Archive

Category Archives for "Networking"

Musing: ITC rejects de facto standard defense (337-TA-944, Cisco v. Arista) | Essential Patent Blog

Detailed but accessible legal review of Cisco vs Arista case. Dated July 2016 so it doesn’t cover the latest developments but provides a lot of insight into the legal.

My current view on this issue:

  1. Cisco is validating Arista as a serious, viable competitor. On balance, Arista gets more out of this than Cisco does and doing a nice job of being the under dog.
  2. Rumours suggest that its personal matter to attack Arsita for some executives and not a business matter.
  3. Customers perceive Cisco as wasting time and energy on legal matters instead of innovating new products or improving product quality.
  4. Customers money is being wasted on lawyers instead of solutions.

In December 2015, Cisco Systems, Inc. (Cisco) filed a complaint alleging that certain network devices (switches) imported by Arista Networks, Inc. (Arista) infringed several Cisco patents directed to computer networks.  Arista raised several equitable defenses based, in part, on allegations that Cisco submitted a request for comments document RFC 5517 to IETF and promoted RFC 5517 to the public generally as an “informal standard” for private virtual local area networks (PVLANs) for which Cisco would not assert its patents or would license on fair, reasonable and non-discriminatory (FRAND) Continue reading

Cyber scum suckers hit cancer agency with ransomware, threaten to contact families

Some cyber scum suckers sunk to an all-time low, hitting an Indiana Cancer Services agency with ransomware before threatening “to contact family members of living and deceased cancer clients, donors and community partners” if the $43,000 ransom was not paid.Cancer Services of East Central Indiana-Little Red Door, an independent, non-profit agency based in Muncie, Indiana, became a victim of a ransomware attack a week ago. This is an organization whose goals include helping to “reduce the financial and emotional burdens of those dealing with a cancer diagnosis.”The attackers did not leave the traditional ransom demand note, oh no, but chose to personally reach out to the agency’s executive director, president and vice president to make the extortion demands clear. This makes it seem more like a targeted attack and less of one that was a result of opportunity. It is also at least the second time that week that attackers attempted to ransom sensitive patient information.To read this article in full or to leave a comment, please click here

Windows 10 peeping: Microsoft fails to understand the uproar

I’ve been covering Microsoft Windows since the 1980s. There have been several regime changes, each with its own distinct ego. Some regimes listened eagerly, some didn’t. This one is failing, but I believe the current fingers-in-the-ears stance are related more to revenue than to ideology. Microsoft wants data about you. To do so, Windows 10 is riddled with phone-home messaging. Some sites document dozens of IP addresses and add even more DNS calls for your machine’s data. We’re told that the data isn’t personally identifiable and that it’s used to improve QA. No one said Microsoft didn’t need QA. New versions of Windows have always had holes big enough to fly airliners through, but Microsoft finally got some sense when in Windows XP SP2 and Vista, they demoted user space. Finally. To read this article in full or to leave a comment, please click here

Cyber scum suckers hit cancer agency with ransomware, threaten to contact families

Some cyber scum suckers sunk to an all-time low, hitting an Indiana Cancer Services agency with ransomware before threatening “to contact family members of living and deceased cancer clients, donors and community partners” if the $43,000 ransom was not paid.Cancer Services of East Central Indiana-Little Red Door, an independent, non-profit agency based in Muncie, Indiana, became a victim of a ransomware attack a week ago. This is an organization whose goals include helping to “reduce the financial and emotional burdens of those dealing with a cancer diagnosis.”The attackers did not leave the traditional ransom demand note, oh no, but chose to personally reach out to the agency’s executive director, president and vice president to make the extortion demands clear. This makes it seem more like a targeted attack and less of one that was a result of opportunity. It was also at least the second time that week that attackers attempted to ransom sensitive patient information.To read this article in full or to leave a comment, please click here

DARPA wants to simulate how social media spreads info like wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn.That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information.+More on Network World: DARPA: Show us how to weaponize benign technologies+To read this article in full or to leave a comment, please click here

DARPA wants to simulate how social media spreads info like wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn.That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information.+More on Network World: DARPA: Show us how to weaponize benign technologies+To read this article in full or to leave a comment, please click here

Review: Linksys Velop a solid choice in wireless mesh space

It’s been interesting to see how longtime home wireless vendors have been approaching the new wireless mesh market, in which startup products like Eero, Luma, AmpliFi and Almond have hit the scene – in addition to Google, which doesn’t qualify as a startup, but is new to the Wi-Fi market.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security principles from Homeland Security

Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs.The danger is real. The U.S. Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” The report explains why security has to be a combined effort.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT security principles from Homeland Security

Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs.The danger is real. The U.S. Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” The report explains why security has to be a combined effort.To read this article in full or to leave a comment, please click here

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.The majority of the fixes are for flaws in business products such as Oracle E-Business Suite, Oracle Fusion Middleware, Oracle PeopleSoft, Oracle Retail Applications, Oracle JD Edwards, Oracle Supply Chain Products and Oracle Database Server.E-Business Suite, which is used by companies to store key data and manage a wide range of business processes, accounts for more than 40 percent of the patched vulnerabilities -- 121. Out of these, 118 are remotely exploitable and the highest rated one has a score of 9.2 (critical) in the Common Vulnerability Scoring System.To read this article in full or to leave a comment, please click here

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year, fixing 270 vulnerabilities, mostly in business-critical applications. Many of the flaws can be exploited remotely without authentication.The majority of the fixes are for flaws in business products such as Oracle E-Business Suite, Oracle Fusion Middleware, Oracle PeopleSoft, Oracle Retail Applications, Oracle JD Edwards, Oracle Supply Chain Products and Oracle Database Server.E-Business Suite, which is used by companies to store key data and manage a wide range of business processes, accounts for more than 40 percent of the patched vulnerabilities -- 121. Out of these, 118 are remotely exploitable and the highest rated one has a score of 9.2 (critical) in the Common Vulnerability Scoring System.To read this article in full or to leave a comment, please click here

Big Switch brings agility, scale to network packet brokers

Complexity in data centers has grown exponentially with the introduction of new technologies to scale IT infrastructure to keep pace with business demands. This dynamic has caused IT departments to seek out new tools to help manage and secure complex IT environments in modern data centers. The broad adoption of these tools has created new, arduous challenges, including the difficulty of managing various network connections and monitoring specific traffic flows at scale. Leading-edge IT organizations have started adopting software-based network packet broker (NPB) solutions to solve these complex IT challenges with increased agility and flexibility. To read this article in full or to leave a comment, please click here

Big Switch brings agility, scale to network packet brokers

Complexity in data centers has grown exponentially with the introduction of new technologies to scale IT infrastructure to keep pace with business demands. This dynamic has caused IT departments to seek out new tools to help manage and secure complex IT environments in modern data centers. The broad adoption of these tools has created new, arduous challenges, including the difficulty of managing various network connections and monitoring specific traffic flows at scale. Leading-edge IT organizations have started adopting software-based network packet broker (NPB) solutions to solve these complex IT challenges with increased agility and flexibility. To read this article in full or to leave a comment, please click here

5 ways to recruit more women in 2017

Companies, especially in technology, are pulling out all the stops to recruit and retain women: fertility benefits, shipping breast milk home from work trips, in-office massages and manicures, on-site OB/GYNs, the ability to travel with children and a care-giver and feminine products in the restrooms are just a few of the ways companies are getting creative with trying to appeal to women.But while these perks might be appreciated, they're not the fundamental drivers of women's decisions to come on board with your company -- or to stick around, says Ursula Mead, co-founder and CEO of InHerSight, an employee ratings and review site for women.To read this article in full or to leave a comment, please click here

Trump administration threatens net neutrality, cloud and IoT

Businesses could lose their choice of cloud services and applications if the incoming administration or the new congress rolls back net neutrality rules, Tom Wheeler, the outgoing chair of the Federal Communications Commission, warned in his final planned speech before stepping down.Identifying the 2015 open Internet order as one of his signature policy achievements, Wheeler positioned the FCC's net neutrality regulation, which bars ISPs from blocking or slowing transmissions on their networks, as a needed protection for consumers and businesses alike."As everything goes into the cloud, the ability to access the cloud free of gatekeepers is essential. If ISPs get to choose which applications and clouds work better than others in terms of access, speed and latency, they will control the cloud future," Wheeler said.To read this article in full or to leave a comment, please click here

Trump administration threatens net neutrality, cloud and IoT

Businesses could lose their choice of cloud services and applications if the incoming administration or the new congress rolls back net neutrality rules, Tom Wheeler, the outgoing chair of the Federal Communications Commission, warned in his final planned speech before stepping down.Identifying the 2015 open Internet order as one of his signature policy achievements, Wheeler positioned the FCC's net neutrality regulation, which bars ISPs from blocking or slowing transmissions on their networks, as a needed protection for consumers and businesses alike."As everything goes into the cloud, the ability to access the cloud free of gatekeepers is essential. If ISPs get to choose which applications and clouds work better than others in terms of access, speed and latency, they will control the cloud future," Wheeler said.To read this article in full or to leave a comment, please click here