Archive

Category Archives for "Networking"

20% off AIRFREE HD Indoor Antenna 50 Miles Range, USB Power Supply – Deal Alert

Cut the cable and get access to your local news, weather, sitcoms, kids and sports programs, educational programs and more for free. Enjoy crystal clear HDTV shows in 1080p. The antenna boasts a 50-mile range, and a generous 10-foot cable gives you the flexibility to find the best placement for maximum reception. The AIRFREE antenna currently averages 4.5 out of 5 stars from over 170 people on Amazon, where its typical list price of $19.99 has been temporarily reduced 20% to $15.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

By Djingo, there’s a new virtual assistant

How many virtual assistants can you fit in one smartphone? European network operator Orange is hoping there's room to squeeze in one more.With the right apps, you can already talk to Alexa, Cortana and Google through your smartphone -- and maybe also to Siri or Bixby if you went with one of the big brands.Orange wants to add Djingo to that list.Djingo will be able to answer questions, send text messages, place calls, play music and video from Orange's set-top box, and control smart home devices.It draws on the company's research into linguistics and artificial intelligence, and will even offer financial advice in conjunction with a new banking service Orange is launching, the company said.To read this article in full or to leave a comment, please click here

How MLAG interacts with the host: LACP part 2

In part1, we discussed some of the design decisions around uplink modes for VMware and a customer scenario I was working through recently. In this post, we’ll explore multi-chassis link aggregation (MLAG) in some detail and how active-active network fabrics challenge some of the assumptions made.

Disclaimer: What I’m going to describe is based on network switches running Cumulus Linux and specifically some down-in-the-weeds details on this particular MLAG implementation. That said, most of the concepts apply to similar network technologies (VPC, other MLAG implementations, stacking, virtual-chassis, etc.) as they operate in very similar ways. But YMMV.

I originally set out to write this as a single article, but to explain the nuances it quickly spiraled beyond that. So I decided to split it up into a few parts.

Part1: Design choices – Which NIC teaming mode to select

• Part2: How MLAG interacts with the host (This page)
Part3: “Ships in the night” – Sharing state between host and upstream network

So let’s explore MLAG in some detail

If the host is connected to two redundant switches (which these days is all but assumed), then MLAG (and equivalent solutions) is a commonly deployed option. In simple terms, Continue reading

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.The vulnerabilities were discovered by senior security consultant Tao Sauvage from IOActive and independent security researcher Antide Petit while working together to analyze the Linksys EA3500 Smart Wi-Fi wireless router.The two researchers found a total of 10 vulnerabilities that affect not only the EA3500, but two dozen different router models from Linksys' Smart Wi-Fi, WRT and Wireless-AC series. Even though these devices are marketed as consumer products, it's not unusual to find them running in small business and home office environments.To read this article in full or to leave a comment, please click here

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.The vulnerabilities were discovered by senior security consultant Tao Sauvage from IOActive and independent security researcher Antide Petit while working together to analyze the Linksys EA3500 Smart Wi-Fi wireless router.The two researchers found a total of 10 vulnerabilities that affect not only the EA3500, but two dozen different router models from Linksys' Smart Wi-Fi, WRT and Wireless-AC series. Even though these devices are marketed as consumer products, it's not unusual to find them running in small business and home office environments.To read this article in full or to leave a comment, please click here

Facebook diversifies VR development with JavaScript framework React VR

If Rodney Dangerfield were an engineer, he would insult tool makers because inventors get respect, but tool makers none. Everyone remembers Thomas Edison for the invention of the light bulb and phonograph, but no one remembers Edison’s tool maker, Thomas Watson, except that Edison once recorded beckoning him on a phonograph cylinder.Like Watson, web development tool JavaScript gets no respect from some people who consider themselves serious developers. Nevertheless, JavaScript persists because it is the core to responsive web pages and because it is the most widely understood and used programming language in the world outside of the enterprise. It has also proved extensible, adapting to new uses faster than its critics can disparage it.To read this article in full or to leave a comment, please click here

