Archive

Category Archives for "Networking"

FAQ: What just happened to online privacy?

The internet sure seems mad about something.You’re not kidding.More than usual, that is.You’re right. President Trump just signed a bill into law that rolls back internet privacy protections enacted by the previous administration, and that has made things just a little angry around the ol’ internet.What kind of privacy rules are we talking about here?The previous iteration of the Federal Communications Commission created new rules last October for ISPs which stipulated that those ISPs would be required to seek customer permission before selling things like browser history data to advertisers for targeting purposes.To read this article in full or to leave a comment, please click here

Developer-Ready Infrastructure: NSX and Pivotal

Organizations across industries are embarking on their journey of Digital Transformation. Time-to-market has become very crucial to the bottom-line and companies need to accelerate their application/services delivery and go from concept to production in record time.

Organizations are embracing containers, micro-service based architectures, Continuous Delivery and Integration tools as they are completely trying to change how they develop, deploy and deliver applications.

However, moving from monolith application architectures to microservices-based ones is no ordinary feat.

Many of these organizations leverage Pivotal’s expertise to deliver a modern application development environment. Pivotal’s flagship cloud-native platform Pivotal Cloud Foundry provides a modern app-centric environment that lets developers focus on delivering applications with speed and frequency of delivery. To find out more about Pivotal Cloud Foundry, and the now generally available Pivotal Cloud Foundry 1.10.

Pivotal Cloud Foundry abstracts the underlying IaaS layer so that developers get a modern self-service application development environment, without worrying about the infrastructure. BOSH vSphere CPI plugin does a good job of consuming pre-created networks.

However, the truth is – “someone” always needs to do some provisioning – networks need to be carved out, load-balancers need to be configured, NAT rules need to be defined, reachability needs to Continue reading

Turn an old Wi-Fi network into a wireless mesh

I’ve tested a lot of Wi-Fi mesh (aka whole-home coverage systems) products lately, but what if you already have a good Wi-Fi router and don’t want to do a rip-and-replace job? There’s a new device available aimed just at this purpose.The AmpliFi HD Mesh Point, by Ubiquiti Labs, lets you create a mesh system with an existing Wi-Fi router. The device acts like one of the company’s satellite units on its existing AmpliFi HD Mesh System to expand Wi-Fi coverage within your home. If you happen to own the company’s mesh router and satellites, the Mesh Point can expand the existing network even more.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Portworx shows how its done—raises an impressive B funding round

There is significant enterprise interest in moving away from a server-centric application approach and instead exploring containers. While Docker, the company possibly most synonymous with containers, has struggled to gain the sort of traction that justifies its stellar valuation, that doesn’t call into question containerization per se. There is clearly an opportunity here, and it is incumbent on vendors to find their market fit, develop realistic objectives, and execute, execute, execute.INSIDER Review: Container Wars: Rocket v. Odin v. Docker And so it is for the vendors filling in the whitespaces around the container ecosystem. Weaveworks is a good example of such a company. Weaveworks is helping to solve many of the networking issues around the production use of containers. Another area that is problematic is around data services—the move to containers makes life more complex from a data storage perspective. Two companies, ClusterHQ and Portworx, were involved in this space.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hacking for the greater good

In Jason’s last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries’ main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hacking for the greater good

In Jason’s last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries’ main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here

10 things to worry about when your vendor divests

Potentially difficult timesImage by ThinkstockIn tech, divestitures are a fact of life and solutions are bought and sold all the time. But that doesn’t change the fact that when it happens to a solution that your company uses, it can make things difficult for you. Although your vendor’s divestiture is out of your control, you can at least do your due diligence in limiting any negative impact to your company. With that in mind, ZL Technologies lists 10 things you should worry about if your vendor divests.To read this article in full or to leave a comment, please click here

Facebook appeal over New York search warrants fails

Facebook’s appeal against 381 warrants for information from the accounts of its users was rejected by a New York court on the ground that earlier orders refusing to quash the warrants issued in a criminal proceeding could not be appealed.The decision by the New York State Court of Appeals did not address key issues of whether the broad searches were unconstitutional, and whether internet service providers like Facebook have standing to challenge such warrants on behalf of their users, particularly when they are served with ‘gag orders’ that prevent providers from informing subscribers about the warrants.“This case undoubtedly implicates novel and important substantive issues regarding the constitutional rights of privacy and freedom from unreasonable search and seizure, and the parameters of a federal statute establishing methods by which the government may obtain certain types of information,” wrote Judge Leslie E. Stein, writing for the majority.To read this article in full or to leave a comment, please click here

Facebook appeal over New York search warrants fails

Facebook’s appeal against 381 warrants for information from the accounts of its users was rejected by a New York court on the ground that earlier orders refusing to quash the warrants issued in a criminal proceeding could not be appealed.The decision by the New York State Court of Appeals did not address key issues of whether the broad searches were unconstitutional, and whether internet service providers like Facebook have standing to challenge such warrants on behalf of their users, particularly when they are served with ‘gag orders’ that prevent providers from informing subscribers about the warrants.“This case undoubtedly implicates novel and important substantive issues regarding the constitutional rights of privacy and freedom from unreasonable search and seizure, and the parameters of a federal statute establishing methods by which the government may obtain certain types of information,” wrote Judge Leslie E. Stein, writing for the majority.To read this article in full or to leave a comment, please click here

Kansas City: Cloudflare’s 106th Data Center Now Live

CC-BY 2.0 image by Vincent Parsons

Kansas City, Missouri. Home to the Kansas City Royals, Swope Park, over 100 barbeque restaurants, and now, Cloudflare's 106th data center. We are excited to help make 6 million websites even faster in the Midwest, as our newest deployment joins existing United States facilities in Ashburn, Atlanta, Boston, Chicago, Dallas, Denver, Las Vegas, Los Angeles, Miami,
Minneapolis, Nashville, Newark, Omaha, Philadelphia, Phoenix, San Jose, Seattle, St. Louis, and Tampa.

BBQ!

CC-BY 2.0 image by Shelby Bell

Anthony Bourdain said it best with regards to Joe's KC BBQ in his "13 Places to Eat Before You Die" (alongside Michelin 3-star restaurants like French Laundry and Le Bernardin):

"People may disagree on who has the best BBQ. Here, the brisket (particularly the burnt ends), pulled pork, and ribs are all of a quality that meet the high standards even of Kansas City natives. It's the best BBQ in Kansas City, which makes it the best BBQ in the world."

Visit Kansas City to find the world’s largest shuttlecocks outside the Nelson Atkins Art Museum, as Continue reading

Cisco says Arista’s redesign moves not good enough

The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently,   in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here

Cisco says Arista’s redesign moves not good enough

The legal battle between Cisco and Arista is heating up as the two sides square off again in court this week in a hearing about their technology patent infringement and enforcement case.This hearing is the latest round in an ongoing battle that began in 2014. Most recently,   in January the U.S. Customs and Border Protection (CBP) agency revoked its November 2016 finding that Arista’s redesigned products don’t infringe a key Cisco patent -- as a result Cisco called on Arista to stop importing those products and recall others sold with redesigned software.To read this article in full or to leave a comment, please click here