Archive

Category Archives for "Networking"

Is the Cisco 6500 Series invincible?

The Cisco 6500 Series has proven itself time and time again to be a mainstay in the networking industry. Cisco has done a commendable job with continued enhancements to ensure that the industry’s golden child maintains relevance. If this is the case, why do IT professionals still fear its supposedly impending obsolescence and feel pressure to upgrade to newer models? Let’s just say rumors of its demise are greatly exaggerated.As the industry moves toward 10/40Gig and higher, the need for bandwidth and port density only increases. Software-defined networking (SDN), while certainly worthy of consideration, may not be the best option for all organizations just yet. However, the need for high-speed switching connectivity and robust services remains a concern for the here and now. Enter: The Cisco 6500 Series.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What terrorism investigations can teach us about investigating cyber attacks

Having a military background, I tend to look at all security issues with the perspective of someone who’s served in the armed forces. That means using a thorough investigation process that doesn’t treat any action as accidental or an attack as a stand-alone incident and looking for links between seemingly unconnected events.This method is used by law enforcement agencies to investigate acts of terrorism, which, sadly, are happening more frequently. While terror attacks that have occurred in the physical world are making headlines, the virtual world is also under attack by sophisticated hackers. However, not much is said about the similarities between investigating both types of attacks or what security researchers can learn from their law enforcement counterparts. I’ve had this thought for awhile and, fearing that I’d be seen as insensitive to recent events, debated whether to write this blog. After much thought, I decided that the stakes are too high to remain silent and continue treating each breach as a one-off event without greater security implications.To read this article in full or to leave a comment, please click here

FAA doubles altitude limits for business drones

Looking to remove a little red tape from businesses and utilities that may want to use unmanned aircraft systems, the FAA today doubled the “blanket” altitude for certain drones to 400ft from 200 ft.Specifically the altitude increase is for FAA Section 333 exemption holders, or potential holders, which have typically been businesses, governmental or utilities looking to explore the drone applications.+More on Network World: DARPA: Show us how to weaponize benign technologies+Under the new blanket “Certificate of Waiver or Authorization,” the FAA will permit flights at or below 400ft for drone operators with a Section 333 exemption for aircraft weighing less than 55 pounds and for government unmanned operations. Operators must fly under existing daytime Visual Flight Rules, keep the drone within visual line of sight of the pilot and stay certain distances away from airports or heliports:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Half of Americans now stream video, says consultant

Streaming and binge watching have taken over from live television consumption among some demographics, a major consulting firm says.A significant 70% of American consumers overall “now binge watch an average of five episodes at a time,” says Deloitte in a press release about its 10th annual, and latest, Digital Democracy Survey (Summary PDF).Half of consumers (46%) now “subscribe to streaming video services,” the consultant says it’s found.To read this article in full or to leave a comment, please click here

If you care about your encrypted data, get rid of your iPhone 5c

If the FBI can hack the iPhone, others can, too, which means the encrypted content on countless phones is no longer secure. Owners of these phones who care about securing their content should think about upgrading to something else. Newer iPhones, for example, might not have the same weakness and so would be less vulnerable, at least for a while. The FBI has dropped its court action that might have forced Apple to help undermine security that blocked a brute-force attack against the passcode on the iPhone 5c used by a terrorist in San Bernardino. That’s because the FBI found someone else - reportedly Israeli mobile-forensics company Cellebrite – to do it for them.To read this article in full or to leave a comment, please click here

Reaction: Should routing react to the data plane?

Over at Packet Pushers, there’s an interesting post asking why we don’t use actual user traffic to detect network failures, and hence to drive routing protocol convergence—or rather, asking why routing doesn’t react to the data place.

I have been looking at convergence from a user perspective, in that the real aim of convergence is to provide a stable network for the users traversing the network, or more specifically the user traffic traversing the network. As such, I found myself asking this question: “What is the minimum diameter (or radius) of a network so that the ‘loss’ of traffic from a TCP/UDP ‘stream’ seen locally would indicate a network outage FASTER than a routing update?”

