Archive

Category Archives for "Networking"

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division. Morrison & Foerster John Carlin “I think this blending of criminal and national security, whether it’s terrorists or state actors moonlighting as crooks or state actors using criminal groups as a way to distance themselves from the action, I think that is a trend that we saw increasing that’s just going to continue to increase over the next three to five years,” says John Carlin, now an attorney with Morrison & Foerster.To read this article in full or to leave a comment, please click here

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here

Intel, McAfee dispute heads for settlement talks

A dispute between Intel and security expert John McAfee over the use of his name for another company is headed for settlement talks, according to court records.The move comes shortly after the federal court refused John McAfee and MGT Capital Investments, the company to be renamed, a preliminary injunction on Intel’s transfer of marks and related assets containing the word McAfee, as part of a proposed spin-out by the chipmaker of its security business as a separate company that would be called McAfee.The chip company said in September it had signed the agreement with TPG to set up a cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm.To read this article in full or to leave a comment, please click here

Promoting digital accessibility: For persons with disabilities, with persons with disabilities

The United Nations estimates that one in six people (in Asia and the Pacific) live with disability – that is a total of 650 million people. Persons with Disabilities (PWDs) often face barriers that restrict them from participating in society on an equal basis, including the access to, and use of, information and communication technologies (ICTs).

Mr. Naveed Haq

How to watch the Grammy Awards on your iPhone or iPad

This Sunday, Feb. 12 will be a huge night for horror on TV: AMC's The Walking Dead returns at 9PM EST after its mid-season hiatus and the 59th Grammy Awards program in all its self-congratulatory glory kicks off at 8PM EST from Los Angeles. (Though I suppose last Sunday was an even bigger night of horror for those rooting against the New England Patriots in the Super Bowl...)Adele, Beyonce, Justin Bieber, Drake and Sturgill Simpson are all looking to win Record of the Year, while Chuck D, Jack White and Kelly Clarkson will be among performers during the Grammy show. Ample attention will no doubt be given as well to honoring the many famous musicians, such as Prince and David Bowie, who died last year. Late night talk show host and carpool karaoke crooner James Corden emcees the program.To read this article in full or to leave a comment, please click here

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Today’s cautionary tale comes from Verizon’s sneak peek (pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network.Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member’s perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here

University attacked by its own vending machines, smart light bulbs & 5,000 IoT devices

Today’s cautionary tale comes from Verizon’s sneak peek (pdf) of the 2017 Data Breach Digest scenario. It involves an unnamed university, seafood searches, and an IoT botnet; hackers were using the university’s own vending machines and other IoT devices to attack the university’s network.Since the university’s help desk had previously blown off student complaints about slow or inaccessible network connectivity, it was a mess by the time a senior member of the IT security team was notified. The incident is given from that team member’s perspective; he or she suspected something fishy after detecting a sudden big interest in seafood-related domains.To read this article in full or to leave a comment, please click here

Research: BBR: Congestion-Based Congestion Control – ACM Queue

The BBR algorithm appears to be building critical mass of support in the Internet community which makes reading this research paper even more worthwhile.

When bottleneck buffers are small, loss- based congestion control misinterprets loss as a signal
of congestion, leading to low throughput. Fixing these problems requires an alternative to loss-based congestion control. Finding this alternative requires an understanding of where and how network congestion originates.

BBR: Congestion-Based Congestion Control – ACM Queue : http://queue.acm.org/detail.cfm?id=3022184

The post Research: BBR: Congestion-Based Congestion Control – ACM Queue appeared first on EtherealMind.

Opinion – Vendors Please Stop the Mud Slinging!

I’m not known for going on rants but lately I’ve been seeing a lot of stupid tweets from vendors that have really bothered me. So today I’ll give my best Tom Hollingsworth “networkingnerd” impression and tell you what’s on my mind. To give you an example what the vendor marketing teams are putting out there I give you this piece of work:

NSX marketing tweet
NSX marketing tweet

At first it seems a bit cute and funny. Oh look! It’s Star Wars! All nerds love Star Wars! I do too, just to be clear. What this kind of marketing does though is to dumb down the customers. It insults my intelligence as a Network Architect. Hardware still matters. There still is a physical world. Almost all projects in networking has some kind of existing network so almost all deployments are going to be brownfield to some extent. Please show me the organization that does not have an existing network and is going to deploy something like NSX or ACI for their first network. Please show me the organization that has no legacy systems or applications. Please show me the organization that develops and owns all of their applications and they are all nicely Continue reading

