Archive

Category Archives for "Networking"

US bans electronics larger than smartphones in cabins on certain flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage, citing increased terror threats.Giving the approximate size of a commonly available smartphone as a guideline for passengers, the DHS said that laptops, tablets, e-readers, cameras, portable DVD players, electronic game units larger than smartphones, and travel printers or scanners were the kind of personal electronics that would not be allowed in the cabin and would have to be carried as checked baggage.Approved medical devices may be brought into the cabin after additional screening. The size of smartphones is well understood by most passengers who fly internationally, according to the DHS, which in any case asked passengers to check with their airline if they are unsure whether their smartphone is impacted.To read this article in full or to leave a comment, please click here

US bans electronics larger than smartphones in cabins on certain flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage, citing increased terror threats.Giving the approximate size of a commonly available smartphone as a guideline for passengers, the DHS said that laptops, tablets, e-readers, cameras, portable DVD players, electronic game units larger than smartphones, and travel printers or scanners were the kind of personal electronics that would not be allowed in the cabin and would have to be carried as checked baggage.Approved medical devices may be brought into the cabin after additional screening. The size of smartphones is well understood by most passengers who fly internationally, according to the DHS, which in any case asked passengers to check with their airline if they are unsure whether their smartphone is impacted.To read this article in full or to leave a comment, please click here

Is this the world’s first combination head shop/computer store?

Just a few doors down the street from the iconic corner of Haight and Ashbury, ground zero for San Francisco’s Summer of Love 50 years ago, sits a most unusual store. On the ground floor of a building once occupied by Jimi Hendrix, Ashbury Tech is a unique melding of old and new San Francisco.From tobacco to tech  That’s because the three-level is store is not your garden-variety electronics shop. Until earlier this year, in fact, it had been known as Ashbury Tobacco Center for the past 23 years. And approximately half of its floor space is still dedicated to bongs, pipes, vapes and other accouterments of what is commonly known as a head shop. To read this article in full or to leave a comment, please click here

Nutanix

Maximum Performance from Acropolis Hypervisor and Open vSwitch describes the network architecture within a Nutanix converged infrastructure appliance - see diagram above. This article will explore how the Host sFlow agent can be deployed to enable sFlow instrumentation in the Open vSwitch (OVS)  and deliver streaming network and system telemetry from nodes in a Nutanix cluster.
This article is based on a single hardware node running Nutanix Community Edition (CE), built following the instruction in Part I: How to setup a three-node NUC Nutanix CE cluster. If you don't have hardware readily available, the article, 6 Nested Virtualization Resources To Get You Started With Community Edition, describes how to run Nutanix CE as a virtual machine.
The sFlow standard is widely supported by network equipment vendors, which combined with sFlow from each Nutanix appliance, delivers end to end visibility in the Nutanix cluster. The following screen captures from the free sFlowTrend tool are representative examples of the data available from the Nutanix appliance.
The Network > Top N chart displays the top flows traversing OVS. In this case an HTTP connection is responsible for most of the traffic. Inter-VM and external traffic flows traverse OVS and are efficiently Continue reading

VMware NSX and vRNI Enabling Customer Operations

Recently, we had a customer challenge our team to prove to them the operational gains and demonstrate the cross-functional tooling VMware provides to assist them in scaling from zero to hundreds of VMs on the platform.  Our goal was simple –  exhibit a complete lifecycle for any customer to go from evaluation to production operation thereby enabling customer operations.  The result was a video summary demoing our enhanced tooling that complements our simple three-step workflow: environmental assessment, plan and enforcement, and then continuous monitoring.

Step 1 – Environmental Assessment:

Understanding your environment is crucial in today’s modern world of IT – and is especially key at the early stages of identifying an easy to implement micro-segmentation plan.  We’ve made this process very easy (even if you don’t have NSX in your environment yet!).  VMware offers the free VMware Virtual Network Assessment that will take that identified traffic and start to make suggested firewall and security recommendations.  Additionally, we provide correlated data and analysis to highlight useful metrics that are top-of-mind for network operators – such as the amount of East-West/North-South traffic present in your network, or how much data is seen on Continue reading

Can you imagine Mars with Saturn-like rings?

It’s hard to fathom and may be even harder for it to happen but a couple NASA-funded scientists say Mars might have had Saturn-like rings around it in the past and may have them again sometime in the distant future. NASA’s Jet Propulsion Lab said Purdue University scientists David Minton and Andrew Hesselbrock developed a model that suggests debris that was pushed into space from an asteroid or other body slamming into Mars around 4.3 billion years ago alternates between becoming a planetary ring and clumping together to form a moon. More on Network World: Elon Musk’s next great adventure: Colonizing Mars+To read this article in full or to leave a comment, please click here

Can you imagine Mars with Saturn-like rings?

