry and Bad Rabbit and the rise of other state-sponsored hacking and malware attacks, I’m totally behind the idea that soon everyone will know everything about me and there’s nothing that anyone can do about it.

Just Pick Up The Phone

Personal data is important. Some pieces of personal data are sacrificed for the greater good. Anyone who is in IT or works in an area where they deal with spam emails and robocalls has probably paused for a moment before putting contact information down on a form. I have an old Hotmail address I use to catch spam if I’m relative certain that something looks shady. I give out my home phone number freely because I never answer it. These pieces of personal data have been sacrificed in order to provide me Continue reading

IoT market keeps growing, with no end in sight

With all the hype it’s getting, you might think the Internet of Things (IoT) simply couldn’t gain any more momentum. Well, think again, because new market research and a wave of global IoT investments from sovereign nations and top-name companies keeps on accelerating the IoT momentum.Growth, growth and more growth First off, IHS Markit has published a new ebook in which it predicts serious growth for IoT: “The number of connected IoT devices worldwide will jump 12 percent on average annually, from nearly 27 billion in 2017 to 125 billion in 2030.”According to the ebook, titled “The Internet of Things: a movement, not a market,” (pdf) that growth “is impacting virtually all stages of industry and nearly all market areas — from raw materials to production to distribution and even the consumption of final goods.” To read this article in full or to leave a comment, please click here

VMware NSX/Kubernetes and F5 – A Cloud Native App Integration

Introduction

When Bob Dylan wrote back in the 60’s “times they are a-changin” it’s very possible he knew how true that would be today.  Last week, we saw a few things announced in the container technology space during the DockerCon event in Copenhagen – but one thing that I believe came as a surprise to many was Docker’s announcement to begin including Kubernetes in Docker Enterprise edition sometime in early 2018.  This doesn’t concede or mark the death of Docker’s own scheduling and orchestration platform, Docker Swarm, but it does underscore what we’ve heard from many of our customers for quite some time now – almost every IT organization that is using/evaluating containers has jumped on the Kubernetes bandwagon.  In fact, many of you are probably already familiar with the integration supported today with NSX-T 2.0 and Kubernetes from the post that Yves did earlier in the year…

In the past few years, we’ve heard a lot about this idea of digital transformation and what it means for today’s enterprise.  Typically, a part of this transformation is something called infrastructure modernization, and this happens because most IT environments today have some hurdles that need to Continue reading

IDG Contributor Network: Don’t keep squandering one of your greatest storage assets: metadata

Storage has long been one of the biggest line items on the IT budget. Rightly so, given that data is valuable asset and the lifeblood of every business today. Critical applications consume data as quickly as they get it, and many companies are also using their data to find new insights that help them develop novel products and strategies.Regardless of how hot a file is when it is created, in time, its use cools. As a business matures, more and more cool, cold and even frigid data continues to pile up. With analytics now offering new insights on old data, however, no one wants to delete old files or send them to offline archival storage. This means buying more and more capacity is a given, just as death and taxes.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Don’t keep squandering one of your greatest storage assets: metadata

Storage has long been one of the biggest line items on the IT budget. Rightly so, given that data is valuable asset and the lifeblood of every business today. Critical applications consume data as quickly as they get it, and many companies are also using their data to find new insights that help them develop novel products and strategies.Regardless of how hot a file is when it is created, in time, its use cools. As a business matures, more and more cool, cold and even frigid data continues to pile up. With analytics now offering new insights on old data, however, no one wants to delete old files or send them to offline archival storage. This means buying more and more capacity is a given, just as death and taxes.To read this article in full or to leave a comment, please click here

Service Provider MPLS : Inter-AS MPLS Options

Today I am going to talk about the Inter-AS MPLS or you can say that Inter-provider MPLS option. So in this case i am taking the example on the Cisco devices. To maintain the continuity of MPLS VPN services across multiple service providers, mainly for customers who span world wide on different service providers, IETF described 3 types of options. These options are 
  • Option A
  • Option B 
  • Option C
 Inter-AS or Inter-Provider MPLS VPN solutions, while Cisco implemented three options (1, 2 and 3) with Cisco IOS (these options are also known in Cisco documents as 10A, 10B and 10C).

Lets start with all these option one by one. The first option is called as VRF to VRF connection between two different AS border routers and the explanation is as below.

Option A: VRF-to-VRF connections at the AS (Autonomous System) border routers
In this procedure, a PE router in one AS attaches directly to a PE router in another. The two PE routers will be attached by multiple sub-interfaces, at least one for each of the VPNs whose routes need to be passed from AS to AS. 
Fig 1.1- Inter-AS option A

Each PE will treat the other Continue reading

WPA2 and Infineon

The recent bug in WPA2 has a worst case outcome that is the same as using a wifi without a password: People can sniff, maybe inject… it’s not great but you connect to open wifi at Starbucks anyway, and you’re fine with that because you visit sites with HTTPS and SSH. Eventually your client will get a fix too, so the whole thing is pretty “meh”.

But there’s a reason I call it “WPA2 bug” and I call the recent issue with Infineon key generation “the Infineon disaster”. It’s much bigger. It seems like the whole of Estonia needs to re-issue ID cards, and several years worth of PC-, smartcard-, Yubikey, and other production have been generating bad keys. And these keys will stick around.

From now until forever when you generate, use, or accept RSA keys you have to check for these weak keys. I assume OpenSSH will if it hasn’t already.

But then what? It’s not like servers can just reject these keys, or it’ll lock people out. And it’s not clear that an adversary even has your public key for SSH. And you can’t crack the key if you don’t have the public half. Maybe a Continue reading