Archive

Category Archives for "Networking"

The Upload: Your tech news briefing for Thursday, February 19

Samsung pushes into mobile payments with LoopPay acquisitionSamsung Electronics is stepping up to Apple and Google on the mobile payments front: On Wednesday it said it would buy LoopPay and roll it into its mobile division. The Massachusetts startup’s technology is, like competitors, basically a virtual wallet for payment cards, but it works with existing magnetic card readers in the U.S.Qualcomm getting set to roll out 64-bit mobile chipsQualcomm is readying new chips for mobile devices that are the first to implement its homegrown 64-bit architecture. The design will appear first in high-end Snapdragon chips for premium products, and test units will be shipping by the end of the year.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, February 19

Samsung pushes into mobile payments with LoopPay acquisitionSamsung Electronics is stepping up to Apple and Google on the mobile payments front: On Wednesday it said it would buy LoopPay and roll it into its mobile division. The Massachusetts startup’s technology is, like competitors, basically a virtual wallet for payment cards, but it works with existing magnetic card readers in the U.S.Qualcomm getting set to roll out 64-bit mobile chipsQualcomm is readying new chips for mobile devices that are the first to implement its homegrown 64-bit architecture. The design will appear first in high-end Snapdragon chips for premium products, and test units will be shipping by the end of the year.To read this article in full or to leave a comment, please click here

Japan’s curious love for old-school flip-phones continues

Outmoded technology dies hard in futuristic Japan.Telegrams remain popular, the fax machine industry is alive and well and now shipments of feature phones are on the rise.For the first time in seven years, shipments of old-school flip phones increased in 2014 while those of smartphones fell. While it may be a statistical anomaly, Japan’s flip phones are highly evolved devices with unique features that keep them popular.Feature phones notched a 5.7 percent gain last year to 10.5 million units, compared to a 5.3 percent drop in smartphone shipments to 27.7 million, according to MM Research Institute (MMRI), which noted that Apple retains a dominant smartphone share of about 60 percent. The MMRI study followed feature phones, which in Japan consist mainly of flip phones,To read this article in full or to leave a comment, please click here

Why oh why?

So i have been using Juniper MX routers for some years now (mainly MX80’s) and have configured CoS in reasonably basic forms to suit $dayjob’s needs (mainly 4 queues). It turns out that even though the MX routers support 8 … Continue reading

Kubernetes 101 – External access into the cluster

In our last post, we looked at how Kubernetes handles the bulk of it’s networking.  What we didn’t cover yet, was how to access services deployed in the Kubernetes cluster from outside the cluster.  Obviously services that live in pods can be accessed directly as each pod has its own routable IP address.  But what if we want something a little more dynamic?  What if we used a replication controller to scale our web front end? We have the Kubernetes service, but what I would call its VIP range (Portal Net) isn’t routable on the network.  There are a couple of ways to solve this problem.  Let’s walk through the problem and talk about a couple of ways to solve it.  I’ll demonstrate the way I chose to solve it but that doesn’t imply that there aren’t other better ways as well.

As we’ve seen, Kubernetes has a built-in load balancer which it refers to as a service.  A service is group of pods that all provide the same function.  Services are accessible by other pods through an IP address which is allocated out of the clusters portal net allocation.  Continue reading

The Cisco CNPES Cert, First Exam (600-504) and Course

Do you think of yourself as a network engineer? Cisco’s Network Programmability Engineer Specialist (CPNES) certification represents Cisco’s first crack at a certification focused on network engineering in an SDN world. Today’s post begins to examine this certification by looking at the first of the two required exams: the 600-504 NPENG exam. We’ll look at both the exam and a related video course.

Other posts in this series:

Overview

First, to set the stage, Cisco currently offers four network programmability certifications. Loosely you can think of these as two networking-focused certs, and two development-focused certs, based on job roles. For the two networking-focused certs, one focuses on design, while one (the one discussed here) looks at engineering and implementation.

Figure 1: Overview of Cisco SDN Certifications

 

Today’s post focuses on the cisco network programmability engineering specialist (CNPES) cert, and specifically the first exam: the 600-504 NPENG exam. Basically, the NPENG exam covers SDN implementation but excludes ACI, while the second required exam, 600-512 NPENGACI, includes ACI.

This list provides the links for more details – for the certification, each of the two exams, and each of Cisco’s two Continue reading

MPLS VPN and DMVPN Design Challenge

MPLS VPN is used mostly as primary connectivity and DMVPN as a backup in the small medium business. You might see in some cases DMVPN is the only the circuit between remote offices and the datacenter/HQ, or for some applications MPLS VPN might be the primary,DMVPN for the others. As an example high throughput, high… Read More »

The post MPLS VPN and DMVPN Design Challenge appeared first on Network Design and Architecture.

