This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
In late 2007, AOL security researcher William Salusky and his team discovered one of the first reported instances of malvertising -- a digital ad running on aol.com had been configured to serve up malware to unsuspecting visitors. This turned out to be the beginning of a new era where attackers use a company’s digital footprint (web infrastructures and mobile apps) to distribute malware and commit fraud.
For security teams, protecting the digital footprint, which resides outside the firewall, poses three distinct challenges. Namely, securing assets you know about, securing assets you don’t know about (like those created by someone within the organization or by an authorized third-party), and identifying rogue assets that are impersonating the organization’s brand or sub-brands.
To read this article in full or to leave a comment, please click here


Sipping from the firehose is a big problem in the tech industries. Every time I turn around there’s yet another new technology to make everything better. If you can’t quote rule 11, you need to learn it by heart. Now. I’ll wait right here while you do the memorization thing.
So — why the hype cycle? Essentially, it comes down to this: we’re emotionally driven creatures. Advertisers have known this for years; to wit —
Mark the last words in that quote: it’s about selling an experience, rather than a Continue reading
Ubuntu announces a version for devices, Penguin Computing uses it for network operating systems
The post Response: Snappy for Whitebox Switches | Ubuntu Insights appeared first on EtherealMind.
Beyond Google and Facebook, Dell sees an important 'second wave' of hyperscale demand.
This video from Ken Duda at Arista is, perhaps, the best explanation of Arista’s success with customers. As an engineer, I found this talk inspirational. No bonuses for hitting ship dates. This avoids “good enough” code getting shipped. Sure there are money problems associated with this but Arista believes quality is better. You write the […]
The post Response: Arista EOS & Quality appeared first on EtherealMind.
The Docker/shipping container metaphor is overdone. I don’t think people have fully thought through what it might mean if containers do the same thing to computing as they did to shipping. Are we prepared for hipsters taking over derelict data centers?
There is an unpublished rule that all Docker articles must be accompanied by a picture of shipping containers. Forbes is a particularly egregious offender. I don’t know if it’s the work of a serial offender sub-editor, or if it’s a company-wide policy. I suspect the latter.
Then there’s the DC2 Desktop Container Computer Kickstarter campaign:
(I must admit I do like this one)
But what happened when shipping converted to using containers? Consolidation of ports, dramatic reduction in required labour force, leading to waterfront dereliction. Years later cities re-discovered their waterfront spaces, leading to redevelopment & gentrification.
Wharfs went from this:
(Image from State Library of South Australia, CC license)
To this:
(Image by David Dixon, CC license)
To be re-born as this:
(Image from Wikimedia Commons, CC license)
So does that mean that our data centers will go from this:
(Image from Intel Free Press, CC license)
To this:
(Image from Wolfgang Stief, CC license)
One of my readers wondered how long my NFV webinar is supposed to take (and I forgot to add that information to my web site), so he sent me this question: “How long is this webinar? An hour? Two hours? If it says "webinar" does that imply a 60 minute duration, so I shouldn't ask?”
Short answer: live webinar sessions usually take between 90 minutes and 2 hours depending on the breadth of the topic, however…
Intel throws its weight behind OpenStack for the enterprise.
The industry is in a shift from the CLI to the API, from manual to automated, and from closed to open. While some vendors just say they have an API, some provide libraries and tooling to make it easier to consume their APIs. This post specifically highlights open source code that is publicly available on GitHub by vendors that participated in Networking Field Day 10.
Please realize this is not an extensive list, but only what is relevant to the specific products covered in the sessions at Networking Field Day. In order of their presentations…
The APIC-EM, used as part of the IWAN solution, has a full REST API. No SDK or libraries were mentioned, but it doesn’t seem like it’s officially shipping yet anyway — more details can be found here on the APIC-EM.
Both of Big Switch’s controller platforms have complete REST APIs. You can find some code examples here: https://github.com/bigswitch/sample-scripts/tree/master/bcf/webinar
Riverbed also talked quite a bit about their APIs across the SteelHead product suite. You can find plenty of Python libraries on their GitHub page. You can get started here: https://github.com/riverbed/steelscript
Gigamon also released REST APIs so that users can Continue reading
Highlights from Network Field Day 10 include the SD-WAN goldrush, the novel concept of quality products, and the performance-boosting DPDK project.
The post SD-WAN Gold Rush, Quality Products, And DPDK appeared first on Packet Pushers.
Pivotal changes CEOs; Huawei goes big with Linux.