Bose accused of spying on users, illegal wiretapping via Bose Connect app

Those high-dollar Bose headphones? A lawsuit filed in Chicago contends Bose has been spying on users via the Bose Connect app, which enables users to remotely control their Bose headphones, and violating their privacy rights by selling the information about what they listen to without permission. Furthermore, Kyle Zak accused Bose of illegal wiretapping.The lawsuit claims the app also has a data miner called Segment.io. Segment, the company behind the data miner, advertises, “Collect all of your customer data and send it anywhere.”To read this article in full or to leave a comment, please click here

Bose accused of spying on users, illegal wiretapping via Bose Connect app

Those high-dollar Bose headphones? A lawsuit filed in Chicago contends Bose has been spying on users via the Bose Connect app, which enables users to remotely control their Bose headphones, and violating their privacy rights by selling the information about what they listen to without permission. Furthermore, Kyle Zak accused Bose of illegal wiretapping.The lawsuit claims the app also has a data miner called Segment.io; Segment, the company behind the data miner, advertises, “Collect all of your customer data and send it anywhere.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Finding and protecting the crown jewels

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established. Virtualization has changed how applications are built, deployed and used. It has also created challenges to how security is applied and deployed for these environments. That isn’t necessarily a bad thing; the result of these challenges has driven new innovation in the cloud security space.+ Also on Network World: The tricky, personal politics of cloud security + Discovering and mapping application communications and dependencies is one of the first steps in defining and creating security policies for east-west data center traffic. Unfortunately, there is often a lack of understanding about these relationships, making east-west security policies difficult to implement and often prone to misconfiguration. As a result, we still see an abundance of successful attacks and the loss of critical data, even with traditional perimeter security models in place.To read this article in full or to leave a comment, please click here

Toward a bigger, faster, denser Wi-Fi world

Some 350 Wi-Fi true believers have gathered in Tysons Corner, Va., this week to sing the wireless networking technology’s praises, peek into its future and warn of its challenges.The Wi-Fi Now event featured sessions and exhibitors focused on consumer, enterprise and service provider technologies, though I mainly concentrated on the enterprise technology in the sweet spot for Network World’s target readers. This included the latest alphabet soup of new and emerging IEEE 802.11 standards, including 11ad, ah, ax and ay. Bob Brown/IDG/NetworkWorld Wi-Fi Now exhibitors' floorTo read this article in full or to leave a comment, please click here

Toward a bigger, faster, denser Wi-Fi world

Some 350 Wi-Fi true believers have gathered in Tysons Corner, Va., this week to sing the wireless networking technology’s praises, peek into its future and warn of its challenges.The Wi-Fi Now event featured sessions and exhibitors focused on consumer, enterprise and service provider technologies, though I mainly concentrated on the enterprise technology in the sweet spot for Network World’s target readers. This included the latest alphabet soup of new and emerging IEEE 802.11 standards, including 11ad, ah, ax and ay. Bob Brown/IDG/NetworkWorld Wi-Fi Now exhibitors' floorTo read this article in full or to leave a comment, please click here

ARDA 1.0: A pulse meter for Africa’s peering and interconnection landscape

Do you want to understand more about how the Internet is connected in Africa?  Today we are pleased to announce the African Route-collectors Data Analyzer (ARDA) system. This new systems aims to present data collected at African IXPs in ways that can be easily extrapolated into practical business, policy, developmental, technical, or research opportunities for everyone involved in the peering and interconnection ecosystem.

Michuki Mwangi
Roderick Fanou

Administravia 20170420

A couple of minor items for this week. First, I’ve removed the series page, and started adding subcategories. I think the subcategories will be more helpful in finding the material you’re looking for among the 700’ish posts on this site. I need to work through the rest of the posts here to build more subcategoies, but what is there is a start. Second, I’ve changed the primary domain from rule11.us to rule11.tech, and started using the rule 11 reader name more than the ‘net Work name. rule11.us will still work to reach this site, eventually ntwrk.guru will time out and die. Finally, I’ve put it on my todo list to get a chronological post page up at some point.

Happy Reading!

The post Administravia 20170420 appeared first on rule 11 reader.