Archive

Category Archives for "Networking"

Brocade switch extends SDN, campus automation

Brocade this week unveiled a campus switch and other enhancements to better support video and wireless traffic, improve management and extend software defined networking. The new switch is the ICX 7250. It supports up to eight 10G Ethernet ports for uplinks or stacking, and can be stacked 12-high into a virtual chassis supporting 576 Gigabit Ethernet and 96 10G ports. Brocade says this density will enable campus networks to better support bandwidth-intensive video and wireless traffic.To read this article in full or to leave a comment, please click here

Brocade switch extends SDN, campus automation

Brocade this week unveiled a campus switch and other enhancements to better support video and wireless traffic, improve management and extend software defined networking. The new switch is the ICX 7250. It supports up to eight 10G Ethernet ports for uplinks or stacking, and can be stacked 12-high into a virtual chassis supporting 576 Gigabit Ethernet and 96 10G ports. Brocade says this density will enable campus networks to better support bandwidth-intensive video and wireless traffic.To read this article in full or to leave a comment, please click here

Brocade switch extends SDN, campus automation

Brocade this week unveiled a campus switch and other enhancements to better support video and wireless traffic, improve management and extend software defined networking. The new switch is the ICX 7250. It supports up to eight 10G Ethernet ports for uplinks or stacking, and can be stacked 12-high into a virtual chassis supporting 576 Gigabit Ethernet and 96 10G ports. Brocade says this density will enable campus networks to better support bandwidth-intensive video and wireless traffic.To read this article in full or to leave a comment, please click here

Bet you’ve never heard Beethoven on a Tefifon

Unless you are German or collect vintage audio equipment, chances are you have never even heard of the Tefifon. That doesn’t mean it doesn’t have a Wikipedia page, since virtually everything has a Wikipedia page. The Tefifon was a German-developed and manufactured audio playback format that utilized cartridges loaded with an endlessly looped reel of plastic tape (much like the later 4-track and 8-track magnetic audio tape cartridges) with grooves embossed on it, similar to the ones on a phonograph record. Born in the 1950s, it never really caught on, but it’s a fascinating contraption. For a better sense of the Tefifon and how it works, I recommend this 11-minute video from a blog called Techmoan.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, April 9

Facebook’s cred is still intact with teens, survey saysA Pew Research survey has found that Facebook is the most popular social network among teens, debunking the notion that it was losing ground among the younger generation. While 71 percent of all teens surveyed use Facebook, 41 percent said they use it the most often compared to other sites. Snapchat and Instagram aren’t far behind, though.Oz launches subscription video platform Thursday, aims at creatorsIcelandic startup Oz is launching a new video platform and mobile app on Thursday that aims to give artists, small businesses and even journalists a platform to publish videos online and get subscription revenue from viewers. Oz videos will be accessible on the Web as well as on iOS and Android. The company suggests that most content creators charge around $5 per month; the platform supports payments in 120 different currencies, with Oz taking a 30 percent cut of producers’ revenue.To read this article in full or to leave a comment, please click here

Islamist hackers take French broadcaster TV5Monde off air

French-language TV network TV5Monde was hit by a crippling cyberattack Wednesday that disrupted broadcasting across its channels and also involved the hijacking of its website and social media accounts.The attack happened at around 10 p.m. Central European Time and given its scale, probably took serious planning by the attackers—a group that calls itself the Cyber Caliphate. The same group, which claims affiliation to extremist organization ISIS, also hijacked the Twitter accounts of Newsweek, the International Business Times and the U.S. Central Command earlier this year.To read this article in full or to leave a comment, please click here

More Layer-2 Misconceptions

My “What Is Layer-2 and Why Do You Need It?blog post generated numerous replies, including this one:

Pretend you are a device receiving a stream of bits. After you receive some inter-frame spacing bits, whatever comes next is the 2nd layer; whether that is Ethernet, native IP, CLNS/CLNP, whatever.

Not exactly. IP (or CLNS or CLNP) is always a layer-3 protocol regardless of where in the frame it happens to be, and some layer-2 protocols have no header (apart from inter-frame spacing and start-of-frame indicator).

Read more ...

