Archive

Category Archives for "Networking"

Cisco, competitors infiltrate Avaya customer doubts

It is not surprising that Cisco, Mitel and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy but sometimes it is a bit startling in its boldness. For example, Cisco wrote: “Let’s not dance around it. Avaya’s recent announcements have put a lot of people into the decision process. Change and uncertainty usually do. So then, what to do next? I’m not bold enough to say, ‘Hey, come on over and write me a check right now.’ That’s not how this works. It’s not an overnight decision. You have to figure out who you trust with your unified communications and customer care solutions. And to get there means asking a lot of questions – and getting the answers you need.”To read this article in full or to leave a comment, please click here

Cisco, competitors infiltrate Avaya customer doubts

It is not surprising that Cisco, Mitel and others are targeting Avaya’s customers as the networking company goes through Chapter 11 bankruptcy but sometimes it is a bit startling in its boldness.For example, Cisco wrote: “Let’s not dance around it. Avaya’s recent announcements have put a lot of people into the decision process. Change and uncertainty usually do. So then, what to do next? I’m not bold enough to say, ‘Hey, come on over and write me a check right now.’ That’s not how this works. It’s not an overnight decision. You have to figure out who you trust with your unified communications and customer care solutions. And to get there means asking a lot of questions – and getting the answers you need.”To read this article in full or to leave a comment, please click here

NANOG 69

Few parts of the Domain Name System are filled with such levels of mythology as its root server system. Here I'd like to try and explain what it is all about and ask the question whether the system we have is still adequate, or if it's time to think about some further changes.

Verizon revives its unlimited data plan after purging legacy unlimited data plan users

Verizon is just full of surprises. Over the past year, Verizon went negative on its legacy unlimited data customers by purging anyone using too much data. Now, the company wants more unlimited data customers—at least up to a point. Starting Monday, you can sign up for the company’s new unlimited data plan, called Verizon Unlimited.For $80 a month, Verizon customers receive unlimited 4G data on a single smartphone. Anyone with multiple devices can add two lines on Verizon Unlimited for $70 per line per month ($140 total), three for $54 ($162 total) per line, or four for $45 ($180 total) per line.To read this article in full or to leave a comment, please click here

Tim Cook: Augmented reality is the future, and fake news is ruining everything

While Apple CEO Tim Cook is looking forward to his company’s next big idea, which sounds like it’s going to be augmented reality-related, he’s also stunned by the tech industry’s inability to stem the tide of fake news.In between tours of schools and meetings with developers in a trip to Britain, Cook spoke excitedly about the potential of AR in Apple devices to The Independent, and was equally impassioned about the scourge of fake news in comments to The Telegraph.To read this article in full or to leave a comment, please click here

Blocking a DDoS Upstream

In the first post on DDoS, I considered some mechanisms to disperse an attack across multiple edges (I actually plan to return to this topic with further thoughts in a future post). The second post considered some of the ways you can scrub DDoS traffic. This post is going to complete the basic lineup of reacting to DDoS attacks by considering how to block an attack before it hits your network—upstream.

The key technology in play here is flowspec, a mechanism that can be used to carry packet level filter rules in BGP. The general idea is this—you send a set of specially formatted communities to your provider, who then automagically uses those communities to create filters at the inbound side of your link to the ‘net. There are two parts to the flowspec encoding, as outlined in RFC5575bis, the match rule and the action rule. The match rule is encoded as shown below—

There are a wide range of conditions you can match on. The source and destination addresses are pretty straight forward. For the IP protocol and port numbers, the operator sub-TLVs allow you to specify a set of conditions to match on, and whether to AND the Continue reading

The Importance of Carrier-grade VNFs

GENBAND Sanjay Bhatia Interview Serving as Vice President of Solutions Marketing and Strategy for GENBAND, Sanjay Bhatia oversees the company’s product marketing organization and alignment of GENBAND’s go-to-market strategy across different market segments including NFV, Cloud, Enterprise Unified Communications, MSO, and Wireless. Bhatia is an accomplished telecommunications professional with over 28 years of wide-ranging global experience. Bhatia has held... Read more →

Recent malware attacks on Polish banks tied to wider hacking campaign

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries.Researchers from Symantec and BAE Systems linked the malware used in the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering hole attacks. They then injected code into them that redirected visitors to a custom exploit kit.To read this article in full or to leave a comment, please click here

Recent malware attacks on Polish banks tied to wider hacking campaign

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries.Researchers from Symantec and BAE Systems linked the malware used in the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering hole attacks. They then injected code into them that redirected visitors to a custom exploit kit.To read this article in full or to leave a comment, please click here

