Archive

Category Archives for "Networking"

DIY vs. fully integrated Hadoop – What’s best for your organization?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.You don’t have to look far to see the amazing things that organizations are doing with big data technology: pulling information from past transactions, social media and other sources to develop 360-degree views of their customers. Analyzing thousands of processes to identify causes of breakdowns and inefficiencies. Bringing together disparate data sources to uncover connections that were never recognized before. All of these innovations, and many more, are possible when you can collect information from across your organization and apply data science to it. But if you’re ready to make the jump to big data, you face a stark choice: should you use a pre-integrated “out-of-the-box” platform? Or should you download open-source Hadoop software and build your own?To read this article in full or to leave a comment, please click here

DIY vs. fully integrated Hadoop – What’s best for your organization?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

You don’t have to look far to see the amazing things that organizations are doing with big data technology: pulling information from past transactions, social media and other sources to develop 360-degree views of their customers. Analyzing thousands of processes to identify causes of breakdowns and inefficiencies. Bringing together disparate data sources to uncover connections that were never recognized before. 

All of these innovations, and many more, are possible when you can collect information from across your organization and apply data science to it. But if you’re ready to make the jump to big data, you face a stark choice: should you use a pre-integrated “out-of-the-box” platform? Or should you download open-source Hadoop software and build your own?

To read this article in full or to leave a comment, please click here

Black market medical record prices drop to under $10, criminals switch to ransomware

The black market value of stolen medical records dropped dramatically this year, and criminals shifted their efforts from stealing data to spreading ransom ware, according to a report released this morning.Hackers are now offering stolen records at between $1.50 and $10 each, said Anthony James, CMO at San Mateo, Calif.-based security firm TrapX, the company that produced the report.That down a bit since this summer, when a hacker offered 10 million patient records for about $820,000 -- or about $12 per record -- and even a bigger drop from 2012, when the World Privacy Forum put the street value of medical records at around $50 each.To read this article in full or to leave a comment, please click here

Black market medical record prices drop to under $10, criminals switch to ransomware

The black market value of stolen medical records dropped dramatically this year, and criminals shifted their efforts from stealing data to spreading ransom ware, according to a report released this morning.Hackers are now offering stolen records at between $1.50 and $10 each, said Anthony James, CMO at San Mateo, Calif.-based security firm TrapX, the company that produced the report.That down a bit since this summer, when a hacker offered 10 million patient records for about $820,000 -- or about $12 per record -- and even a bigger drop from 2012, when the World Privacy Forum put the street value of medical records at around $50 each.To read this article in full or to leave a comment, please click here

Announcing EVPN for scalable virtualized networks

This post was updated on 2/22/17 to reflect the official launch of EVPN. You can now access EVPN in general availability. Read the white paper to learn more about this exciting new feature.

When we set out to build new features for Cumulus Linux, we ask ourselves two questions: 1) How can we make network operators’ jobs easier? And 2) How can we help businesses use web-scale IT principles to build powerful, efficient and highly-scalable data centers? With EVPN, we believe we nailed both.

Why EVPN?

Many data centers today rely on layer 2 connectivity for specific applications and IP address mobility. However, an entire layer 2 data center can bring challenges such as large failure domains, spanning tree complexities, difficulty troubleshooting, and scale challenges as only 4094 VLANS are supported.

Therefore, modern data centers are moving to a layer 3 fabric, which means running a routing protocol, such as BGP or OSPF between the leaf and spine switches. In order to provide layer 2 connectivity, between hosts and VMs on different racks as well as maintain multi-tenant separation, layer 2 overlay solution is deployed such as VXLAN. However, VXLAN does not define a control plane to learn and exchange Continue reading

The group that hacked the DNC infiltrated Ukrainian artillery units

The cyberespionage group blamed for hacking into the U.S. Democratic National Committee (DNC) earlier this year has also infiltrated the Ukrainian military through a trojanized Android application used by its artillery units.The group, which is known in the security industry under different names, including Fancy Bear, Pawn Storm, and APT28, has been operating for almost a decade. It is believed to be the sole user and likely developer of a Trojan program called Sofacy or X-Agent that has variants for Windows, Android, and iOS.Fancy Bear has been responsible for many cyberespionage operations around the world over the years, and its selection of targets has frequently reflected Russia's geopolitical interests. Researchers from security firm CrowdStrike believe the group is likely tied to the Russian Military Intelligence Service (GRU).To read this article in full or to leave a comment, please click here

Nokia files even more patent lawsuits against Apple

Nokia has filed new patent infringement lawsuits against Apple on Thursday, a day after it weighed in on a licensing dispute with the company by filing claims in Germany and the U.S.On Wednesday, the Finland-based mobile network vendor filed lawsuits in three German courts and two lawsuits in a Texas court, leveling infringement claims against Apple on the widely used H.264 video codec and other technologies. Those suits cover 32 of Nokia's patents.Nokia's first round of lawsuits came after Apple filed a lawsuit Tuesday accusing Nokia of working with patent assertion firms Acacia Research and Conversant Intellectual Property Management to “extract and extort exorbitant revenues unfairly and anticompetitively” from Apple and other smartphone makers. To read this article in full or to leave a comment, please click here

Looking Back to Look Forward on Cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions and I’m no exception.  I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill (note: I am an ESG employee).Yup, prognosticating about the future of cybersecurity has become a mainstream activity, but rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here

Looking back to look forward on cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions, and I’m no exception. I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill.Yup, prognosticating about the future of cybersecurity has become a mainstream activity. But rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here

Looking Back to Look Forward on Cybersecurity

By now, everyone in our industry has provided 2017 cybersecurity predictions and I’m no exception.  I participated in a 2017 infosec forecast webcast with industry guru Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill (note: I am an ESG employee).Yup, prognosticating about the future of cybersecurity has become a mainstream activity, but rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here

Event-driven infrastructure and the move to higher worlds

At Amazon Web Services' (AWS) re:Invent conference two years ago, the company introduced AWS Lambda, a mind-blowing service that allows developers to specify and set up specific functions that would run in the event of particular events.This was a remarkable development, for it heralded the ability to move beyond servers for specific processes and move to a model where the operation was the unit of measure. Functions would run only in the event of the particular triggers and would set in a idle state for eternity in the absence of those triggers. Developers would pay only when the particular functions were running.To read this article in full or to leave a comment, please click here