Neverquest: A global threat targeting Financials

By: ASERT Research Team

On March 31st, Arbor’s Security Engineering & Response Team (ASERT) published a detailed threat brief on the Neverquest malware for Arbor customers. Along with thousands of IOC’s (indicators of compromise), the brief details Neverquest’s current inner workings and describes some reversing techniques ASERT uses to unravel and monitor this stealthy and quickly evolving malware. Applying this research at scale to malware and data acquired by our global ATLAS initiative allows us to develop targeted defenses and security context that enables customers to mitigate advanced threats and enhance their security posture over time [1].

This blog post provides excerpts from the Neverquest threat brief along with some new data that was not available at the time the brief was released to customers. In doing so, it also highlights the results of ASERT research activities that feed Arbor products.

Historical Threat Context and Prior Research

Originally, a malware family known as Ursniff was used to build newer malware called Gozi. After some success and a time of inactivity, Gozi was revitalized as Gozi Prinimalka, which has evolved into the modern Vawtrak/Neverquest (referred to as ‘Neverquest’ herein). Foundational threat analysis work has been performed for years on Continue reading

Bringing Enterprise Class Automation to Open Networking

Today Puppet Labs announced that Cumulus Networks has joined its Puppet Supported Program. We’re very excited about this and, if you’re implementing a software-defined data center, you should be excited too.

Is it finally possible to manage the data center instead of just managing stacks?

Because Cumulus Linux is Linux, our customers are able to use the same tools they know and love for managing Linux servers to manage their networks. The joint integration work we’ve done means it’s easier than ever for anyone that wants to automate their data center to extend their change management procedures across both servers and switches, unifying data center and network infrastructure under a single dashboard.

Beyond the streamlining of management consoles, this integration brings a host of business benefits to any organization. For example:

  • Businesses can more quickly deploy applications with integrated, end-to-end application deployment from provisioning the VM to the full-stack (see the diagram below)
  • Unified management and automation significantly reduces human error, meaning more uptime for services and applications
  • Support for multiple Puppet masters across dev, test and production assures full visibility of change management
  • Integration gives networking teams the ability to contribute to the Puppet code that manages infrastructure configuration

Continue reading

Facebook still king of social media among teens

The findings of a new survey debunks theories that Facebook is losing its “cool factor” among teenagers.Facebook is the most popular social network among teens, according to the results of the survey published Wednesday night by the Pew Research Center. The researchers found that 71 percent of all teens use it. And 41 percent of teens said they use Facebook the most often compared to other sites.The findings are a victory for Facebook, which has had to address claims in recent years that its site is losing popularity among teens. In 2013, Facebook’s chief financial officer admitted to a decline in the number of daily users among U.S. teens.To read this article in full or to leave a comment, please click here

Scaling out PostgreSQL for CloudFlare Analytics using CitusDB

When I joined CloudFlare about 18 months ago, we had just started to build out our new Data Platform. At that point, the log processing and analytics pipeline built in the early days of the company had reached its limits. This was due to the rapidly increasing log volume from our Edge Platform where we’ve had to deal with traffic growth in excess of 400% annually.

alt

Our log processing pipeline started out like most everybody else’s: compressed log files shipped to a central location for aggregation by a motley collection of Perl scripts and C++ programs with a single PostgreSQL instance to store the aggregated data. Since then, CloudFlare has grown to serve millions of requests per second for millions of sites. Apart from the hundreds of terabytes of log data that has to be aggregated every day, we also face some unique challenges in providing detailed analytics for each of the millions of sites on CloudFlare.

For the next iteration of our Customer Analytics application, we wanted to get something up and running quickly, try out Kafka, write the aggregation application in Go, and see what could be done to scale out our trusty go-to database, PostgreSQL, from a Continue reading

Cloud computing brings changes for IT security workers

Watch out, computer security professionals: Cloud computing vendors are coming for your jobs.It may be inevitable, or you may be able to take back control by rigorously studying how your organization uses technology. But either way, life is changing for IT security experts.Companies like Google and Amazon have figured out configuration management while enterprises avoid the process, said Marcus Ranum, chief security officer of Tenable.“That’s the reason why Amazon is going to have your jobs in 10 years. We are failing as an industry,” said Ranum, who spoke Wednesday at a meeting of the Information Systems Security Association, New England chapter.To read this article in full or to leave a comment, please click here