It’s hard to fathom and may be even harder for it to happen but a couple NASA-funded scientists say Mars might have had Saturn-like rings around it in the past and may have them again sometime in the distant future.NASA’s Jet Propulsion Lab said Purdue University scientists David Minton and Andrew Hesselbrock developed a model that suggests debris that was pushed into space from an asteroid or other body slamming into Mars around 4.3 billion years ago alternates between becoming a planetary ring and clumping together to form a moon.More on Network World: Elon Musk’s next great adventure: Colonizing Mars+To read this article in full or to leave a comment, please click here

Bill Gates again tops world’s billionaire list

Bill Gates, co-founder and former CEO of Microsoft, was the world's richest person in 2016, the fourth year in a row he has headed the list, Forbes said today.But Gates' fortune did not rely on the Microsoft shares he held, filings with the U.S. Securities & Exchange Commission (SEC) showed.Forbes pegged Gates' total worth at $86.8 billion, more than $9 billion more than the next-richest person on the planet, Warren Buffet. However, in a February filing with the SEC, Gates said that he owned 174,992,934 Microsoft shares. At Monday's opening price, that portfolio would be worth approximately $11.4 billion.To read this article in full or to leave a comment, please click here

Russia will strike US elections again, FBI warns

Future U.S. elections may very well face more Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.“They’ll be back,” said FBI director James Comey. “They’ll be back in 2020. They may be back in 2018.”Comey made the comment during a congressional hearing on Russia’s suspected efforts to meddle with last year’s presidential election. Allegedly, cyberspies from the country hacked several high-profile Democratic groups and people, in an effort to tilt the outcome in President Donald Trump’s favor.To read this article in full or to leave a comment, please click here

Russia will strike US elections again, FBI warns

Future U.S. elections may very well face more Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.“They’ll be back,” said FBI director James Comey. “They’ll be back in 2020. They may be back in 2018.”Comey made the comment during a congressional hearing on Russia’s suspected efforts to meddle with last year’s presidential election. Allegedly, cyberspies from the country hacked several high-profile Democratic groups and people, in an effort to tilt the outcome in President Donald Trump’s favor.To read this article in full or to leave a comment, please click here

IBM + Red Hat = An open source hybrid cloud

IBM Cloud and Red Hat OpenStack and storage teams are partnering to integrate their products and in doing so are creating a compelling hybrid offering for open source-minded customers.The announcement came at IBM’s InterConnect conference in Las Vegas, where an estimated 20,000 developers, customers and IBM partners are gathering.+MORE AT NETWORK WORLD: How IBM wants to bring blockchain from Bitcoin to your data center +The crux of the partnership is that customers who use Red Hat’s OpenStack private cloud platform and Ceph Storage product will now be able to run both of those in IBM’s cloud. Don Bulia, a general manager in IBM’s cloud division says the idea behind the partnership is that Red Hat customers would be able to extend their Red Hat-based environments into the IBM public cloud, which will run the same management and software tools they have on premises.To read this article in full or to leave a comment, please click here

Yerevan, Armenia: Cloudflare Data Center #103

CC-BY 2.0 image by Marco Polo

In the coming days, Cloudflare will be announcing a series of new data centers across five continents. We begin with Yerevan, the capital and largest city of Armenia, the mountainous country in the South Caucasus. This deployment is our 37th data center in Asia, and 103rd data center globally.

History

CC-BY 2.0 image by PAN Photo

Yerevan, one of the oldest continuously inhabited cities in the world, has a rich history going back all the way to 782 BC. Famous for its cognac, lavash flatbread, and beautiful medieval churches, Armenia is also home to more chess grandmasters per capita than most countries!

6 Million Websites Faster

Latency (ms) decreases 6x for UCOM Internet user in Yerevan to Cloudflare. Source: Cedexis

The newest Cloudflare deployment will make 6 million Internet properties faster and more secure, as we serve traffic to Yerevan and adjoining countries.

If the Cloudflare datacenter closest to the Equator (to date) was Singapore, the next deployment brings us even closer. Which one do you think it is?

The Cloudflare network today

- The Cloudflare Team

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main operating system in case of compromise. For example, many malware researchers execute malicious code or visit compromise websites inside virtual machines to observe their behavior and contain their impact.One of the main goals of hypervisors like VMware Workstation is to create a barrier between the guest operating system that runs inside the virtual machine and the host OS where the hypervisor runs. That's why VM escape exploits are highly prized, more so than browser or OS exploits.To read this article in full or to leave a comment, please click here

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main operating system in case of compromise. For example, many malware researchers execute malicious code or visit compromise websites inside virtual machines to observe their behavior and contain their impact.One of the main goals of hypervisors like VMware Workstation is to create a barrier between the guest operating system that runs inside the virtual machine and the host OS where the hypervisor runs. That's why VM escape exploits are highly prized, more so than browser or OS exploits.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SREcon17: Brave new world of site reliability engineering

Last week, I was fortunate to participate in SREcon17 Americas, a conference organized by USENIX for site reliability engineers. What’s a site reliability engineer (SRE)? Ben Treynor, founder of Google's site reliability team, once explained it’s "what happens when a software engineer is tasked with what used to be called operations."An important role in the DevOps practice, these engineers concentrate on reliability (of course) and scalability (at amazing levels) in highly distributed systems (microservices multiplying like rabbits). They run some of the largest websites on the planet and are inventing a new field of expertise while they do it.To read this article in full or to leave a comment, please click here