Archive

Category Archives for "Networking"

Google Play Services 8.3 simplifies Android sign-in to a single tap

Google has updated Google Play Services. Users will notice changes from these updates in their apps quickly. For most Android users, Play Services remains out of sight and under the hood, serving apps with application programming interfaces (API), OAuth 2.0 identity services, security, malware scanning, and other mobile services.With the release of Google Play 8.3, Google has changed the sign-in button to make it work more like Chrome's web sign-in. When a new app that uses this updated Play Services release is downloaded, the developer can present the new branded sign-in button: Google This is a big interaction fix for users who previously had to select from multiple accounts, create new profiles, and grant user permissions just to sign into an app. It wouldn't be noticeable except for all the streamlined web sign-ins available, such as Google, Facebook, and Twitter, that reduce sign-in to a click. Now Android sign in to apps is reduced to a tap.To read this article in full or to leave a comment, please click here

PlexxiPulse—One Year In

It’s hard to believe that it has been a year since Rich Napolitano took the helm as CEO of Plexxi. Since last November, he’s implemented a new strategic vision, formed an exclusive channel distribution agreement with Arrow Electronics and raised a new round of funding. This week, in a profile published in eWeek, enterprise reporter Jeff Burt describes why Rich joined Plexxi and chronicles Plexxi’s successes under his leadership. Take a look. It’s definitely worth a read  before you head out for the weekend. We’re excited to see what Rich’s second year at Plexxi has in store for us, our customers, partners and the industry!

Below please find a few of our top picks for our favorite news articles of the week. Enjoy!

CIO Review: How to Create the Network of the Future (pg. 48-49)
By Rich Napolitano
IT is changing. The advent of Big Data, the Internet of Things and mobile has massively increased the amount of data we are creating, storing and moving – putting an increasing strain on the piece at the center of it all: the network. More data is a reality. It empowers users around the world with more information than they could ever Continue reading

On APIs: Cars, not assembly lines.

In recent years, infrastructure vendors have been proudly pointing out their APIs. The idea is that because a chunk of infrastructure can be monitored and configured with APIs, the product can be described as automation-ready or open. Vendors, you’re getting it wrong here.

Phoenix, AZ: CloudFlare’s 64th data center

Three years and 46 data centers later our expansion returns to the United States. Phoenix, the latest addition to the CloudFlare network, is our 10th point of presence in North America, and the start of our effort to further regionalize traffic across the continent. This means faster page loads and transaction speeds for your sites and applications, as well as for the 6 million Internet users throughout the Southwestern US that use them.

Eat Surf local

The vast majority of Internet traffic in the US is exchanged in only a small handful of cities: Los Angeles, the San Francisco Bay Area, Dallas, Chicago, Miami, Ashburn (Virginia) and New York. These locations evolved into key interconnection points largely as a result of their status as population and economic centers. However, if you're one of the 236 million Americans that live outside of these metro areas, you have to hike quite a bit further to access your favorite content on the Internet.

To illustrate this, we measured the level of local interconnection between a handful of our Tier 1 Internet providers—NTT, TeliaSonera, Tata Communications and Cogent—in different metro areas. For the uninitiated, Tier 1 networks are the group of networks that Continue reading

Deploying application whitelisting? NIST has some advice for you

If you're trying to bar the door to malware infections, automated application whitelisting is a tactic that the U.S. National Institute of Standards and Technology thinks you should try -- and the agency wants to help you implement it in an effective way.The Department of Commerce agency, which is tasked with developing standards and recommendations including in the area of IT security, has published a guide to application whitelisting that explains the technology in detail and offers practical advice for how it should be used.For one, before looking at third-party products, organizations should consider using the application whitelisting mechanisms included in the operating systems they use on their desktops, laptops and servers. The reason is that they're easier to use, can be centrally managed and their use keeps additional costs minimal.To read this article in full or to leave a comment, please click here

How AI is improving consumer engagement and customer experience

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Artificial intelligence (AI) – when computers behave like humans – is no longer science fiction. Machines are getting smarter and companies across the globe are beginning to realize how they can leverage AI to improve consumer engagement and customer experience.