Most Americans with knowledge of employer’s cybersecurity wouldn’t want to be a customer

Today Kaspersky Lab and HackerOne released the report, “Hacking America: Cybersecurity Perception.” Some of its revelations include that most Americans wouldn’t want to be a customer of their employers since they don’t trust their employers to protect their personal data; also, almost half the people surveyed think America is more vulnerable to cyber-espionage/nation-sponsored cyberattacks with Donald Trump as president.The study, based on answers provided by 5,000 US adults who were surveyed in December 2016, revealed that despite all the cybersecurity news coverage, American consumers and businesses still need a better understanding of cyberthreats and how to protect their personal and sensitive business data online.To read this article in full or to leave a comment, please click here

Most Americans with knowledge of employer’s cybersecurity wouldn’t want to be a customer

Today Kaspersky Lab and HackerOne released the report, “Hacking America: Cybersecurity Perception.” Some of its revelations include that most Americans wouldn’t want to be a customer of their employers since they don’t trust their employers to protect their personal data; also, almost half the people surveyed think America is more vulnerable to cyber-espionage/nation-sponsored cyberattacks with Donald Trump as president.The study, based on answers provided by 5,000 US adults who were surveyed in December 2016, revealed that despite all the cybersecurity news coverage, American consumers and businesses still need a better understanding of cyberthreats and how to protect their personal and sensitive business data online.To read this article in full or to leave a comment, please click here

Intel now supports Vulkan on Windows 10 PCs

Intel is bringing more options to improve gaming and virtual reality experiences on Windows PCs with official support for Vulkan APIs (application programming interfaces).Vulkan is similar to DirectX 12 and can be used for many applications, but it is most relevant to visual applications like games.Games and VR applications written in Vulkan will work with GPUs integrated into Intel's 7th Generation chips code-named Kaby Lake and 6th Generation chips code-named Skylake. It will also support the Intel HD Graphics 505 GPU in Pentium chips code-named Apollo Lake.To read this article in full or to leave a comment, please click here

Apple joins Wireless Power Consortium, charging up iPhone 8 rumor

Apple has joined the consortium behind the Qi wireless charging system, supercharging rumors that owners of future an iPhone could live tangle-free.Last week, a financial analyst claimed Apple will release three new iPhones with wireless charging capabilities this year, reviving an on-again, off-again rumor about the next-generation iPhone's capabilities.The appearance of Apple's name on the membership list of the Wireless Power Consortium, Qi's creator, over the last week adds credence to that rumor. Its name was not on the list cached by Google's search engine last Tuesday.To read this article in full or to leave a comment, please click here

Storage tank operator turns to IoT for energy savings

Royal Vopak N.V. is a leading independent tank storage provider for the oil and chemical industries, operating 67 terminals in 25 countries. Chris Sheldon, Terminal Manager for the company’s operation in Savannah, GA, recently oversaw the implementation of an Internet of Things deployment that is enabling the terminal to minimize energy usage, which should lead to significant cost savings.  Sheldon shared the story with Network World Editor in Chief John Dix. Vopak Chris Sheldon, Terminal Manager, Vopak Terminal Savannah, Inc.To read this article in full or to leave a comment, please click here

Extreme, NRG Stadium score big with Super Bowl Wi-Fi performance

Super Bowl LI will be remembered for a number of things. The Patriots had the largest comeback in Super Bowl history. Like all Atlanta sports teams, the Falcons choked when it mattered most. Also, Tom Brady won his fifth Super Bowl to cement his place as the second greatest QB of all time, behind the illustrious Joe Montana. More importantly though, Super Bowl LI was the most connected and engaged sporting event to date, as the fans in NRG Stadium in Houston appeared to be very busy using their phones to take pictures, Tweet, Facebook, send messages and other activities. A year ago, I wrote a post about how the network performed for Super Bowl 50, so I thought it would be worth looking at how things changed between then and now. To read this article in full or to leave a comment, please click here

Extreme, NRG Stadium score big with Super Bowl Wi-Fi performance

Super Bowl LI will be remembered for a number of things. The Patriots had the largest comeback in Super Bowl history. Like all Atlanta sports teams, the Falcons choked when it mattered most. Also, Tom Brady won his fifth Super Bowl to cement his place as the second greatest QB of all time, behind the illustrious Joe Montana. More importantly though, Super Bowl LI was the most connected and engaged sporting event to date, as the fans in NRG Stadium in Houston appeared to be very busy using their phones to take pictures, Tweet, Facebook, send messages and other activities. A year ago, I wrote a post about how the network performed for Super Bowl 50, so I thought it would be worth looking at how things changed between then and now. To read this article in full or to leave a comment, please click here