Kubernetes CRI and Minikube

Kubernetes CRI(Container runtime interface) is introduced in experimental mode in Kubernetes 1.15 release. Kubernetes CRI introduces a common Container runtime layer that allows for Kubernetes orchestrator to work with multiple Container runtimes like Docker, Rkt, Runc, Hypernetes etc. CRI makes it easy to plug in a new Container runtime to Kubernetes. Minikube project simplifies Kubernetes … Continue reading Kubernetes CRI and Minikube

NSX-V 6.3: Cross-VC NSX Security Enhancements

NSX-V 6.2 introduced the Cross-NSX feature to allow for NSX logical networking and security across multiple vCenter domains. The ability to apply consistent networking and security across vCenter domains provides for mulitple use cases for Cross-VC NSX: workload mobility, resource pooling, multi-site security, ease of automation across sites, and disaster avoidance/recovery. With the recent release of NSX-V 6.3, several enhancements have been added to the Cross-VC NSX feature to provide for additional capabilities and overall robustness of the solution. In this blog post I’ll discuss the new Cross-VC NSX security enhancements in NSX-V 6.3. For additional information on Cross-VC NSX check-out my prior Cross-VC NSX blog posts.

The security enhancements for Cross-VC NSX can be grouped into two categories:

  1. General Enhancements (Apply Across both Active/Active and Active/Standby deployment models)
  2. Enhancements for Active/Standby Use Case

Active/Active and Active/Standby above refers to if the application is active at both sites or if it is active at one site and standby at another site (ex: disaster recovery). Enhancements for both of these respective categories are discussed in more detail below.

1.) General Enhancements (Apply Across both Active/Active and Active/Standby deployment models)

Figure 1: Cross-VC NSX Active/Standby and Active/Active Deployment Model

Figure 1: Cross-VC NSX Active/Standby and Continue reading

A real sweetheart deal for Microsoft Build tickets

Tickets for the Microsoft Build 2017, this year's edition of the annual developers' confab, will go on sale at noon EST/9am PST on Valentine's Day, Feb. 14.If you're interested in going, you should register for a shot at tickets at this Microsoft website. Tickets sold out in about a minute last year. It's not clear how much tickets will cost, but at last year's event in San Francisco, the face value was over $2,000.In a blog post about Build 2017, Microsoft EVP of the Cloud and Enterprise Group Scott Guthrie says this year's gathering in Seattle from May 10-12 is expected to attract more than 5,000 developers, plus millions more via live stream. To read this article in full or to leave a comment, please click here

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.“How will other countries react to the FBI hacking in their jurisdictions without prior consent?” wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI’s hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.To read this article in full or to leave a comment, please click here

Privacy groups claim FBI hacking operation went too far

Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.That’s because the operation involved the FBI hacking 8,700 computers in 120 countries, based on a single warrant, they said.“How will other countries react to the FBI hacking in their jurisdictions without prior consent?” wrote Scarlet Kim, a legal officer with U.K.-based Privacy International.On Friday, that group, along with the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union of Massachusetts, filed briefs in a lawsuit involving the FBI’s hacking operation against Playpen. The child pornography site was accessible through Tor, a browser designed for anonymous web surfing. But in 2014, the FBI managed to take it over.To read this article in full or to leave a comment, please click here

On land and in space, IoT networks can now cover the planet

The whole idea of IoT is to connect more things, including devices far from a company’s data centers or maintenance crews. For enterprises that have things all over the world, vendors and service providers are starting to look at the big picture.At Mobile World Congress later this month, Nokia will show off what it calls WING (worldwide IoT network grid), a virtual global infrastructure that may include multiple private and carrier networks and satellite systems, depending on what an enterprise needs to connect and how it intends to use the data that’s collected.“A global enterprise can actually have what they think is their own virtual network of global connectivity for their IoT devices,” said Phil Twist, vice president of mobile networks marketing & communications, in a briefing this week. WING will be commercially available in the second half of this year.To read this article in full or to leave a comment, please click here

On land and in space, IoT networks can now cover the planet

The whole idea of IoT is to connect more things, including devices far from a company’s data centers or maintenance crews. For enterprises that have things all over the world, vendors and service providers are starting to look at the big picture.At Mobile World Congress later this month, Nokia will show off what it calls WING (worldwide IoT network grid), a virtual global infrastructure that may include multiple private and carrier networks and satellite systems, depending on what an enterprise needs to connect and how it intends to use the data that’s collected.“A global enterprise can actually have what they think is their own virtual network of global connectivity for their IoT devices,” said Phil Twist, vice president of mobile networks marketing & communications, in a briefing this week. WING will be commercially available in the second half of this year.To read this article in full or to leave a comment, please click here