Archive

Category Archives for "Networking"

Cool but costly: Google OnHub review roundup

The initial round of reviews for OnHub, Google’s fancified entry into the home router market, are out, and the consensus is that it’s a neat gadget, but possibly not worth the $200 you’ll fork over to get it.At the moment, the OnHub is essentially a standard home Wi-Fi router that runs Google’s software instead of the bare-bones configuration pages common to home routers. You plug it into your Ethernet connection, download the Android or iOS app, and manage everything from your smartphone. Given that the average home user probably doesn’t know how to do much besides turn their usual router off and on again for troubleshooting, a robust, convenient and user-friendly configuration experience is a solid step forward.To read this article in full or to leave a comment, please click here

Hottest products at VMworld 2015

Hottest products at VMworld 2015Image by Thinkstock, VWwareVirtualization, cloud, security are storage are among the hot trends of this year’s VMworld 2015 in San Francisco. Check out the latest and greatest of the new products being announced or displayed by vendors at VMworld 2015.Unity EdgeConnectManufacturer name: Silver PeakTo read this article in full or to leave a comment, please click here

Enabling the Software-Defined Data Center Vision

We’re excited to announce our latest tier 1 partnership, this time with VMware, which demonstrates the growing strategic role and importance that Cumulus Linux plays in rapidly building and scaling private and public clouds. VMware has announced VMware EVO SDDC — a software suite that provides a prescriptive and simple way for organizations to build and operate highly scalable and performant private clouds based on VMware’s software-defined data center (SDDC) architecture. With VMware EVO SDDC bundled with OEM hardware, VMware provides compute, storage and network virtualization, and now fully integrated physical networking solutions.

Cumulus Linux comes embedded in VMware EVO SDDC, which also includes a hardware management system (HMS) component with software integration at the network layer.  The top of rack (ToR), spine, and management switches all run Cumulus Linux as the network OS on Dell and Quanta platforms.  Hyper-converged infrastructure (HCI) solutions based on the suite will be available over time through an exclusive set of VMware partners.

This technology partnership is significant for several reasons. First, to have struck such a strategic OEM partnership with VMware is a ringing endorsement of the enterprise-grade quality of software that Cumulus Linux represents as well as the quality of engineering Continue reading

VMware NSX – It’s About the Platform Ecosystem

The basis of competition has shifted from individual products and technologies to platforms,

Best-In-Class Partners

Best-In-Class Partners

but with everyone aspiring to be a platform the bar is set high. A platform must be a value-creation entity, underpinned by a robust architecture that includes a set of well-integrated software artifacts and programming interfaces to enable reuse and extensibility by third parties. Platforms must support an ecosystem that can function in a unified way, foster interactions among its members and orchestrate its network of partners. And finally, platforms must adhere to the network effect theory which asserts that the value of a platform to a user increases as more users subscribe to it, in effect, creating a positive feedback loop.

The VMware NSX network virtualization platform meets this criteria resoundingly. NSX is specifically designed to provide a foundation for a high-value, differentiated ecosystem of partners that includes some of the networking industry’s most significant players.  The NSX platform leverages multi-layered network abstractions, an extensible and distributed service framework with multiple entry points, and transparent insertion and orchestration of partner services. What distinguishes NSX from other platforms is its inherent security constructs which partner solutions inherit, and a context sharing and synchronization capability Continue reading

VMware CEO Gelsinger still committed to EMC Federation

Will the EMC Federation break up, as a flurry of recent reports have suggested? VMware CEO Pat Gelsinger, for one, believes one of the most prominent alliances of companies in the technology industry is still the best management structure. “My view on this hasn’t changed,” Gelsinger told Network World in a wide-ranging interview. “Being bigger and more strategic as a whole is a more powerful position for the companies and we believe that, through this period, the Federation structure is the best one for both customers as well as for the companies and employees themselves.” To read this article in full or to leave a comment, please click here

FBI: Major business e-mail scam blasts 270% increase since 2015

The FBI this week said an e-mail scam that tricks businesses into paying invoices from what looks like established partners is growing exponentially.The FBI last year even gave the scam its own name -- business e-mail compromise (BEC) – which is a variant of the timeworn “man-in-the-middle” scam and usually involves chief technology officers, chief financial officers, or comptrollers, receiving an e-mail via their business accounts purportedly from a vendor requesting a wire transfer to a designated bank account, the FBI said.To read this article in full or to leave a comment, please click here

