Archive

Category Archives for "Networking"

Nyansa’s Voyance expands to the IoT

Nyansa announced today that their flagship Voyance product can now apply its AI-based secret sauce to IoT devices, over and above the networking equipment and IT endpoints it could already manage.Voyance – a network management product that leverages AI to automate the discovery of devices on the network and identify unusual behavior – has been around for two years now, and Nyansa says that it’s being used to observe a total of 25 million client devices operating across roughly 200 customer networks. More on IoT:To read this article in full, please click here

Why You Should Block Notifications and Close Your Browser

Every so often, while browsing the web, you run into a web page that asks if you would like to allow the site to push notifications to your browser. Apparently, according to the paper under review, about 12% of the people who receive this notification allow notifications. What, precisely, is this doing, and what are the side effects?

Papadopoulos, Panagiotis, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, and Giorgos Vasiliadis. “Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.” In Proceedings 2019 Network and Distributed System Security Symposium. San Diego, CA: Internet Society, 2019. https://doi.org/10.14722/ndss.2019.23070.

Allowing notifications allows the server to kick off one of two different kinds of processes on the local computer, a service worker. There are, in fact, two kinds of worker apps that can run “behind” a web site in HTML5; the web worker and the service worker. The web worker is designed to calculate or locally render some object that will appear on the site, such as unencrypting a downloaded audio file for local rendition. This moves the processing load (including the power and cooling use!) from the server to the client, saving money Continue reading

The Week in Internet News: Tech Giants’ ‘Ethical AI’ Efforts Scrutinized

Building nice AIs: Efforts by large tech vendors to think about ways to design “ethical Artificial Intelligence” systems have hit some speedbumps along the way, says Insurance Journal. Google abandoned its newly formed ethical AI council after employee complaints about its membership. Some critics say efforts to create ethical AI teams are attempts by companies to avoid regulations.

No smoking or bikinis: Business Insider India has a look at the efforts of the Chinese government to police Internet and social media content, with smoking, excessive tattoos, and in some cases, bikinis prohibited. At Inke, one of China’s largest livestreaming companies, a group of about 1,200 moderators attempt to keep up with the government’s rules, the story says.

Fake news arms race: Facebook has announced a new round of efforts to fight fake news with updates to updates to News Feed, Messenger, and Instagram, Fortune reports. The social media giant is expanding its fact-checking capabilities, and it is trying to limit the reach of groups that repeatedly spread misinformation. Facebook also says it’s getting better at identifying click-bait.

Comments gone wild: YouTube shut down comments on the livestream of a U.S. Congress hearing on white nationalism after the comments section Continue reading

Privacy First for Security Companies

Privacy has become a major issue around the world. Hopeful presidential candidates, such as Elizabeth Warren, have proposed privacy legislation and European countries are beginning to issue their first judgements based on GDPR violations. Given this evolving environment, the Internet Society participated in a panel on data privacy at the ISC-West conference on 11 April 2019.

The conference was sponsored by ADT, one of the largest home security companies and an Internet Society organizational member. The panel included Frank Cona from ADT, Dylan Gilbert from Public Knowledge, Brandon Board from Resideo, and Kenneth Olmstead from the Internet Society.

The discussion focused on two main themes. The first was that in the data-driven economy, user agency is more important than ever. Users must be able to ask companies what data they have about them and be able to update or delete that data. The second was that companies must put privacy at the forefront of their business practices. Privacy cannot be an afterthought, but must be the starting point.

There was not consensus among panelists regarding whether there will be Federal privacy legislation at some point, but it was clear that the security industry should do its best to implement privacy Continue reading

Automating 802.1x (Part One)

This is a guest blog post by Albert Siersema, senior network and cloud engineer at Mediacaster.nl. He’s always busy broadening his horizons and helping his customers in (re)designing and automating their infrastructure deployment and management.


We’d like to be able to automate our network deployment and management from a single source of truth, but before we get there from a running (enterprise, campus!) network, we’ll have to take some small steps first.

These posts are not focused on 802.1x, but it serves as a nice use case in which I’ll show you how automation can save time and bring some consistency and uniformity to the network (device) configuration.

Read more ...

