Archive

Category Archives for "Networking"

Avaya plan deploys network virtualization, segmentation to guard business jewels

Avaya has rolled out products it says will help enterprise customers more easily segment traffic between widely dispersed networked resources and effectively protect corporate data.The two central components of what the company calls its Data Center Everywhere plan include a new hardware-independent operating system for the company’s switches – the Virtual Service 8000 non-Avaya products such as x86, or ARM platforms – that lets customers deploy virtualized network functions anywhere in the network.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here

Avaya plan deploys network virtualization, segmentation to guard business jewels

Avaya has rolled out products it says will help enterprise customers more easily segment traffic between widely dispersed networked resources and effectively protect corporate data.The two central components of what the company calls its Data Center Everywhere plan include a new hardware-independent operating system for the company’s switches – the Virtual Service 8000 non-Avaya products such as x86, or ARM platforms – that lets customers deploy virtualized network functions anywhere in the network.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here

Avaya plan deploys network virtualization, segmentation to guard business jewels

Avaya has rolled out products it says will help enterprise customers more easily segment traffic between widely dispersed networked resources and effectively protect corporate data.The two central components of what the company calls its Data Center Everywhere plan include a new hardware-independent operating system for the company’s switches – the Virtual Service 8000 non-Avaya products such as x86, or ARM platforms – that lets customers deploy virtualized network functions anywhere in the network.+More on Network World: Cisco, Mitel, NEC and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy+To read this article in full or to leave a comment, please click here

Unpatched vulnerability exposes Magento online shops to hacking

An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.The flaw was discovered by researchers from security consultancy DefenseCode and is located in a feature that retrieves preview images for videos hosted on Vimeo. Such videos can be added to product listings in Magento.The DefenseCode researchers determined that if the image URL points to a different file, for example a PHP script, Magento will download the file in order to validate it. If the file is not an image, the platform will return a "Disallowed file type" error, but won't actually remove it from the server.To read this article in full or to leave a comment, please click here

The AI revolution: Is the future finally now?

 Over the last several decades, the evolution of artificial intelligence has followed an uncertain path – reaching incredible highs and new levels of innovation, often followed by years of stagnation and disillusionment as the technology fails to deliver on its promises.

Today we are once again experiencing growing interest in the future possibilities for AI. From voice powered personal assistants like Google Home and Alexa, to Netflix’s predictive recommendations, Nest learning thermostats and chatbots used by banks and retailers, there are countless examples of AI seeping into everyday life and the potential of future applications seem limitless . . . again.

To read this article in full or to leave a comment, please click here

The AI revolution: Is the future finally now?

 Over the last several decades, the evolution of artificial intelligence has followed an uncertain path – reaching incredible highs and new levels of innovation, often followed by years of stagnation and disillusionment as the technology fails to deliver on its promises.Today we are once again experiencing growing interest in the future possibilities for AI. From voice powered personal assistants like Google Home and Alexa, to Netflix’s predictive recommendations, Nest learning thermostats and chatbots used by banks and retailers, there are countless examples of AI seeping into everyday life and the potential of future applications seem limitless . . . again.To read this article in full or to leave a comment, please click here

VMware cloud design decisions: LACP part 1

Recently I’ve been helping a customer who’s working on a VMware cloud design. As is often the case, there are a set of consulting SME’s helping with the various areas; an NSX/virtualization consultant, the client’s tech team and a network guy (lucky me).

One of the interesting challenges in such a case is understanding the background behind design decisions that the other teams have made and the flow-on effects they have on other components. In my case, I have a decent background in designing a VMware cloud and networking, so I was able to help bridge the gap a little.

My pet peeve in a lot of cases is the common answer of “because it’s ‘best-practice’ from vendor X” and a blank stare when asked: “sure, but why?”. In this particular case, I was lucky enough to have a pretty savvy customer, so a healthy debate ensued. This is that story.

Disclaimer: What I’m going to describe is based on network switches running Cumulus Linux and specifically some down-in-the-weeds details on this particular MLAG implementation. That said, most of the concepts apply to similar network technologies (VPC, other MLAG implementations, stacking, virtual-chassis, etc.) as they operate in very Continue reading

Cloudflare Rate Limiting – Insight, Control, and Mitigation against Layer 7 DDoS Attacks

Today, Cloudflare is extending its Rate Limiting service by allowing any of our customers to sign up. Our Enterprise customers have enjoyed the benefits of Cloudflare’s Rate Limiting offering for the past several months. As part of our mission to build a better internet, we believe that everyone should have the ability to sign up for the service to protect their websites and APIs.

CC-BY 2.0 image by Benjamin Child

Rate Limiting is one more feature in our arsenal of tools that help to protect our customers against denial-of-service attacks, brute-force password attempts, and other types of abusive behavior targeting the application layer. Application layer attacks are usually a barrage of HTTP/S requests which may look like they originate from real users, but are typically generated by machines (or bots). As a result, application layer attacks are often harder to detect and can more easily bring down a site, application, or API. Rate Limiting complements our existing DDoS protection services by providing control and insight into Layer 7 DDoS attacks.

Rate Limiting is now available to all customers across all plans as an optional paid feature. The first 10,000 qualifying requests are free, which allows customers to start using Continue reading

HP to ship its Omen X VR backpack PC in June

HP will make a major virtual reality push in June, when it will start shipping its Omen X VR backpack PC.The backpack PC has already been announced, but the company until now had not provided a shipping date. HP is accepting applications from gamers and commercial developers to test the product.There will be two types of Omen X backpack PCs, Ron Coughlin, president of the Personal Systems Business at HP, said in an interview. HP will release a VR backpack for gamers, and one for commercial customers, he said.Users will be able to carry the PC like a backpack and hook up a VR headset like HTC's Vive. Wearing the backpack PC allows users to move around freely.To read this article in full or to leave a comment, please click here

Security researcher blasts Tizen: ‘May be the worst code I’ve ever seen’

Samsung has had enough struggles with Tizen, the open-source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming.Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here

Security researcher blasts Tizen: “May be the worst code I’ve ever seen”

Samsung has had enough struggles with Tizen, the open source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming. Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here

Security researcher blasts Tizen: ‘May be the worst code I’ve ever seen’

Samsung has had enough struggles with Tizen, the open-source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming.Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here

Slack makes it easier to say you’re out to lunch

Slack is making it easier for coworkers to see what other people in their organization are up to, thanks to a new status-message feature unveiled Thursday.The functionality, which is rolling out to the messaging service’s customers over the next few days, lets users set a message in their profile that informs others about their activities.Statuses will show up next to users’ names inside Slack’s chat window, in their profiles, and next to their names in the Quick Switcher, which lets users easily switch between different chat channels and direct messages. Slack An illustration shows how Slack's custom status feature looks inside the service's desktop chat app.To read this article in full or to leave a comment, please click here