Archive

Category Archives for "Networking"

VMware Goes All In On Kubernetes With Tanzu

VMware kicked off VMworld with more proof that it’s all in on containers in the form of Tanzu,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Recently Published: Azure Networking Demo Videos

Remember my rant about the glacial speed of Azure orchestration system? I decided I won’t allow it to derail yet another event and recorded the demos in advance of the first live session. The final videos are just over an hour long; it probably took me at least three hours to record them.

If you plan to attend the live webinar session on September 12th, you might want to watch at least the first few videos before the live session - I will not waste everyone’s time repeating the demos during the live session.

Top 5 IoT networking security mistakes

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things.That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.To read this article in full, please click here

Top 5 IoT networking security mistakes

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things.That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.To read this article in full, please click here

IBM Drives Quantum-Safe Cryptography Into Its Public Cloud

IBM predicts that due to the rate of progress in quantum computing data protected by current...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Heavy Networking 467: The Journey To SDN

On today's Heavy Networking we look at one organization's journey to SDN, including pitfalls, triumphs, and lessons learned. Guest Sal Rannazzisi, principal network architect at a global pharmaceuticals company, shares details on dealing with vendors, finding and training engineers, developing internal processes, and more.

The post Heavy Networking 467: The Journey To SDN appeared first on Packet Pushers.

Netflix Discovers Severe Kubernetes HTTP/2 Vulnerabilities

Taking a look at how the internet’s HTTP/2 protocol works, Netflix engineers discovered CVE-2019-9512 Ping Flood. This enables an attacker to send continual ping requests to an HTTP/2 peer, causing the peer to create an internal queue of responses. When this happens a server’s CPU and memory can be consumed, which can lead to a denial of service. already issued patches that are found in the following builds: Continue reading

OCP-Certified Storage Revenue Set to Double

Open Compute Project (OCP) certified storage equipment is set to take a bigger bite of the market,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

G7 Leaders: Protect Strong Encryption for a Secure World

Encryption protects us every day. It helps secure web browsing, online banking, and critical public services like electricity, elections, hospitals, transportation, and more.

If the G7 countries are truly committed to building a safer and equal world, then it is crucial to recognize the important role that end-to-end encryption plays in securing the Internet, their economies and their citizens.

The Internet Society and more than 30 organizations have signed an open letter calling on the G7 leaders to do just that – prioritize digital security – and not to require, coerce, or persuade device manufacturers, application, and service providers to:

  • modify their products or services or delay patching a bug or security vulnerability to provide exceptional access to encrypted content;
  • turn off “encryption-on-by-default”;
  • cease offering end-to-end encrypted services; or
  • otherwise undermine the security of encrypted services.

Digital security is the foundation of our connected economies and societies. And digital security is underpinned by strong encryption! It ensures that data – whether that of law enforcement, banks, or everyday citizens – can only be accessed by its intended recipient. Any attempt to insert “exceptional” or “lawful” access to encrypted content provides a way for others, including criminals, to gain access. This weakens Continue reading

Weekly Wrap: Microsoft, Intel, Red Hat Back Confidential Computing

SDxCentral Weekly Wrap for Aug. 26, 2019: Microsoft, Intel, and Red Hat back a confidential...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tibit Raises $25M in Series B Funding

The company is using the funds to support its MicroPlug optical line terminal (OLT), which is a...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Verizon Launches Mobile 5G Network in ‘Valley of the Sun’

Verizon today launched 5G service in Phoenix, rounding out the operator's first 10 cities to gain...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Measurement Lab: How Do We Know If the Internet Is Open?

An open Internet is the foundation of access and innovation, where users can go where they want, when they want without discrimination. But how do we know if the Internet is truly open? As individuals, our Internet performance experience is mediated by our physical location, infrastructure, government, and Internet service providers. Yet we are largely blind to how our Internet is impacted by these systems. Without that knowledge, innovation stalls, disparity of access grows, and people become isolated from this critical piece of global infrastructure.

Measurement Lab (M-Lab), a fiscally sponsored project of Code for Science & Society, is a consortium of research, industry, and public interest partners focused on fostering, collecting, and publishing open Internet performance data. M-Lab was founded in 2008 to build a global platform designed to enable anyone to measure their Internet service using open source tools. Over ten years later, M-Lab collects over 2 million measurements per day worldwide and has become a trusted source of open data and tools to gather and understand Internet infrastructure from the consumer perspective. Cities and municipal governments; national regulators and government agencies; academics and researchers; ISPs, network operators, and companies; civil society and advocacy organizations; and the Continue reading

VMware Adds Containers to Its Cloud Provider Platform

In addition to spending billions of dollars buying companies in the lead up to VMworld next week,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Announcing a New Open Source Service Mesh Interoperation Collaboration

Service mesh is fast becoming such a vital part of the infrastructure underlying microservices and traditional applications alike that every industry player must have an offering in the space. Because a variety of differentiated service meshes and service mesh services are emerging, it has become clear that interoperability between them will be critical for customers seeking to interconnect a wide variety of workloads.

