Archive

Category Archives for "Networking"

Datanauts 055: All About Scaling Out

The Datanauts delve into the nitty-gritty of how scale-out works for servers, networking, and storage; what it means for application design and operations; and how vendors, open source projects, and cloud services are positioning themselves in a scale-out world. The post Datanauts 055: All About Scaling Out appeared first on Packet Pushers.

Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 2 comments

Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 16 comments

Legacy TLS cipher support in Firefox

After upgrading Firefox recently, I noticed that I could no longer access certain embedded devices via HTTPS. It seems that recent versions of Firefox and Chrome no longer support certain TLS ciphers due to recently discovered vulnerabilities. That's all well and good, except the error returned offers no recourse if you need to connect anyway.

firefox_error.png

Firefox returns the error SSL_ERROR_NO_CYPHER_OVERLAP with no option to temporarily allow connectivity. (Chrome reports a similar error named ERR_SSL_VERSION_OR_CIPHER_MISMATCH.) Presumably, this choice was made by the developers with the intention of forcing people to upgrade outdated devices. Unfortunately, in order to upgrade an out-of-date device, we typically must first be able to connect to it. I wasted a fair bit of time digging up a solution, so I figured I'd document the workaround here for when I inevitably run into this problem again a year from now and have forgotten what I did.

Continue reading · 12 comments

5 affordable MDM options for small businesses

Affordable MDM options for small businessesImage by ThinkstockSmall and medium sized businesses (SMBs) have embraced BYOD. In a study of SMBs from the IT community, Spiceworks, 61 percent of respondents said they have a BYOD policy in place. However, the same study found that 56 percent of that group also said they had not implemented any mobile device management (MDM) strategies and didn't have plans to do so within the next six months. While BYOD might allow these smaller businesses to save on hardware costs, it does open up unique risks for IT. With employees running on varying operating systems and hardware, it becomes difficult to implement secure solutions across the board, leaving sensitive data at risk. If just one employee's tablet falls into the wrong hands, you're going to wish you had some way to remotely wipe data on that device. But small businesses also have small IT departments -- sometimes consisting of only one person -- so a BYOD management strategy needs be straightforward, affordable and low-maintenance. Just because your business doesn't have a big budget or a large staff doesn't mean you can't ensure that all your corporate data remains secure, no matter where Continue reading

How Anaplan makes dynamic strategic planning a reality

Anaplan doesn’t come up in many conversations about unicorns – you know, the Ubers, Airbnbs and SnapChats of the world. But if your company is struggling with strategic planning, Anaplan is one unicorn you’ll want to learn more about. San Francisco-headquartered Anaplan’s cloud-based platform replaces spreadsheet mania as a way to handle large-scale strategic planning in real time. Companies such as HP, Intel and Morgan Stanley are streamlining sales management, forecasting and a variety of other applications using Anaplan, which simplifies life for everyone from senior managers to model builders and end users.To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: 8 tech ‘megatrends’ that are about to change business

An assemblage of technological breakthroughs are rapidly morphing to create massive changes in how businesses operate.Artificial intelligence (AI), blockchain and Internet of Things (IoT) are just three of eight crucial “megatrends” that strategy consulting firm PricewaterhouseCoopers (PwC) says is going to significantly distort business.Those new forces should clearly be planned for. And although the consulting firm's advice is aimed at generalized CEOs, it's IT and technical teams that will have to lay the groundwork.Robots, augmented reality (AR), 3D printing, drones and virtual reality (VR) are also among PwC’s pick of “essential eight technologies” that the firm says in its report (PDF) (released during the summer) need to be considered by company chiefs to move their operations forward.To read this article in full or to leave a comment, please click here

Lawmakers want UK to set example on transparency in AI decision making

British lawmakers want more transparency and less bias in decision-making -- not their own, of course, but in decisions made by AI systems.As more and more software systems and connected devices employ artificial intelligence technologies to make decisions for their owners, the lawmakers want to know what's behind their thinking. The U.K. Parliament's Science and Technology Committee has been studying the need for more regulation in the fields of robotics and artificial intelligence.Recent advances in AI technology raise a host of social, ethical and legal questions, the committee's members said in a report published Wednesday.To read this article in full or to leave a comment, please click here

Reaction: DNS is Part of the Stack

Over at ipspace.net, Ivan is discussing using DNS to program firewall rules—

Could you use DNS names to translate human-readable rules into packet filters? The traditional answer was “no, because I don’t trust DNS”.

This has been a pet peeve of mine for some years—particularly after my time at Verisign Labs, looking at the DNS system, and its interaction with the control plane, in some detail. I’m just going to say this simply and plainly; maybe someone, somewhere, will pay attention—

The Domain Name System is a part of the IP networking stack.

Network engineers and application developers seem to treat DNS as some sort of red-headed-stepchild; it’s best if we just hide it in some little corner someplace, and hope someone figures out how to make it work, but we’re not going to act like it should or will work. We’re just going to ignore it, and somehow hope it goes away so we don’t have to deal with it.

Let’s look at some of the wonderful ideas this we’ll just ignore DNS has brought us over the years, like, “let’s embed the IP address in the packet someplace so we know who we’re talking to,” and “we Continue reading

IDG Contributor Network: A night to remember: Engineering lessons from the Titanic

Some 31 years ago, the RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers’ confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks—the “icebergs” that lurk on the seas we sail—from causing catastrophic breaches?To read this article in full or to leave a comment, please click here

IDG Contributor Network: A night to remember: Engineering lessons from the Titanic

Some 31 years ago, the RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers’ confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks—the “icebergs” that lurk on the seas we sail—from causing catastrophic breaches?To read this article in full or to leave a comment, please click here

IDG Contributor Network: A night to remember: Engineering lessons from the Titanic

Some 31 years ago, the RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers’ confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks—the “icebergs” that lurk on the seas we sail—from causing catastrophic breaches?To read this article in full or to leave a comment, please click here

Review: Pearl RearVision quickly retrofits a backup camera to your old jalopy (with video)

The scoop: RearVision backup camera license plate bracket, by Pearl Auto, about $500.What is it? This package includes a license plate bracket for the back of your automobile, but it’s not an ordinary bracket. Inside are two video cameras that provide you with a view for behind your car. The system includes an on-board diagnostics adapter (OBD) that communicates with the camera via Bluetooth and Wi-Fi to your smartphone to provide the view. The cameras are charged via solar sensors, so you don’t need to have a professional installation in order to power up the cameras. To complete the package, the system includes a mounting bracket for either your car’s dashboard or air vents, depending on your personal preference (or state laws that prohibit dashboard mounts).To read this article in full or to leave a comment, please click here