This is, indeed, an interesting question—and ones that’s highly relevant in our current software defined/drive world. So why not? Let me give you two lines of thinking that might be used to answer this question.

First, let’s consider the larger problem of fast convergence. Anyone who’s spent time in any of my books, or sat through any of my presentations, should know the four steps to convergence—but just in case, let’s cover them again, using a slide from my forthcoming LiveLesson on IS-IS:

Convergence Steps

There Continue reading

Georgia Tech awarded patent for dragonfly-inspired MAV

Well it’s springtime and if you are the type to embrace nature and hang out near freshwater, then you may see dragonflies. The next time you see one, consider that its robotic counterpart has finally been granted a patent.Wait, haven’t you seen dragonfly-like MAVs for years now? Probably. Georgia Tech Research Corporation filed the patent in 2012. At any rate, the patent says that in order for DARPA to consider an aerial vehicle as a MAV, it must be “smaller than 6 inches in any direction or must not have a gross takeoff weight greater than 100 grams” (about .22 pounds or roughly the same weight as 100 Skittles.)To read this article in full or to leave a comment, please click here

US Federal Courts warn of aggressive scammers

The fraud and scam war rages. This week the Federal Courts warned of swindles involving people posing as federal court officials and U.S. Marshals targeting citizens, threatening them with arrest unless they pay some fake fine for failing to show up for jury duty .+More on Network World: What are grand technology and scientific challenges for the 21st century?+“This year’s scams are more aggressive and sophisticated than we’ve seen in years past,” says Melissa Muir, Director of Administrative Services for the U.S. District Court of Western Washington in a statement. “Scammers are setting up call centers, establishing call-back protocols and using specific names and designated court hearing times.”To read this article in full or to leave a comment, please click here

Apple issues statement regarding DOJ suit: “This case should have never been brought”

The DOJ on Monday filed a brief seeking to vacate a previous court's ruling that would have required Apple to assist the FBI in hacking into a locked iPhone used by one of the San Bernardino shooters. The DOJ's motion seemingly brings to a conclusion a saga that has continued to make headlines since the story burst into the news a few weeks ago.According to the DOJ, the FBI no longer needs Apple's assistance because they managed to access the device's contents with the help of a third-party. While the identity of the third party was not revealed, it's been reported that the FBI received assistance from an Israeli software forensics company called Cellebrite. Whether that is true or not remains unknown, but we do know that the FBI did not receive any outside assistance from other government agencies like the NSA.To read this article in full or to leave a comment, please click here

Free Bitdefender tool prevents Locky, other ransomware infections, for now

Antivirus firm Bitdefender has released a free tool that can prevent computers from being infected with some of the most widespread file-encrypting ransomware programs: Locky, TeslaCrypt and CTB-Locker.The new Bitdefender Anti-Ransomware vaccine is built on the same principle as a previous tool that the company designed to prevent CryptoWall infections. CryptoWall later changed the way in which it operates, rendering that tool ineffective, but the same defense concept still works for other ransomware families.While security experts generally advise against paying ransomware authors for decryption keys, this is based more on ethical grounds than on a perceived risk that the keys won't be delivered.To read this article in full or to leave a comment, please click here

Arista takes aim at core router market with Universal Spine

The concept of using switching infrastructure as a replacement for a core router is certainly nothing new. Years ago, vendors like Foundry Networks and Force10 tried to make the case but were unsuccessful in their attempts. Although the switches were beefy and had massive port density they were missing some key features such as MPLS support, the ability to support a full Internet routing table and carrier class resiliency. From an economic perspective, the cost per port on a switch is about one-tenth what it is on a router, so there is a financial argument to be made but the products just didn’t have the technical chops to hang with big routers.Arista Networks is now taking a shot at this market again but is taking a significantly different approach to the market. Arista is attempting to disrupt the core router market by replacing the big boxes with a distributed spine, similar to the way the company disrupted the legacy data center switching market. Spine-Leaf configurations are well accepted today in big data centers and cloud providers but this wasn’t the case just a few years ago as there was a certain religion around big chassis deployed in multiple tiers. Continue reading