Archive

Category Archives for "Networking"

BRKRST-2042 — Highly Available Wide Area Network Design

Presented by: David Prall, Communications Architect, Cisco For reference, David is the “father of IWAN”. This session was not what I was expecting. I was expecting design and architecture, but it was all about features in IOS and IOS-XE (eg, FHRPs, talked about routing protocol timers, PfRv3, BFD). I guess I need to pay more attention to the session code (RST == routing; ARC == architecture).

BRKNMS-2701 – How I Learned to Stop Worrying and Love Prime Infrastructure

Presenters:

  • Lewis Hickman, Consulting Systems Engineer
  • Jennifer Valentine, Systems Engineer


Quick survey in the room: 60-70% of attendees running PI 3.x; 10-20 PI 2.x; some still on LMS.

“There are 37 different ‘Cisco Prime’ products” — Lewis

“Cisco Prime” isn’t a product; “Cisco Prime Infrastructure” is. Cisco Prime is a family of products.

PI traces its lineage back to 1996: CWSI > Cisco Works LMS > Cisco Prime LMS > WCS > NCS > Prime Infrastructure.

“1232 SysObjIds supported in PI today” — Lewis (aka, 1232 different devices supported by PI)

Two people (only!!) in the room running Network Analysis Module.

UCS Server Assurance module: enables mgmt of UCS servers; will integrate into vCenter and map VMs to physical hosts for you. 

Operations Center: manager of managers for PI

Licensing in PI 3.x:

  • One license for Lifecycle and Assurance now
  • Different license files for different device types
  • Different device types require a specific number of “tokens”
  • When a license is installed in PI 3.x, it gets converted into the appropriate number of tokens
  • As you add devices to PI, it draws down on the number of free tokens in the pool
  • Hint: You don’t Continue reading

Hacked 3D printers could commit industrial sabotage

3D printers can churn out toys, clothing and even food. But the technology also shows potential for use in industrial sabotage, researchers warn.Imagine a car maker using 3D printers to manufacture components, only to have the parts contain defects that are undetectable until it’s too late.A hacker with access to the 3D printers could make that happen, a team of researchers wrote in a recent paper. This could result in a "devastating impact" for users and lead to product recalls and lawsuits, said New York University professor Nikhil Gupta, the lead author of the paper. To read this article in full or to leave a comment, please click here

Hacked 3D printers could commit industrial sabotage

3D printers can churn out toys, clothing and even food. But the technology also shows potential for use in industrial sabotage, researchers warn.Imagine a car maker using 3D printers to manufacture components, only to have the parts contain defects that are undetectable until it’s too late.A hacker with access to the 3D printers could make that happen, a team of researchers wrote in a recent paper. This could result in a "devastating impact" for users and lead to product recalls and lawsuits, said New York University professor Nikhil Gupta, the lead author of the paper. To read this article in full or to leave a comment, please click here

Google’s AI is learning how to save your life

AlphaGo's uncanny success at the game of Go was taken by many as a death knell for the dominance of the human intellect, but Google researcher David Silver doesn't see it that way. Instead, he sees a world of potential benefits.As one of the lead architects behind Google DeepMind's AlphaGo system, which defeated South Korean Go champion Lee Se-dol 4 games to 1 in March, Silver believes the technology's next role should be to help advance human health.To read this article in full or to leave a comment, please click here

Microsoft amps up Windows-as-a-subscription effort

Microsoft today announced that this fall its partners will start selling subscriptions to Windows 10 Enterprise, the edition that targets businesses, for $7 per month per user.Dubbed Windows 10 Enterprise E3 -- the last part of the label a nod to Office 365's nomenclature -- the subscription program will be offered from a select group of resellers already on the Redmond, Wash. company's Cloud Solution Provider (CSP) list.The approved CSP resellers -- Microsoft did not identify which partners would participate -- will sell Windows 10 Enterprise E3 for $7 per user per month, or $84 per user per year.INSIDER Review: Enterprise guide to Windows 10 Yusuf Mehdi, an executive in the Windows and Devices Group, briefly mentioned Windows 10 Enterprise E3 in his time on stage Tuesday at Microsoft's Worldwide Partner Conference (WPC) in Toronto, and provided a bit more information in a post to a company blog.To read this article in full or to leave a comment, please click here

Here’s how to star in Apple’s new TV show about app creation

Apple is co-producing a TV show about app design and development, and you might be able to play a starring role.On Tuesday, the production company working with Apple on the show, Propagate, announced an open casting call for people who want to be on "Planet of the Apps."The show is Apple's first foray into TV series production and is described as "a new unscripted series about the world of apps and the developers who create them."Applications are being accepted through the show's website until Aug. 26. The producers will then travel to San Francisco, Los Angeles, Austin and New York to meet with app developers and tech entrepreneurs.To read this article in full or to leave a comment, please click here

