Archive

Category Archives for "Networking"

LILEE Systems’ new fog computing platform is well suited to distributed enterprises  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Location, location, location! It turns out that mantra is not just for the real estate market. Location is a critical aspect of fog computing as well.Cisco introduced the notion of fog computing about two and a half years ago. (See Cisco unveils 'fog computing' to bridge clouds and the Internet of Things.) This distributed computing architecture addresses the challenge of backhauling a lot of raw data generated in the field –say from thousands or millions of IoT devices – to the cloud for analysis.To read this article in full or to leave a comment, please click here

Tips to help select and manage your co-location vendor

The percentage of IT processed at in-house sites has remained steady at around 70 percent, but data points to a major shift to co-location and cloud for new workloads in the coming years.Half of senior IT execs expect the majority of their IT workloads to reside off-premise in the future, according to Uptime Institute’s sixth annual Data Center Industry Survey. Of those, 70 percent expect that shift to happen by 2020.+ Also on Network World: 10 tips for a successful cloud plan +It is hard to predict what percentage will go to public cloud, but a significant portion of those workloads will be shifting to co-location providers—companies that provide data center facilities and varying levels of operations management and support. To read this article in full or to leave a comment, please click here

Tips to help select and manage your co-location vendor

The percentage of IT processed at in-house sites has remained steady at around 70 percent, but data points to a major shift to co-location and cloud for new workloads in the coming years.Half of senior IT execs expect the majority of their IT workloads to reside off-premise in the future, according to Uptime Institute’s sixth annual Data Center Industry Survey. Of those, 70 percent expect that shift to happen by 2020.+ Also on Network World: 10 tips for a successful cloud plan +It is hard to predict what percentage will go to public cloud, but a significant portion of those workloads will be shifting to co-location providers—companies that provide data center facilities and varying levels of operations management and support. To read this article in full or to leave a comment, please click here

33% off Kinivo 5 Port HDMI Switch With Auto-Switching & Remote – Deal Alert

This highly rated splitter from Kinivo takes 5 HDMI inputs from your various devices, and outputs them to one HDMI connection. Ideal for TVs that just don't have that many HDMI inputs. 501BN will automatically switch to the currently active input source if there is only one active input. If there are multiple active inputs, you can simply select using the IR remote or using the selector button on the unit itself. Supports video up to 1080p and 3D as well. The item currently averages 4.5 out of 5 stars on Amazon from over 9,000 customers (read reviews) and its list price of $59.99 is currently discounted 33% to $39.99.To read this article in full or to leave a comment, please click here

The Overlay Problem: Getting In and Out

I've been researching overlay network strategies recently. There are plenty of competing implementations available, employing various encapsulations and control plane designs. But every design I've encountered seems ultimately hampered by the same issue: scalability at the edge.

Why Build an Overlay?

Imagine a scenario where we've got 2,000 physical servers split across 50 racks. Each server functions as a hypervisor housing on average 100 virtual machines, resulting in a total of approximately 200,000 virtual hosts (~4,000 per rack).

In an ideal world, we could allocate a /20 of IPv4 space to each rack. The top-of-rack (ToR) L3 switches in each rack would advertise this /20 northbound toward the network core, resulting in a clean, efficient routing table in the core. This is, of course, how IP was intended to function.

Unfortunately, this approach isn't usually viable in the real world because we need to preserve the ability to move a virtual machine from one hypervisor to another (often residing in a different rack) without changing its assigned IP address. Establishing the L3 boundary at the ToR switch prevents us from doing this efficiently.

Continue reading · 4 comments

The Overlay Problem: Getting In and Out

I've been researching overlay network strategies recently. There are plenty of competing implementations available, employing various encapsulations and control plane designs. But every design I've encountered seems ultimately hampered by the same issue: scalability at the edge.

Why Build an Overlay?

Imagine a scenario where we've got 2,000 physical servers split across 50 racks. Each server functions as a hypervisor housing on average 100 virtual machines, resulting in a total of approximately 200,000 virtual hosts (~4,000 per rack).

In an ideal world, we could allocate a /20 of IPv4 space to each rack. The top-of-rack (ToR) L3 switches in each rack would advertise this /20 northbound toward the network core, resulting in a clean, efficient routing table in the core. This is, of course, how IP was intended to function.

Unfortunately, this approach isn't usually viable in the real world because we need to preserve the ability to move a virtual machine from one hypervisor to another (often residing in a different rack) without changing its assigned IP address. Establishing the L3 boundary at the ToR switch prevents us from doing this efficiently.

Continue reading · 23 comments

The Overlay Problem: Getting In and Out

I've been researching overlay network strategies recently. There are plenty of competing implementations available, employing various encapsulations and control plane designs. But every design I've encountered seems ultimately hampered by the same issue: scalability at the edge.

Why Build an Overlay?

Imagine a scenario where we've got 2,000 physical servers split across 50 racks. Each server functions as a hypervisor housing on average 100 virtual machines, resulting in a total of approximately 200,000 virtual hosts (~4,000 per rack).

In an ideal world, we could allocate a /20 of IPv4 space to each rack. The top-of-rack (ToR) L3 switches in each rack would advertise this /20 northbound toward the network core, resulting in a clean, efficient routing table in the core. This is, of course, how IP was intended to function.

Unfortunately, this approach isn't usually viable in the real world because we need to preserve the ability to move a virtual machine from one hypervisor to another (often residing in a different rack) without changing its assigned IP address. Establishing the L3 boundary at the ToR switch prevents us from doing this efficiently.

