Archive

Category Archives for "Networking"

Hypermyopia In The World Of Networking

myopia

The more debate I hear over protocols and product positioning in the networking market today, the more I realize that networking has a very big problem with myopia when it comes to building products. Sometimes that’s good. But when you can’t even see the trees for the bark, let alone the forest, then it’s time to reassess what’s going on.

Way Too Close

Sit down in a bar in Silicon Valley and you’ll hear all kinds of debates about which protocols you should be using in your startup’s project. OpenFlow has its favorite backers. Others say things like Stateless Transport Tunneling (STT) are the way to go. Still others have backed a new favorite draft protocol that’s being fast-tracked at the IETF meetings. The debates go on and on. It ends up looking a lot like this famous video.

But what does this have to do with the product? In the end, do the users really care which transport protocol you used? Is the forward table population mechanism of critical importance to them? Or are they more concerned with how the system works? How easy it is to install? How effective it is at letting them do their jobs?

The Continue reading

Browser fingerprints, and why they are so hard to erase

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Web advertisers and many others have long appreciated the volumes of information they can collect on us based only on our web browsing patterns. The data can be quite telling, revealing our locations, incomes, family status, interests and many other facts that advertisers can use to target you.

Understandably, most of us would prefer that “big brother like” advertising networks aren’t always watching over our shoulder, while going about regular activities including product research and purchase option exploration and especially not while investigating medical or other highly sensitive topics.

To read this article in full or to leave a comment, please click here

Device Naming Conventions – What’s in a Name?

Choosing a device hostname seems trivial to say the least. However, from multiple design meetings, this is a topic that tends to drag on. Everyone has a preference, and opinion or just set in the...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Device Naming Conventions – What’s in a Name?

Choosing a device hostname seems trivial to say the least. However, from multiple design meetings, this is a topic that tends to drag on. Everyone has a preference, and opinion or just set in the...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Device Naming Conventions – What’s in a Name?

Choosing a device hostname seems trivial to say the least. However, from multiple design meetings, this is a topic that tends to drag on. Everyone has a preference, and opinion or just set in the...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Ex-FCC attorney says Internet plan won’t achieve broadband goals

Most Americans have no idea what net neutrality means or is supposed to accomplish, even though plenty has been written on the topic.And some people, even a few informed Internet activists, remain unconvinced that the current debate over net neutrality matters that much. They wonder whether the so-called Title II reclassification of Internet providers will really result in more affordable and available broadband.MORE ON NETWORK WORLD: 5 free Ethernet tools you should check out What specifically is up for debate now is Federal Communications Commission (FCC) Chairman Tom Wheeler's proposal to regulate broadband Internet providers like utilities by reclassifying them under Title II of the Telecommunications Act, among other actions. The full five-member FCC is set to vote on the issue Feb. 26.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, February 17

Spy group has embedded tools in foreign networks, systemsA cyberspy group using tools similar to those of U.S. intelligence agencies has embedded spy and sabotage firmware in systems and networks in countries including Iran, Russia, Pakistan and China, a report by security vendor Kaspersky Lab claims. Kaspersky said that the tools can’t be combated by antivirus products and are also able to stealthily obtain a computer’s encryption keys in order to read otherwise protected data.Sony forges ahead with its SmartEyeglassTo read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Tuesday, February 17

Spy group has embedded tools in foreign networks, systemsA cyberspy group using tools similar to those of U.S. intelligence agencies has embedded spy and sabotage firmware in systems and networks in countries including Iran, Russia, Pakistan and China, a report by security vendor Kaspersky Lab claims. Kaspersky said that the tools can’t be combated by antivirus products and are also able to stealthily obtain a computer’s encryption keys in order to read otherwise protected data.Sony forges ahead with its SmartEyeglassTo read this article in full or to leave a comment, please click here

Sony to release developer edition smart glasses for $840

While Google is pulling back from a consumer release of Glass, Sony is moving forward with sales to developers of its augmented reality SmartEyeglass.The struggling Japanese manufacturer said Tuesday it will release its Android-compatible smart glasses for US$840 in early March, targeting developers and industrial applications ahead of a commercial release in 2016.That's just over half of the $1,500 that Google was asking from early adopters of Glass before it shut down commercial sales of the wearable display last month."As a hands-free device, SmartEyeglass can be a promising product with many practical uses," a Sony spokeswoman said via email when asked about the release in the wake of Google's move. "But since we recognize the need to explore applications at this stage, we're releasing this developer edition."To read this article in full or to leave a comment, please click here

Opening the Black Box – Linux Network OS for Bare Metal Switches

Transform the network from gatekeeper to enabler with a Linux Network OS platform for switches that enables automation, feature velocity and innovation on par with servers.

