Archive

Category Archives for "Networking"

Latest Ransomware Techniques Show Need for Layered Security

I think everyone that touches security has had multiple conversations about the hardened edge and soft center, commonly found in networks. This usually accompanies some discussion around the overlapping concepts of difference in depth, layered security and security ecosystems. It seems like many of the recent exploits have used a C2 connection for instructions. In those cases, assuming a perfect NGFW product and configuration actually existed that caught 100% of the malicious traffic, it would have the capability to impact those attacks.

However on June 27, Cisco Talos published an article about a ransomware variant known as Nyetya. As of today, Talos has been able to find no evidence of the more common initial infection vehicles. Both Cisco and Microsoft have cited the upgrade process for a tax accounting package as the initial point of infection.

Per Cisco Talos:

The identification of the initial vector is still under investigation. We have observed no use of email or Office documents as a delivery mechanism for this malware. We believe that infections are associated with software update systems for a Ukrainian tax accounting package called MeDoc. Talos is investigating this currently.

So what does this mean to the majority of the world that Continue reading

InfiniBand And Proprietary Networks Still Rule Real HPC

With the network comprising as much as a quarter of the cost of a high performance computing system and being absolutely central to the performance of applications running on parallel systems, it is fair to say that the choice of network is at least as important as the choice of compute engine and storage hierarchy. That’s why we like to take a deep dive into the networking trends present in each iteration of the Top 500 supercomputer rankings as they come out.

It has been a long time since the Top 500 gave a snapshot of pure HPC centers that

InfiniBand And Proprietary Networks Still Rule Real HPC was written by Timothy Prickett Morgan at The Next Platform.

Not The Cisco of John Chambers Anymore

I just got back from Cisco Live 2017 last night and I had a blast at the show. There was a lot of discussion about new architectures, new licensing models, and of course, Tech Field Day Extra. However, one of the most interesting topics went largely under the radar. I think we’re fully in the transition of Cisco away from being the Company of John Chambers.

Steering A Tall Ship

John Chambers wasn’t the first CEO of Cisco. But he’s the one that most people would recognize. He transformed the company into the juggernaut that it is today. He watched Cisco ascend to the leader in the networking space and helped it transform into a company that embraced voice, security, and even servers and compute as new business models.

John’s Cisco is a very unique animal. It’s not a single company. It’s a collection of many independent companies with their own structures and goals all competing with each other for resources. If John decided that UCS was more important to his goals this quarter, he shifted some of the support assets to focus on that business unit. It was a featured product, complete with healthy discounts to encourage user adoption.

Continue reading

Cisco’s DevNet extends the value of its intent-based networking

Earlier this month, Cisco held a media and press event to launch its intent-based networking solution. To no surprise, its user event, Cisco Live 2017 was all about the network as Cisco looks to get customers to think more broadly about the role of the network in digital transformation.Brandon Butler did a great follow-up post to mine that talked about why intent-based networking is a big deal. He called out a number of benefits, including streamlined operations and better security.To read this article in full or to leave a comment, please click here

Cisco’s DevNet extends the value of its intent-based networking

Earlier this month, Cisco held a media and press event to launch its intent-based networking solution. To no surprise, its user event, Cisco Live 2017 was all about the network as Cisco looks to get customers to think more broadly about the role of the network in digital transformation.Brandon Butler did a great follow-up post to mine that talked about why intent-based networking is a big deal. He called out a number of benefits, including streamlined operations and better security.To read this article in full or to leave a comment, please click here

Cray adds big data software to its supercomputers

Cray has announced a new suite of big data and artificial intelligence (AI) software called Urika-XC for its top-of-the-line XC Series of supercomputers. Urika-XC is a set of analytics software that will let XC customers use Apache Spark, Intel’s BigDL deep learning library, Cray’s Urika graph analytics engine, and an assortment of Python-based data science tools.With the Urika-XC software suite, analytics and AI workloads can run alongside scientific modeling and simulations on Cray XC supercomputers, eliminating the need to move data between systems. Cray XC customers will be able to run converged analytics and simulation workloads across a variety of scientific and commercial endeavors, such as real-time weather forecasting, predictive maintenance, precision medicine and comprehensive fraud detection. To read this article in full or to leave a comment, please click here

Cray adds big data software to its supercomputers

Cray has announced a new suite of big data and artificial intelligence (AI) software called Urika-XC for its top-of-the-line XC Series of supercomputers. Urika-XC is a set of analytics software that will let XC customers use Apache Spark, Intel’s BigDL deep learning library, Cray’s Urika graph analytics engine, and an assortment of Python-based data science tools.With the Urika-XC software suite, analytics and AI workloads can run alongside scientific modeling and simulations on Cray XC supercomputers, eliminating the need to move data between systems. Cray XC customers will be able to run converged analytics and simulation workloads across a variety of scientific and commercial endeavors, such as real-time weather forecasting, predictive maintenance, precision medicine and comprehensive fraud detection. To read this article in full or to leave a comment, please click here

Building Our New Website: A video about the user experience of multilingual websites

How do you build a multilingual website? What are the things you should be thinking about? In my last post in this series, I wrote about our need for a multilingual editor (and we now have some GREAT candidates!). But there's obviously much more to a site than just having a person on board. This week, Joly MacFie of our New York Chapter pointed me to this excellent video from the recent WordCamp Helsinki 2017 event titled "The User Experience Perspective of Multilingual and Multi-regional Websites":

Dan York

Dark Fiber and Cisco OTV – Basic Approach and connectivity

Today I am going to discuss on the connectivity of the two datacenter and in the Active-Active state or you can called them as Connecting Multiple Active Datacenter with OTV and Dark Fiber.

First let's talk about the technologies, Cisco OTV is a Overlay Transport Virtualization technology and is used to extend the LAN segments across the datacenter or in other words you can say that extending the Layer 2 traffic over the Layer 3 network.

Note : Cisco OTV supports on Cisco Nexus 7K series switches and is not supported in Cisco Nexus 9K Switches.

Cisco OTV- Overlay Transport Virtualization technology
As I said, that Cisco OTV is the way to extend your layer 2 network across the datacenter via the Layer 3 links. OTV actually works on the MAC routing concept.

MAC and Routing ..What :)

Yes, control plane protocol in Cisco OTV is used to exchange MAC reachability information between network devices providing LAN extension functionality. This is a huge change from Layer 2 switching that traditionally leverages data plane learning, and it is justified by the need to limit flooding of Layer 2 traffic across the transport infrastructure. 

Layer 2 communications between sites Continue reading