FBI: Major business e-mail scam blasts 270% increase since 2015

The FBI this week said an e-mail scam that tricks businesses into paying invoices from what looks like established partners is growing exponentially.The FBI last year even gave the scam its own name -- business e-mail compromise (BEC) – which is a variant of the timeworn “man-in-the-middle” scam and usually involves chief technology officers, chief financial officers, or comptrollers, receiving an e-mail via their business accounts purportedly from a vendor requesting a wire transfer to a designated bank account, the FBI said.To read this article in full or to leave a comment, please click here

Who’s really in charge at Cisco?

Chuck Robbins is officially the chief executive officer of Cisco, but that doesn’t mean he’s totally in charge.Several sources inside and outside of Cisco say the company’s star engineers and key innovators – Mario Mazzola, Prem Jain and Luca Cafiero – continue to report to former CEO John Chambers, who became the executive chairman of Cisco July 26 when Robbins succeeded him. The three, along with marketer Soni Jiandani, founded three companies funded and then acquired by Cisco under its “spin-in” model to insert it into new or disruptive markets, like storage area networking, data center switching and SDNs.To read this article in full or to leave a comment, please click here

How Docker can transform your development teams

Waiting for the right build has been a historical problem with test environments, while differences between development, test and production have caused defects to escape in production. Virtual Machines solve these problems by sharing a copy of system data, but they can be slow and take gigabytes of disk space. Enter Docker, a lightweight, fast virtualization tool for Linux. The opportunity Docker presents  First, anyone on a technical staff can create a test environment on the local machine in a few seconds. The new process hooks into the existing operating system, so it does not need to “boot.” With a previous build stored locally, Docker is smart enough to only load the difference between the two builds. To read this article in full or to leave a comment, please click here

CSO burnout biggest factor in infosec talent shortage

The real cause of the talent shortage in the information security field isn't a lack of new people entering the profession, but retention and churn at the highest levels, according to a new report by IDC. "It's a fairly common theme to suggest that we have better training in colleges, certificate courses, and all that sort of thing for entry-level folks," said IDC analyst and report author Pete Lindstrom. But in fact, at the entry level, expectations are basic and companies are willing to be flexible, are open to diverse backgrounds, and can train new hires. Jobs that require less than five years of experience are filled within just three months 85 percent of the time, and 99 percent are filled within six months, according to the IDC survey of senior infosec executives.To read this article in full or to leave a comment, please click here

Cyber sharing bill shares too much, critics say

According to '70s hippie comics Cheech & Chong, “Everybody shares stuff, man.”Maybe if it’s weed. But, apparently not if it’s cyber threat information.Supposedly, creation of a federal framework for that kind of sharing among industries and government has been a priority for years for all parties involved – President Obama Congress and private sector enterprises that are under constant, ever-more-sophisticated attacks.But after years of proposals, there are still no results. And if privacy and civil liberties advocates prevail in the current dustup, there won’t be any results this year either.The latest effort – several bills on both the House and Senate side – have had varied success. Two House bills – the Protecting Cyber Networks Act, or PCNA (H.R. 1560) and the National Cybersecurity Protection Advancement Act of 2015, or NCPAA (H.R. 1731) – easily passed and were combined into one labeled H.R. 1560.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ready or not, ultra HD is here

As women's soccer teams took the field for the final match of FIFA Women's World Cup Canada 2015 this summer, some fans enjoyed the games via 8K video - the most technologically advanced high-definition video technology on the market. Fox Sports and NHK, Japan's national public broadcasting organization, offered invitation-only 8K demos of the Japan vs. Cameroon game, and the U.S. vs. Nigeria match at the Fox Studio lot in Los Angeles. To top it off, FIFA and NHK produced the championship game in ultra-HD 8K and presented in live viewings in Japan, as well. Viewer response was positive, to say the least.To read this article in full or to leave a comment, please click here

PlantUML – Making Complicated Diagrams Simpler

plantuml-title

A colleague at work recently told me that I should check out PlantUML. His advice is usually good, and this is no exception.

PlantUML uses a relatively simple text language to describe the desired diagram, then makes generation of the image as simple as processing the UML file. It’s easy to try online at http://plantuml.com/ where there is a text editor with real time image updates as you add more content.