Gartner research indicates that in a few years 89% percent of businesses will compete mainly on customer experience. Within five years consumers will manage 85% of their relationships with an enterprise without interacting with a human – moving to the “DIY” customer service concept.

To read this article in full or to leave a comment, please click here

Are you overlooking tokenization as a data security measure?

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  As a security technology that obfuscates clear text data, tokenization is the red-headed stepchild compared to encryption. That's changing, however, as tokenization has a key role in enabling mobile payment systems such as Apple Pay, Samsung Pay and Android Pay. If you use any of these smartphone-based payment applications, tokenization is already at work for you.Unless you're in the payments industry, you might not even know what tokenization is, or how it can protect sensitive data. Yes, there are uses for the technology beyond securing payment data. I'll talk use cases in a minute, but first let me explain what tokenization is.To read this article in full or to leave a comment, please click here

Large scale BGP hijack out of India

BGP hijacks happen every day, some of them affect more networks than others and every now and then there’s a major incident that affects thousands of networks. Our monitoring systems keep an eye out for our users and if you would like to have a general idea of what’s going on in the world of BGP incidents, keep an eye on BGPstream.com. Earlier today we detected one of those major incidents that affected thousands of networks.

Starting at 05:52 UTC, AS9498 (BHARTI Airtel Ltd.) started to claim ownership for thousands of prefixes by originating them in BGP. This affected prefixes for over two thousand unique organizations (Autonomous systems).

Our systems detected origin AS changes (hijacks) for 16,123 prefixes. The scope and impact was different per prefix but to give you an idea, about 7,600 of these announcements were seen by five or more of our peers (unique peers ASns) and 6,000 of these were seen by more than 10 of our peers.

One of the reasons this was so widespread is because large networks such as AS174 (Cogent Communications) and AS52320 (GlobeNet Cabos Submarinos VZLA) accepted and propagated these prefixes to their peers and customers.

The BGPplay visualization Continue reading

Android security update focuses on media files

In light of Android's mediaserver issues, Google’s latest Android security update focused on flaws related to the operating system's treatment of media files. Android’s current flaws are similar to problems that cropped up with Windows more than a decade ago.Google addressed seven vulnerabilities as part of this month’s Android security update, released this week. Of the critical vulnerabilities, one was in the libutils component (CVE-2015-6609) near where Stagefright flaws were found over the summer, and the other was in the Android mediaserver component (CVE-2015-6609). They were rated as critical, as they could allow remote code execution when handling malformed media files.To read this article in full or to leave a comment, please click here

Cox to pay $595,000 for Lizard Squad data breach

Cox Communications has agreed to pay US$595,000 and submit to seven years of computer security compliance monitoring by the Federal Communications Commission to settle an investigation into whether the cable TV and Internet operator failed to safeguard the personal information of its customers.The investigation relates to a hack of Cox in 2014 by "EvilJordie," a member of the "Lizard Squad" hacker collective, and is the FCC's first privacy and data security enforcement action against a cable operator.The FCC's investigation found that by posing as a Cox IT staffer, the hacker convinced a Cox customer service representative and contractor to enter their account IDs and passwords into a fake website, the FCC said Thursday.To read this article in full or to leave a comment, please click here

EU tells US it must make next move on new Safe Harbor deal

The European Union put the onus firmly on the U.S. to make the next move in negotiating a replacement for the now-defunct Safe Harbor Agreement on privacy protection for transatlantic personal data transfers. "We need a new transatlantic framework for data transfers," said Vĕra Jourová, the European Commissioner for Justice and Consumers, emphasizing the urgency of the situation. However, she said at a news conference in Brussels on Friday, "It is now for the U.S. to come back with their answers." EU law requires that companies guarantee the same privacy protection for the personal information of EU citizens that they hold, wherever in the world they process it.To read this article in full or to leave a comment, please click here