Archive

Category Archives for "Networking"

Arista gets important win over Cisco in patent battle

In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista’s site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista’s redesigned products do not infringe the ’592, ’145, or ’537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here

Arista gets important win over Cisco in patent battle

In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista’s site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista’s redesigned products do not infringe the ’592, ’145, or ’537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here

Arista gets important win over Cisco in patent battle

In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista’s site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista’s redesigned products do not infringe the ’592, ’145, or ’537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here

Dallas blames hacker for setting off all 156 emergency warning sirens

Imagine it being nearly midnight and the emergency warning sirens start wailing and continue to scream for about an hour and a half. That’s what happened in Dallas on Friday; at 11:42 p.m., the city’s 156 emergency sirens blasted out warnings and continued to wail until 1:17 a.m. on Saturday. Dallas officials claim the siren warning system was hacked and it was one of the largest breaches of an emergency siren system.At first, a city spokesperson blamed the blaring sirens on a “system malfunction.” The 1.6 million people in the city were asked to stop calling 911 because there was no emergency. The normal wait time for a 911 call in Dallas is reportedly 10 seconds, but at one point the 911 system was so clogged with calls that the wait time stretched to six minutes.To read this article in full or to leave a comment, please click here

Dallas blames hacker for setting off all 156 emergency warning sirens

Imagine it being nearly midnight and the emergency warning sirens start wailing and continue to scream for about an hour and a half. That’s what happened in Dallas on Friday; at 11:42 p.m., the city’s 156 emergency sirens blasted out warnings and continued to wail until 1:17 a.m. on Saturday. Dallas officials claim the siren warning system was hacked and it was one of the largest breaches of an emergency siren system.At first, a city spokesperson blamed the blaring sirens on a “system malfunction.” The 1.6 million people in the city were asked to stop calling 911 because there was no emergency. The normal wait time for a 911 call in Dallas is reportedly 10 seconds, but at one point the 911 system was so clogged with calls that the wait time stretched to six minutes.To read this article in full or to leave a comment, please click here

Startup founded by FireEye alum goes after FireEye

A former FireEye engineer has kicked off a startup whose machine learning and artificial intelligence technologies will compete against his former employer’s threat-prevention platforms.SlashNext makes Active Cyber Defense System, a service with a cloud-based learning component that can detect data exfiltration, malware, exploits and social engineering attacks, says the company’s founder and CEO Atif Mushtaq. SlashNext SlashNext CEO Atif Mushtaq: "The system has a low false positive rate."To read this article in full or to leave a comment, please click here

Startup founded by FireEye alum goes after FireEye

A former FireEye engineer has kicked off a startup whose machine learning and artificial intelligence technologies will compete against his former employer’s threat-prevention platforms.SlashNext makes Active Cyber Defense System, a service with a cloud-based learning component that can detect data exfiltration, malware, exploits and social engineering attacks, says the company’s founder and CEO Atif Mushtaq. SlashNext SlashNext CEO Atif Mushtaq: "The system has a low false positive rate."To read this article in full or to leave a comment, please click here

Site News: RSS Feed Update

Do to ongoing problems with RSS feed hosting from Feedblitz, I am migrating the RSS feed to a new provider on Wednesday, 12 Apr 2017.

This may cause previously ‘read’ articles in your RSS feed to show as new. Its depends on how your RSS Reader the articles as “new” and what criteria they use to detect new/read.

Apologies in advance for the inconvenience but cannot continue with the unpredictable service, poor support and low quality website that Feedblitz has delivered over the last six months.

The RSS subscription is URL is unchanged http://feeds.etherealmind.com/etherealmind which should require no changes on your part.

The post Site News: RSS Feed Update appeared first on EtherealMind.

iPhone 8 price may be cheaper than you think

Apple's upcoming iPhone 8 is poised to be a complete game-changer. After years of keeping the iPhone form factor more or less unchanged, the iPhone 8 will likely feature an edgeless OLED display with a Touch ID sensor embedded into the screen itself. Additionally, it's widely believed that the iPhone 8 will offer up improved water resistance, faster internals, wireless charging, facial recognition software and much more.While nothing is ever a guarantee until Apple makes it official, there's good reason to believe that the iPhone 8 will represent one of the biggest leap forwards in iPhone technology we've seen in years. Having said that, there have been a number of interesting rumors regarding the iPhone 8's retail price over the past few weeks.To read this article in full or to leave a comment, please click here

Converge your network with explicit congestion notification

Every now and again, we like to highlight a piece of technology or solution featured in Cumulus Linux that we find especially useful. Priority Flow Control (PFC) and Explicit Congestion Notification (ECN) are exactly such things. In short, these technologies allow you to converge networks and save money. By supporting lossless or near lossless Ethernet, you can now run applications such as RDMA over Converged Ethernet (RoCE) or RoCEv2 over your current data center infrastructure. In this post, we’ll concentrate on the end-to-end solution for RoCEv2 – ECN and how it can help you optimize your network. We will cover PFC in a future post.

What is explicit congestion notification?

ECN is a mechanism supported by Cumulus Linux that helps provide end-to-end lossless communication between two endpoints over an IP routed network. Normally, protocols like TCP use dropped packets to indicate congestion, which then tells the sender to “slow down’. Explicit congestion notification uses this same concept, but instead of dropping packets after the queues are completely full, it notifies the receiving host that there was some congestion before the queues are completely full, thereby avoiding dropping traffic. It uses the IP layer (ECN bits in the IP TOS header) Continue reading

EP13: Colin McNamara DevOps expert and cloud architect shares with us on how to secure your future in IT!