“The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion.” – Albert Camus

In my role as a Customer Solutions Engineer (affectionately known as CSE) at Cumulus Networks, I am on the frontlines discussing customer requirements, use cases and networking architectures. A frequent question that customers ask me is “what can an open network operating system (OS) do for me?”

Most customers have lived in the world of black boxes where the OS and hardware are vertically integrated and your vendor keeps you in a sandbox that controls what you can and cannot do. In the black box world, if you want a new feature, application or a different operational model, you have to request it from your account team and wait while the vendor decides if your use case is important enough or you are a big enough customer.

The idea of having direct access to the different operational aspects of the OS is a foreign concept Continue reading

Payments startup iZettle makes chip & PIN card reader available for free

With a free Chip & PIN card reader, Swedish mobile payments company iZettle is lowering the threshold for small companies to start accepting card payments.The Card Reader Lite, released Tuesday, connects to tablets or smartphones via an audio cable and it is meant to lower the cost barriers small merchants face when setting up their businesses, iZettle said.Startup costs weren’t that high to begin with though. Businesses only pay €49 (about US$55) for iZettle’s wireless Bluetooth card reader, which it will continue to offer, and similar readers from competing services such as Payleven and SumUp cost only a little more at €79.To read this article in full or to leave a comment, please click here

Payments startup iZettle makes chip & PIN card reader available for free

With a free Chip & PIN card reader, Swedish mobile payments company iZettle is lowering the threshold for small companies to start accepting card payments.The Card Reader Lite, released Tuesday, connects to tablets or smartphones via an audio cable and it is meant to lower the cost barriers small merchants face when setting up their businesses, iZettle said.Startup costs weren’t that high to begin with though. Businesses only pay €49 (about US$55) for iZettle’s wireless Bluetooth card reader, which it will continue to offer, and similar readers from competing services such as Payleven and SumUp cost only a little more at €79.To read this article in full or to leave a comment, please click here

Google targets Chinese developers with new YouTube channel

Even as China continues to block its services, Google has started a localized YouTube channel for developers in the country, aiming to bring more Chinese-made apps to its platforms.The new YouTube channel, announced on Monday, will serve up videos discussing Google technologies such as Android, either translated with subtitles, or spoken in Mandarin Chinese.The company announced the channel about four months after it opened Google Play to developers based in mainland China.To read this article in full or to leave a comment, please click here

Device Naming Conventions – What’s in a Name

Choosing a device hostname seems trivial to say the least. However, from multiple design meetings, this is a topic that tends to drag on. Everyone has a preference, and opinion or just set in the...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.Kaspersky Lab released a report Monday that said the tools were created by the “Equation” group, which it stopped short of linking to the U.S. National Security Agency.The tools, exploits and malware used by the group—named after its penchant for encryption—have strong similarities with NSA techniques described in top-secret documents leaked in 2013.Countries hit the most by Equation include Iran, Russia, Pakistan, Afghanistan, India and China. Targets in those countries included the military, telecommunications, embassies, government, research institutions and Islamic scholars, Kaspersky said.To read this article in full or to leave a comment, please click here

BGP routing incidents in 2014, malicious or not?

Over the last year we have seen and written about numerous BGP routing incidents that looked out of the ordinary, straight-up suspicious or were just configuration mistakes. In this blog post we will highlight a few of them and look at the impact and cause of each of the observed incidents and try to determine if there was any malicious intent.

I presented the same data last week at NANOG 63, in San Antonio, a recording of this presentation can be found below:

BGP hijacking for monetary gain.

bitcoin-robber We have all heard of Bitcoin, it’s been in the news quite a bit and chances are that some of you are mining Bitcoins right now. There are now computing devices optimized for Bitcoin mining and even dedicated Bitcoin mining data centers. In addition to the dedicated data centers, many Bitcoin miners use cloud compute instances from Amazon, OVH, Digital Ocean, etc. So it’s obvious that there is a lot of money spent on Bitcoin mining & trading; and as such there is also an opportunity to make a quick buck.
This summer we blogged about a series of BGP hijacks where an attacker cleverly misused the Bitcoin stratum protocol. By Continue reading

Campaigners offer simpler way to find out if British government spied on you

There’s now an easier way to discover whether the U.K. intelligence services illegally obtained your information from their U.S. colleagues—but you’ll have to tell a U.K. campaign group as well as the U.K. Government Communications Headquarters your details to find out.Civil rights group Privacy International has launched a website to allow anyone in the world to ask whether GCHQ has illegally spied on them. If you’re curious to find out you can sign up by giving the group your name, email address and, optionally, your phone number, and granting its legal team permission to share the data with GCHQ and the U.K.’s Investigatory Powers Tribunal.To read this article in full or to leave a comment, please click here