Continue reading · 22 comments

Ransomware spreads through weak remote desktop credentials

Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for file-encrypting ransomware.In March, researchers discovered a ransomware program dubbed Surprise that was being installed through stolen credentials for TeamViewer, a popular remote administration tool. But the trend had started long before that, with some ransomware variants being distributed through brute-force password guessing attacks against Remote Desktop Protocol (RDP) servers since 2015.While this method of infection was initially used by relatively obscure ransomware programs, recently it has been adopted by an increasing number of cybercriminals, including those behind widespread ransomware programs such as Crysis.To read this article in full or to leave a comment, please click here

Ransomware spreads through weak remote desktop credentials

Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for file-encrypting ransomware.In March, researchers discovered a ransomware program dubbed Surprise that was being installed through stolen credentials for TeamViewer, a popular remote administration tool. But the trend had started long before that, with some ransomware variants being distributed through brute-force password guessing attacks against Remote Desktop Protocol (RDP) servers since 2015.While this method of infection was initially used by relatively obscure ransomware programs, recently it has been adopted by an increasing number of cybercriminals, including those behind widespread ransomware programs such as Crysis.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wi-Fi can be used to identify people in IoT locations

Wi-Fi signals can be used to unobtrusively identify different people at a location, such as home. It promises to replace other forms of identification in those domestic environments, Chinese scientists say.The system works by identifying body shapes along with the unique way that individuals move in a room. Those characteristics influence Wi-Fi propagation, researchers from Northwestern Polytechnical University in Xi’an claim. The Wi-Fi is affected by the people in the room, and that impact on the wireless access point can be detected and interpreted, they say.INSIDER: 5 ways to prepare for Internet of Things security threats “Each person has specific influence patterns to the surrounding Wi-Fi signal while moving indoors, regarding their body shape characteristics and motion patterns,” the team writes in an abstract to their paper, published in August.To read this article in full or to leave a comment, please click here

Researchers make progress toward computer video recognition

Computers can already recognize you in an image, but can they see a video or real-world objects and tell exactly what's going on? Researchers are trying to make computer video recognition a reality, and they are using some image recognition techniques to make that happen. Researchers in and outside of Google are making progress in video recognition, but there are also challenges to overcome, Rajat Monga, engineering director of TensorFlow for Google's Brain team, said during a question-and-answer session on Quora this week. The benefits of video recognition are enormous. For example, a computer will be able to identify a person's activities, an event, or a location. Video recognition will also make self-driving cars more viable.To read this article in full or to leave a comment, please click here

How businesses are turning tech into robot toil

See how businesses are using robots to advance their trades Image by Martyn Williams The RoboBusiness conference in San Jose is all about creating business advantages through the use of robotic helpers. Case in point: the Navii shopping assistant from Fellow Robotics, that can greet customers, ask them if they need help, and then guide them to the item they need. Navii will be working in 11 Lowe’s stores around the San Francisco Bay area beginning this fall.To read this article in full or to leave a comment, please click here

Four state AGs sue to block US decision to cede key internet role

A judge in Texas has fixed for Friday the hearing in a suit filed by four state attorneys general against a decision by the U.S. to transfer by month end oversight of some key internet technical functions to a multistakeholder body.The attorneys general of Arizona, Oklahoma, Nevada and Texas filed late Wednesday a suit asking the federal court for a temporary restraining order and preliminary injunction on the proposed transfer of the Internet Assigned Numbers Authority (IANA) functions to the Internet Corporation for Assigned Names and Numbers.ICANN, under contract with the Department of Commerce, administers the IANA functions, which include responsibility for the coordination of the DNS (Domain Name System) root, IP addressing, and other internet protocol resources. The National Telecommunications and Information Administration (NTIA), an agency within the Commerce Department, said last month it will go ahead with its plan to transfer supervision of the IANA functions to a multistakeholder body on Oct. 1, in line with a plan first announced in March 2014.To read this article in full or to leave a comment, please click here

Four state AGs sue to block US decision to cede key internet role

A judge in Texas has fixed for Friday the hearing in a suit filed by four state attorneys general against a decision by the U.S. to transfer by month end oversight of some key internet technical functions to a multistakeholder body.The attorneys general of Arizona, Oklahoma, Nevada and Texas filed late Wednesday a suit asking the federal court for a temporary restraining order and preliminary injunction on the proposed transfer of the Internet Assigned Numbers Authority (IANA) functions to the Internet Corporation for Assigned Names and Numbers.ICANN, under contract with the Department of Commerce, administers the IANA functions, which include responsibility for the coordination of the DNS (Domain Name System) root, IP addressing, and other internet protocol resources. The National Telecommunications and Information Administration (NTIA), an agency within the Commerce Department, said last month it will go ahead with its plan to transfer supervision of the IANA functions to a multistakeholder body on Oct. 1, in line with a plan first announced in March 2014.To read this article in full or to leave a comment, please click here

16 useful Windows 10 tools that help you get more done

Getting more doneImage by Adam Patrick MurrayNone of us like wasting time when we’re trying to get stuff done. Every second spent shuffling around open windows or navigating menus is precious time not spent achieving your goals. Fortunately, Microsoft stuffed Windows with all sorts of secretly powerful tools, as we’ve covered in-depth in both 17 obscure Windows tools and tricks too powerful to overlook and 15 simple, secret Windows tips and tricks designed to save you time.To read this article in full or to leave a comment, please click here