5 times when cloud repatriation makes sense

A growing number of enterprises are pulling selected applications out of the cloud and returning them to their brick-and-mortar data centers. Cloud repatriation is gaining momentum as enterprises realize the cloud isn't always the best solution to IT cost, performance and other concerns.Dave Cope, senior director of market development for Cisco's CloudCenter, believes that technology has evolved to the point where enterprises now have the unprecedented freedom to locate applications wherever maximum cost, performance and security benefits can be achieved. "There’s an ability to place workloads where they best reside based on business priorities, not IT constraints," he notes. "We’re starting to get this natural distribution of workloads across existing and new environments … where they make the most sense."To read this article in full, please click here

5 times when cloud repatriation makes sense

A growing number of enterprises are pulling selected applications out of the cloud and returning them to their brick-and-mortar data centers. Cloud repatriation is gaining momentum as enterprises realize the cloud isn't always the best solution to IT cost, performance and other concerns.Dave Cope, senior director of market development for Cisco's CloudCenter, believes that technology has evolved to the point where enterprises now have the unprecedented freedom to locate applications wherever maximum cost, performance and security benefits can be achieved. "There’s an ability to place workloads where they best reside based on business priorities, not IT constraints," he notes. "We’re starting to get this natural distribution of workloads across existing and new environments … where they make the most sense."To read this article in full, please click here

Our Green Card Journey

We are now Lawful Permanent Residents of the United States - aka Green Card Holders. It took a few years to get to this point. Here’s our timeline, why we did it, what it means for us, and what next.

Timeline

I first moved to the US on an L-1B visa. This is an intra-company transfer visa, that let me move to the US to continue working for Brocade.

  • May 2015 - Began work for Brocade, based in New Zealand.
  • Jul 2016 - Received L-1B visa, allowing us to move to US.
  • Aug 2016 - Moved from New Zealand to US.
  • Nov 2016 - Broadcom announces intention to acquire Brocade
  • Nov 2016 - Green Card process initiated - Department of Labour certification filed.
  • Jul 2017 - PERM filed.
  • Oct 2017 - Extreme Network acquired my business unit. I remained employee of Broadcom.
  • Nov 2017 - PERM approved.
  • Jan 2018 - Received permission to transfer L-1 visa to Extreme Networks.
  • Feb 2018 - I-140 and I-485 submitted.
  • Sep 2018 - I-140 approved.
  • Feb 2019 - I-485 interview scheduled.
  • Mar 2019 - I-485 interview held. Lots of questions, confirming details & history, but all straightforward.
  • One week later: cards in hand

Total Continue reading

Our Green Card Journey

We are now Lawful Permanent Residents of the United States - aka Green Card Holders. It took a few years to get to this point. Here’s our timeline, why we did it, what it means for us, and what next.

Timeline

I first moved to the US on an L-1B visa. This is an intra-company transfer visa, that let me move to the US to continue working for Brocade.

  • May 2015 - Began work for Brocade, based in New Zealand.
  • Jul 2016 - Received L-1B visa, allowing us to move to US.
  • Aug 2016 - Moved from New Zealand to US.
  • Nov 2016 - Broadcom announces intention to acquire Brocade
  • Nov 2016 - Green Card process initiated - Department of Labour certification filed.
  • Jul 2017 - PERM filed.
  • Oct 2017 - Extreme Network acquired my business unit. I remained employee of Broadcom.
  • Nov 2017 - PERM approved.
  • Jan 2018 - Received permission to transfer L-1 visa to Extreme Networks.
  • Feb 2018 - I-140 and I-485 submitted.
  • Sep 2018 - I-140 approved.
  • Feb 2019 - I-485 interview scheduled.
  • Mar 2019 - I-485 interview held. Lots of questions, confirming details & history, but all straightforward.
  • One week later: cards in hand

Total Continue reading

Our Green Card Journey

We are now Lawful Permanent Residents of the United States - aka Green Card Holders. It took a few years to get to this point. Here’s our timeline, why we did it, what it means for us, and what next.

Timeline

I first moved to the US on an L-1B visa. This is an intra-company transfer visa, that let me move to the US to continue working for Brocade.

  • May 2015 - Began work for Brocade, based in New Zealand.
  • Jul 2016 - Received L-1B visa, allowing us to move to US.
  • Aug 2016 - Moved from New Zealand to US.
  • Nov 2016 - Broadcom announces intention to acquire Brocade
  • Nov 2016 - Green Card process initiated - Department of Labour certification filed.
  • Jul 2017 - PERM filed.
  • Oct 2017 - Extreme Network acquired my business unit. I remained employee of Broadcom.
  • Nov 2017 - PERM approved.
  • Jan 2018 - Received permission to transfer L-1 visa to Extreme Networks.
  • Feb 2018 - I-140 and I-485 submitted.
  • Sep 2018 - I-140 approved.
  • Feb 2019 - I-485 interview scheduled.
  • Mar 2019 - I-485 interview held. Lots of questions, confirming details & history, but all straightforward.
  • One week later: cards in hand

Total Continue reading

Worth Reading: There Is No Magic

I’m not the only one telling people not to bet the farm on Santa Claus and dancing unicorns. Pete Welcher wrote a nice blog post describing the implications of laws of physics and data gravity (I described the gory details in Designing Active-Active Data Centers and AWS Networking Deep Dive webinars).

Meanwhile, Russ White reviewed an article that (without admitting it) discovered that serverless is just software running on other people’s servers.

Enjoy!