Google worried US could use amended warrant rule to search computers abroad

Google has opposed moves by the U.S. Department of Justice to extend the warrant issuing authority of magistrate judges to searches of computers in districts other than their own.Innocuous as that may sound, Google is concerned that the proposed amendment would likely end up being used by U.S. law enforcement to directly search computers and devices anywhere in the world.There is nothing in the proposed change to the Federal Rule of Criminal Procedure 41 that would prevent access to computers and devices worldwide, wrote Richard Salgado, Google’s legal director for law enforcement and information security, in a blog post Wednesday.To read this article in full or to leave a comment, please click here

Swedish man pleads guilty to peddling Blackshades malware

A Swedish man pleaded guilty Wednesday to peddling one of the most prevalent spying programs called Blackshades that was widely used by the criminal underground.Alex Yucel, 24, pleaded guilty to one count of distributing malicious software. He could face a maximum of 10 years in prison, the U.S. Attorney’s Office for the Southern District of New York said. He is expected to be sentenced on May 22.BlackShades, a remote access trojan, was marketed by its developers as a program for legitimate computer monitoring but was mostly used for stealing payment card data, recording a computer’s keystrokes and secretly controlling webcams. It was sold for between US$40 to $100.To read this article in full or to leave a comment, please click here

Tens of thousands of home routers at risk with duplicate SSH keys

A setup mistake has apparently left hundreds of thousands of home routers running the SSH (Secure Shell) remote access tool with identical private and public keys.John Matherly used Shodan, a specialized search engine for querying Internet-connected devices, and found more than 250,000 devices that appear to be deployed by Telefónica de España sharing the same public SSH key.+ ON THE LIGHTER SIDE: Most Memorable Saturday Night Live Techie Skits & Bits +Matherly, who founded Shodan, performed the search after someone posted a shorter version of a public key—called a fingerprint—for their device.To read this article in full or to leave a comment, please click here

Mobile networks limber up for the Internet of Things

Changes starting to take place behind the scenes in mobile networks may eventually pay dividends to anyone with a smartphone, a connected refrigerator or an IT department.Carriers have done things pretty much the same way for years, with cellular base stations at the edge of their networks feeding into a series of specialized appliances at central facilities. Now they’re virtualizing those networks in several ways, seeking the same rewards that enterprises have reaped by virtualizing data centers: efficiency and flexibility. The trend will be in full swing at Mobile World Congress in Barcelona next month.It’s good news for mobile users that they may not hear much about. A more efficient network leaves more free capacity for the video or application you want to run, and a more flexible carrier could quickly launch services in the future that you don’t even know you’ll need yet. The new architectures may even change how some businesses pay for mobile services.To read this article in full or to leave a comment, please click here

Mobile networks limber up for the Internet of Things

Changes starting to take place behind the scenes in mobile networks may eventually pay dividends to anyone with a smartphone, a connected refrigerator or an IT department.Carriers have done things pretty much the same way for years, with cellular base stations at the edge of their networks feeding into a series of specialized appliances at central facilities. Now they’re virtualizing those networks in several ways, seeking the same rewards that enterprises have reaped by virtualizing data centers: efficiency and flexibility. The trend will be in full swing at Mobile World Congress in Barcelona next month.It’s good news for mobile users that they may not hear much about. A more efficient network leaves more free capacity for the video or application you want to run, and a more flexible carrier could quickly launch services in the future that you don’t even know you’ll need yet. The new architectures may even change how some businesses pay for mobile services.To read this article in full or to leave a comment, please click here

Liquid Telecom raises $150 million to extend broadband in Africa

Liquid Telecom has raised US$150 million to extend its fiber networks across Africa, a sign of the growing need for broadband services on the continent.The company, controlled by African telecom company Econet Wireless, has already invested heavily in East Africa, where it is laying thousands of kilometers of new fiber-optic cable to connect Burundi and the Democratic Republic of Congo.The company has also already completed its East Africa fiber ring, which connects Kenya, Uganda and Tanzania, in order to provide high speeds and continuous uptime across the region.Liquid will use the additional funds it raised to build fibre broadband networks in several other countries.To read this article in full or to leave a comment, please click here

Long-awaited Blackphone tablet may emerge at MWC

Paranoid tablet users, rejoice. The first units of the secure Blackphone tablet will be demonstrated at the upcoming Mobile World Congress show in Barcelona early next month.The tablet will be the second product from SGP Technologies, which makes the privacy-centric Blackphone smartphone. A pre-release version of the tablet will be shown at the booth of Graphite Software, which has written a special interface for the device to run sensitive applications.SGP is planning a press conference at MWC where it will probably announce the tablet. A Blackphone spokesman declined to share details on the tablet launch or the press conference. However, a Graphite Software executive said the tablet would be announced at MWC and would be on display at Blackphone’s booth as well as Graphite’s.To read this article in full or to leave a comment, please click here

Long-awaited Blackphone tablet may emerge at MWC

Paranoid tablet users, rejoice. The first units of the secure Blackphone tablet will be demonstrated at the upcoming Mobile World Congress show in Barcelona early next month.The tablet will be the second product from SGP Technologies, which makes the privacy-centric Blackphone smartphone. A pre-release version of the tablet will be shown at the booth of Graphite Software, which has written a special interface for the device to run sensitive applications.SGP is planning a press conference at MWC where it will probably announce the tablet. A Blackphone spokesman declined to share details on the tablet launch or the press conference. However, a Graphite Software executive said the tablet would be announced at MWC and would be on display at Blackphone’s booth as well as Graphite’s.To read this article in full or to leave a comment, please click here