In a mock cyberattack, Deloitte teaches the whole business how to respond

A security breach or big data loss can trigger an emergency for the entire business, not just for the IT or security teams, so staffers from multiple departments must know how to react quickly and effectively in such situations.This was one of the main lessons taught in a cyber incident war-gaming exercise held for the media on Tuesday in New York by consulting firm Deloitte.Deloitte typically conducts such exercises on behalf of large organizations that want to prepare for when they are hit by a major computer breach. In Tuesday’s event, the participants were executives from various companies, many of whom had participated in such an exercise before.To read this article in full or to leave a comment, please click here

Reminder: Solarized for Better Terminals

I have used the “Solarized” colour scheme on my Mac for several years. This is:

… a sixteen color palette…designed for use with terminal and gui applications

If you spend a lot of time using the Terminal, this makes a huge difference. It gives me the right combination of colours to make sure everything is readable, and reduces eye-strain.

I’ve used it for so long that I’ve forgotten about it. It’s become “normal” for me.

PuTTY Defaults == Unusable

Recently I’ve been forced to use PuTTY on Windows. I’d forgotten how terrible the default colour scheme is, particularly when you’re using VIM, or doing an “ls” on a RHEL system. Check this screenshot:

putty_default

The default LS_COLORS on a RHEL system, using PuTTY defaults, will displays directories in dark blue on a black background. Hopeless. I can’t read those directory names.

Solarized to the rescue

I downloaded the “Solarized Dark” registry file from here. Double-click that to merge the registry settings. You’ll then see a new PuTTY Saved session “Solarized Dark”:

putty_sessions

Load that session. Save it as the Default Settings if you like. Add any other settings you need – e.g. username, SSH key. Add the hostname/IP, and connect. Now see how Continue reading

HP Moonshot – Stuff I Wish I’d Known

Yeah, it looks just like this.
I've been working with HP Moonshot for some months now. It's a neat box with a lot of interesting features. There are plenty of press releases and (possibly paid-for) "reviews" available out there, but not much frank commentary from actual end users, and that's disappointing.

What is it?
Briefly, Moonshot is a miniature blade enclosure. I'm sure there are marketing folks who would like me to use different terminology, but it boils down to servers, Ethernet switches and power all rolled into one box.

There are some key differentiators between this enclosure and some of its larger cousins:

Low Power - The whole package is tuned for high density and low power. There are no monstrously fast multi-socket servers available, but the density is amazing. With 8 cores per node and 180 nodes per chassis we're talking about 300+ cores per rack unit!

Less Redundancy - Unlike the C-class enclosures which sport redundant "Onboard Administrator" modules, Moonshot has a single "Chassis Manager". I do not view this as a problem for two reasons: First, Moonshot is mostly suited for massively horizontally scalable applications which should tolerate failure of a whole chassis. Second, failure of Continue reading

Dell’s Venue 10 7000 vs Microsoft Surface 3: Same price, different appeal

The Venue 10 7000 from Dell and the Surface 3 from Microsoft share a few things in common: they will ship in a few weeks, are marketed as tablets that can be used as laptops, and start at $499. But they offer different advantages.To determine which one provides better value, buyers must decide whether they’ll use the device mostly as a tablet or as a laptop. Here’s how the products stack up on features.Screen size and resolutionThe Dell Venue 10 7000 has a slight edge on resolution, while the Surface 3 provides more screen size. Dell’s tablet has a 10.5-inch screen that can display images at a 2560 x 1600-pixel resolution, while the Surface 3 has a 10.8-inch screen with a 1920 x 1280-pixel resolution. The Venue uses the emerging OLED technology, while the Surface 3’s more conventional screen is based on LCD technology.To read this article in full or to leave a comment, please click here

PQ Show 47 – VMKernel Bindings & iSCSI with Chris Wahl

Chris Wahl of WahlNetwork.com and co-author of Networking for VMware Administrators joins Ethan Banks for a discussion of when -- and when NOT -- to use VMkernel bindings when doing iSCSI plumbing between VMware hosts and storage arrays.

Author information

Ethan Banks

Ethan Banks, CCIE #20655, has been managing networks for higher ed, government, financials and high tech since 1995. Ethan co-hosts the Packet Pushers Podcast, which has seen over 3M downloads and reaches over 10K listeners. With whatever time is left, Ethan writes for fun & profit, studies for certifications, and enjoys science fiction. @ecbanks

The post PQ Show 47 – VMKernel Bindings & iSCSI with Chris Wahl appeared first on Packet Pushers Podcast and was written by Ethan Banks.