Sequence Diagrams

Sequence diagrams are probably the simplest to build, and are absurdly fast to create. Here’s a simple example of a TCP exchange:

plantuml-tcpTo create this, I used the following PlantUML:

@startuml
title : TCP Exchange
HostA -> HostB : SYN
HostB -> HostA : SYN+ACK
HostA -> HostB : ACK
HostA -> HostB : Data
HostB -> HostA : ACK
HostB -> HostA : FIN
HostA -> HostB : ACK
HostA -> HostB : FIN
HostB -> HostA : ACK
@enduml

You’re not limited to two endpoints, of course:

plantuml-gossip

Use Case Diagrams

Here’s a simple use case with Fred and Joe again:

plantuml-reprimandThe PlantUML to generate this was:

@startuml
title : Result of Gossip
Fred --> (HR) : complaint
(Legal) -> (HR) : advice
(HR) ->  Continue reading

Linux Foundation’s security checklist can help sysadmins harden workstations

If you're a Linux user, especially a systems administrator, the Linux Foundation has some security tips to share with you, and they're quite good. Konstantin Ryabitsev, the Foundation's director of collaborative IT services, published the security checklist that the organization uses to harden the laptops of its remote sysadmins against attacks. The recommendations aim to balance security decisions with usability and are accompanied by explanations of why they were considered. They also have different severity levels: critical, moderate, low and paranoid.To read this article in full or to leave a comment, please click here

The Silo of Focus

FocusHow often, in our careers, are we told to focus on one thing at a time? I would guess I see some message about this, such as the image to the left in this post, at least once a week, if not once a day.

In general, I agree with the sentiment. If you really want to get something done, do it, rather than doing a lot of things at once. The reason for this, I think, is because multitasked work tends to result in half-work, which is something to be avoided at all costs.

Avoid half-work more than anything. Do not imitate those people who sit long at their desks but let their minds wander. It is better to shorten the time and use it intensely, to increase its value, which is all that counts. Do something, or do nothing at all. Do ardently whatever you decide to do; do it with your might; and let the whole of your activity be a series of vigorous fresh starts. Half-work, which is half-rest, is good neither for rest nor for work. via Sertillanges, The Intellectual Life

But there is another side to focus we need to be wary of as Continue reading

Boeing’s laser hunts for drones

Boeing's portable drone-destroying laser system is one step closer to the battlefield after a recent test. Earlier this month in California, Boeing's second-generation, compact-laser weapons system disabled a moving, untethered drone. That's important as enemies can easily acquire commercially available drones -- also known as unmanned aerial vehicles (UAVs) -- and use them to deliver explosives or perform reconnaissance. To read this article in full or to leave a comment, please click here

The disaster-recovery lessons we learned after Katrina

A decade ago New Orleans and the Gulf Coast of the United States were devastated by the sixth strongest Atlantic hurricane ever recorded. The National Oceanic and Atmospheric Administration claims Hurricane Katrina was the most destructive storm to ever strike the United States.The destruction from the hurricane itself, and the subsequent flooding that put most of New Orleans underwater knocked many businesses out of commission—and more than a few completely out of existence. Thankfully, we have learned a lot of hard lessons in the wake of Hurricane Katrina that businesses can use to be better-prepared for the next major disaster.An article from USA Today in 2007—two years after Hurricane Katrina—estimates that 7,900 businesses in New Orleans and southeast Louisiana went out of existence as a result of Katrina. Some of those businesses failed as a result of lost revenue resulting from nearly half a million people displaced from the region, but many of those businesses failed as a direct result of the destruction and impact the storm had on their ability to continue operating.To read this article in full or to leave a comment, please click here

Amazon dumps Flash, and the Web is better off

Amazon will stop accepting Flash ads on its advertising network on Tuesday, and it will help make the entire Web more secure, security experts say. According to Amazon, the move was prompted by a recent update from Google Chrome that limited how Flash was displayed on Web pages. Mozilla Firefox and Apple Safari already had similar limitations in place. "his change ensures customers continue to have a positive, consistent experience on Amazon, and that ads displayed across the site function properly for optimal performance," the company said in its announcement. Bad, bad FlashTo read this article in full or to leave a comment, please click here