With that in mind, we are excited to share that VMware has partnered with Google Cloud, HashiCorp, and Pivotal on an open source project for service mesh interoperability. This initiative will facilitate federation of service discovery between different service meshes of potentially different vendors. Through an API, service meshes can be interconnected to deliver the associated benefits of observability, control, and security across different organizational unit boundaries, and potentially across different products and vendors. The project will soon be opened to the community, and anyone interested in contributing to this effort can do so on GitHub.

Partnering With Industry Leaders on Service Mesh Interoperation

Enterprises increasingly rely on APIs to coordinate business functions that span departmental, organization or vendor boundaries. This implies reliability, operability, security and access constraints on these API calls to ensure business Continue reading

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black.VMware said during its quarterly financial call this week it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology, and about $2.1 billion for the security technology of Carbon Black, which includes its Predictive Security Cloud and other endpoint-security software.  Both amounts represent the enterprise value of the deals the actual purchase prices will vary, experts said.To read this article in full, please click here

VMware spends $4.8B to grab Pivotal, Carbon Black to secure, develop integrated cloud world

All things cloud are major topics of conversation at the VMworld user conference next week, ratcheded up a notch by VMware's $4.8 billion plans to acquire cloud development firm Pivotal and security provider Carbon Black.VMware said during its quarterly financial call this week it would spend about $2.7 billion on Pivotal and its Cloud Foundry hybrid cloud development technology, and about $2.1 billion for the security technology of Carbon Black, which includes its Predictive Security Cloud and other endpoint-security software.  Both amounts represent the enterprise value of the deals the actual purchase prices will vary, experts said.To read this article in full, please click here

Red Hat Creates Service Mesh for OpenShift

Red Hat is unveiling its own service mesh for Jaeger project for tracing, and service mesh typically runs as a sidecar as a communication layer between services for microservices-based application architectures. It handles traffic management, policy enforcement and service identity and security. “We have taken the upstream Istio and written an Operator that handles the deployment and management of Istio itself. With the upstream version, you have to run all the sidecar containers with an escalated level of privilege — the Kubernetes equivalent of running things as a root user,” explained OpenShift Service Mesh, through having the Operator there and a CNI (container networking interface) plugin we wrote, you can run Istio and bring up those sidecar components without providing additional privileges to the application components of Istio itself,” he added. Its features include: Tracing and measurement: using Jaeger, developers can track a request between services from start to finish. Visualization and observability: Kiali Continue reading

Looking for the Ultimate Phone Holder? Here are Your Best Bets.

While it may seem like people have their cellphones glued to their hand or to their ear, the truth is that there are times when you need your hands free to attend to other tasks or activities (like driving). Having a great phone holder in your car, for instance, allows you to still use your phone even when your hands may be occupied. If you are looking for the ultimate phone holder, here are some of your best bets.

The Ultimate Phone Holder for Your Home or Desk

Making or taking a phone call when you are cooking, typing at your desk, or eating is something that happens on a regular basis. Having a cellphone phone holder for in your home can make multi-tasking, whether talking on the phone, doing research, or following a recipe, much easier. 

We recommend the Lamicall phone holder, which comes with the Lamicall phone dock. It has a low center of gravity (so your smartphone won’t tip over), rubber cushions to protect your phone from scratches, holds all phones 14mm or less, and is compatible with all phones 6 to 8 inches. The phone stand comes in black, red, silver, or gray. 

Continue reading

Video: Networking Challenges

Whenever you’re discussing a complex topic it’s worth adhering to two principles: (A) identify the challenges you’re trying to solve and (B) start as simple as you can and add complexity later.

We did exactly that in the Introducing Networking Challenges part of How Networks Really Work webinar. We started with the simplest possible case of two computers connected with a cable… and even there identified a plethora of challenges that had to be solved more than half a century ago (and still have to be solved today no matter what magic software-defined technology someone pulls out of their wizard hat).

You need free ipSpace.net subscription to watch the video, or a paid ipSpace.net subscriptions to watch the rest of the webinar.