Pokémon Go is making people take leave of their senses

Pokémon Go, the new augmented reality smartphone game, has players showing up in some strange places looking for virtual cartoon creatures. Several players have shown up at a sex products store in the U.K., according to some news reports. In New Zealand, players have gone to the headquarters of the Hells Angels biker gang, reports the Guardian. The game is aimed at players aged 10 and up, according to information on Pokémon Go's Google Play download page. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Using brain signals instead of passwords to unlock computers

System authentication could one day be widely achieved through brainwaves, scientists say. Simply thinking of certain things, such as a person's face, or a rotating displayed cube would be enough to unlock a device.Electro-encephalography (EEC) sensors are behind the technique. That’s where electrical activity in certain parts of the brain is recorded. We know it as the wavy, graphical lines on charts created from wired electrodes placed on the scalp, as seen in hospitals and TV shows. They're used in that environment to diagnose epilepsy, among other things.+ Also on Network World: 5 things you should know about two-factor authentication +To read this article in full or to leave a comment, please click here

July 2016 Patch Tuesday: Microsoft releases 11 security updates, 6 rated critical

For July, Microsoft released 11 security bulletins, six of which were rated critical due to remote code execution (RCE) vulnerabilities.CriticalMS16-084 is the cumulative patch for Internet Explorer, fixing a plethora of RCE problems that an attacker could exploit if a victim viewed a maliciously crafted webpage using IE. The security update also addresses spoofing vulnerabilities, security feature bypass and information disclosure flaws.MS16-085 is the monthly cumulative security update for Microsoft’s Edge browser. The most severe vulnerabilities could allow RCE. The patch also resolves security feature bypass issues, information disclosure problems and many memory corruption flaws.To read this article in full or to leave a comment, please click here

July 2016 Patch Tuesday: Microsoft releases 11 security updates, 6 rated critical

For July, Microsoft released 11 security bulletins, six of which were rated critical due to remote code execution (RCE) vulnerabilities.CriticalMS16-084 is the cumulative patch for Internet Explorer, fixing a plethora of RCE problems that an attacker could exploit if a victim viewed a maliciously crafted webpage using IE. The security update also addresses spoofing vulnerabilities, security feature bypass and information disclosure flaws.MS16-085 is the monthly cumulative security update for Microsoft’s Edge browser. The most severe vulnerabilities could allow RCE. The patch also resolves security feature bypass issues, information disclosure problems and many memory corruption flaws.To read this article in full or to leave a comment, please click here

Shifting the cost of security

If you deal with enterprise systems security, you likely have an idea what your annual expenditure for security and forensic security is. It’s huge. It’s a time and resource suck like few others. The licensing costs will vary, but they’re a considerable fraction of most organizations’ annual IT spend. Ready-made modular costs are platform-dependent. In Windows, it might be a framework from Symantec, Intel Security, or a host of others. Integration into Active Directory isn’t so much difficult as it is tedious. If you start or add Linux, the cost shifts towards any number of frameworks that require at least a moderate amount of labor costs in customization, maintenance and ongoing platform mods.To read this article in full or to leave a comment, please click here

Killing the password: FIDO says long journey will be worth it

The FIDO (formerly Fast Identity Online) Alliance is out to kill the password.It wouldn’t seem to be a tough sales job. There is little debate among security experts that passwords are a lousy, obsolete form of authentication.The evidence is overwhelming. Most people in spite of exhortations to use long, complicated passwords, to change them at least monthly and to avoid using the same one for multiple sites, don’t.The latest Verizon Data Breach Incident Report (DBIR) found that 63 percent of all data breaches involved the use of stolen, weak or default passwords.To read this article in full or to leave a comment, please click here

BGP Code Dive (3)

This week, I want to do a little more housekeeping before we get into actually asking questions of the bgp code. First there is the little matter of an editor. I use two different editors most of the time, Notepad++ and Atom.

  • Notepad++ is a lightweight, general purpose text editor that I use for a lot of different things, from writing things in XML, HTML, CSS, Python Javascript, C, and just about anything else. This is an open source project hosted on the Notepad++ web site with the code hosted at github.
  • Atom is a more GUI oriented “programmer’s editor.” This is a more full featured editor, going beyond basic syntax highlighting into projects, plugins that pull diffs in side by side windows, and the like. I don’t really have a build environment set up right now, so I don’t know how it would interact with compiled code, but I assume it would probably have a lot of the tricks I’m used to, like being able to trace calls through the code, etc. Atom is available here.

I haven’t actually chosen one or the other—I tend to use both pretty interchangeably, so you’re likely to see screen shots from Continue reading