Colin McNamara is the Founder and Principle Consultant at Farkley, where he helps Companies, Communities and Individuals succeed in a world be transformed by next generation technologies.  Previously he was running DevOps at Dimension Data and has been a very early adopter of the practice. His expertise is around SDN, DevOps, and is an OpenStack ambassador.

Sponsor: www.zerotoEngineer.com – Level up and become a full stack network engineer!

Your favorite quote?
The difficult we do immediately, the impossible just takes a little longer – U.S. Navy Seabeas

Continue reading

The iCloud hackers’ bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus. The Turkish Crime Family grabbed headlines last month by claiming they had the stolen login credentials for more than 700 million icloud.com, me.com and mac.com accounts. They demanded increasing ransoms from Apple while threatening to wipe the data from devices connected to the affected accounts if it did not.On Friday, the hackers tweeted that they had been paid US$480,000 in bitcoin. As proof, the group posted a link showing a transaction on Blockchain.info, a popular bitcoin wallet.  To read this article in full or to leave a comment, please click here

The iCloud hackers’ bitcoin ransom looks like a fake

A group of hackers who claimed to hold millions of iCloud accounts for ransom said on Friday they'd been paid. But one bitcoin expert says that's bogus. The Turkish Crime Family grabbed headlines last month by claiming they had the stolen login credentials for more than 700 million icloud.com, me.com and mac.com accounts. They demanded increasing ransoms from Apple while threatening to wipe the data from devices connected to the affected accounts if it did not.On Friday, the hackers tweeted that they had been paid US$480,000 in bitcoin. As proof, the group posted a link showing a transaction on Blockchain.info, a popular bitcoin wallet.  To read this article in full or to leave a comment, please click here

US Department of Labor accuses Google of underpaying women

The U.S. Department of Labor says Google discriminates against female employees in pay at a level that's even worse than the tech industry as a whole.The department has found "systemic compensation disparities against women pretty much across the entire workforce," Labor Department Regional Director Janette Wipper testified in a court in San Francisco on Friday, according to a report by The Guardian. Janet Herold, the department's regional solicitor, told the Guardian that pay discrimination against women was extreme.Wipper said that the DoL found pay disparities in a snapshot of salaries from 2015, according to the Guardian.To read this article in full or to leave a comment, please click here

University finds Proactive Security and PCI Compliance through NSX

The University of Pittsburgh is one of the oldest institutions in the country, dating to 1787 when it was founded as the Pittsburgh Academy. The University has produced the pioneers of the MRI and the television, winners of Nobel and Pulitzer prizes, Super Bowl and NBA champions, and best-selling authors.

As with many businesses today, the University continues to digitize its organization to keep up with the demands of over 35,000 students, 5,000 faculty, and 7,000 staff across four campuses. While the first thing that comes to mind may be core facilities such as classrooms, this also includes keeping up with the evolving technology on the business side of things, such as point-of-sale (POS) systems. When a student buys a coffee before studying or a branded sweatshirt for mom using their student ID, those transactions must be facilitated and secured by the University.

What does it mean to secure financial transactions? For one, just as with a retail store operation, the University must achieve PCI compliance to facilitate financial transactions for its customers. What does this mean? Among other tasks, PCI demands that the data used by these systems is completely isolated from other IT operations. However, locking everything down Continue reading

DNS Glitch

Had a DNS glitch mid morning ET in switching some configurations around. It should be back up and running now, and rule11.tech should be coming up as a secondary domain soon’ish.

The post DNS Glitch appeared first on 'net work.

What one company learned from testing Intel’s superfast Optane SSDs

Intel's large-capacity Optane is like the Ferrari of storage: It's super fast, it's cool and it's expensive.Also, it isn't for everyone yet. That was reiterated by Intel when it introduced its first large capacity SSD, the Optane SSD DC P4800X, last month.The 375GB DC P4800X is aimed at high-end applications. Optane is also available as low-capacity cache storage on motherboards, allowing Windows 10 and other applications to load faster.Before release, Intel gave Optane SSDs to a select few customers who had a chance to get their hands dirty with the new technology for longer than a year. The testers included Facebook, IBM, Lenovo, and database company Aerospike, which believes Optane could unite DRAM and SSDs. To read this article in full or to leave a comment, please click here

Show 334: Illumio & Adaptive Security (Sponsored)

In today s sponsored podcast we talk with Illumio about its Adaptive Security Platform. Illumios approach is to drive filtering and enforcement using adaptive segmentation technology that adjusts security policies in real time to changes in your network. The post Show 334: Illumio & Adaptive Security (Sponsored) appeared first on Packet Pushers.

Microsoft launches Windows 10 beta program for business users

Business users get access to their own version of the Windows 10 beta program this week. On Friday, Microsoft unveiled the Windows Insider Program for Business, alongside its first post-Creators Update Windows 10 beta.The program will let business users sign up for beta updates with their Azure Active Directory credentials, rather than a personal Microsoft account. The new feature is designed to provide IT professionals with a path for giving Microsoft business-specific feedback on Windows 10 features. That, in turn, should help business users shape feature development.To read this article in full or to leave a comment, please click here