Archive

Category Archives for "Networking"

BrandPost: Deploying highly secure, easy to deploy and cost-effective Micro Data Centers

Industry trends such as the Internet of Things (IoT) and content distribution networks (CDNs) are driving the need for edge computing. That’s because these solutions often require low latency, high bandwidth, greater reliability, and strong security.It’s a tall order meant for Micro Data Centers (MDCs) to fulfill. An MDC is a self-contained data center architecture that offers complete IT infrastructure within a stand-alone, secure enclosure.MDCs offer a number of key advantages beyond today’s server rooms and traditional data centers. First, because they’re distributed closer to bandwidth-intensive content, MDCs can significantly reduce latency and lower costs. Secondly, it’s easy and cost-effective to add data center capacity to them anywhere and anytime it is needed – in both IT room and non-climate-controlled environments. And because MDC IT equipment is pre-installed before shipment in a self-contained and secure enclosure, it can provide physical security and protection of critical business applications.To read this article in full, please click here

DoE plans world’s fastest supercomputer

The U.S. Department of Energy says it is working on a supercomputer that will break the target of exaFLOP computation – a quintillion (1018)  floating-point computations per second – in order to handle high-performance computing and artificial intelligence.Being built in conjunction with Intel and Cray Computing,  the Aurora supercomputer will  cost more than half a billion dollars and be turned over to Argonne National Laboratory in Chicago in 2021, according to a statement by the DoE. [Click here to see the current top 10 fastest supercomputers.]To read this article in full, please click here

DoE plans world’s fastest supercomputer

The U.S. Department of Energy says it is working on a supercomputer that will break the target of exaFLOP computation – a quintillion (1018)  floating-point computations per second – in order to handle high-performance computing and artificial intelligence.Being built in conjunction with Intel and Cray Computing,  the Aurora supercomputer will  cost more than half a billion dollars and be turned over to Argonne National Laboratory in Chicago in 2021, according to a statement by the DoE. [Click here to see the current top 10 fastest supercomputers.]To read this article in full, please click here

Concluding the IETF Rough Guide, Long Live the IETF Blog

For many years we have produced a series of blog posts as a Rough Guide to each upcoming IETF meeting usually in the week prior to the meeting. The Rough Guides were intended to provide a snapshot of IETF activity of interest to the Internet Society because of programmatic activity that we were engaged in. They were also an opportunity to highlight the activities sponsored directly by the Internet Society that were happening adjacent to the upcoming IETF meeting.

Rough Guides were intended to help guide a non-specialist but technically minded audience to the hot topics and debates of interest at each upcoming IETF meeting with pointers to the agenda and remote participation possibilties. Originally intended to help spur meeting attendance by those interested in the key topics, they became a way to highlight important discussions taking place and ways to get involved in person or remotely.

As we are now less than a week away from the IETF 104 meeting in Prague it seemed like the right time to share an update regarding our plans for writing about IETF activity. We have decided to discontinue producing the Rough Guides. Instead, we will be helping to supply relevant, high-quality content Continue reading

3 companies developing wearable tech for the enterprise

Earlier this month, I wrote that “even as smartwatch shipments continue to grow, significant industrial and business use cases for these internet-connected devices have yet to appear.”And then a few days later, as if on cue, International Data Corporation (IDC) put out a press release about the latest edition of the Worldwide Quarterly Wearable Device Tracker. The release quoted Ramon T. Llamas, research director for IDC's Wearables team, saying, "Two major drivers for the wearables market are healthcare and enterprise adoption.”To read this article in full, please click here

Automating Cisco ACI Environment with Python and Ansible

This is a guest blog post by Dave Crown, Lead Data Center Engineer at the State of Delaware. He can be found automating things when he's not in meetings or fighting technical debt.


Over the course of the last year or so, I’ve been working on building a solution to deploy and manage Cisco’s ACI using Ansible and Git, with Python to spackle in cracks. The goal I started with was to take the plain-text description of our network from a Git server, pull in any requirements, and use the solution to configure the fabric, and lastly, update our IPAM, Netbox. All this without using the GUI or CLI to make changes. Most importantly, I want to run it with a simple invocation so that others can run it and it could be moved into Ansible Tower when ready.

Read more ...

BrandPost: SD-WAN Without WAN Optimization is Like Peanut Butter Without Jelly

SD-WAN vs. WAN Optimization Optimization of applications and data traffic has been an integral part of the WAN since its inception. WAN optimization accelerates application traffic by overcoming latency and reducing the amount of data traversing the WAN by applying techniques like protocol acceleration, deduplication, compression, reduced latency and caching to dramatically increase the amount of available bandwidth.Today, enterprises are rapidly adopting SD-WAN as a preferred solution when rearchitecting their WANs. SD-WAN is transforming the way networks support enterprise applications, dramatically increasing application performance by intelligently controlling and more efficiently utilizing all available WAN transport resources.To read this article in full, please click here

Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception

Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception
Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception

The practice of HTTPS interception continues to be commonplace on the Internet. HTTPS interception has encountered scrutiny, most notably in the 2017 study “The Security Impact of HTTPS Interception” and the United States Computer Emergency Readiness Team (US-CERT)  warning that the technique weakens security. In this blog post, we provide a brief recap of HTTPS interception and introduce two new tools:

  1. MITMEngine, an open-source library for HTTPS interception detection, and
  2. MALCOLM, a dashboard displaying metrics about HTTPS interception we observe on Cloudflare’s network.

In a basic HTTPS connection, a browser (client) establishes a TLS connection directly to an origin server to send requests and download content. However, many connections on the Internet are not directly from a browser to the server serving the website, but instead traverse through some type of proxy or middlebox (a “monster-in-the-middle” or MITM). There are many reasons for this behavior, both malicious and benign.

Types of HTTPS Interception, as Demonstrated by Various Monsters in the Middle

One common HTTPS interceptor is TLS-terminating forward proxies. (These are a subset of all forward proxies; non-TLS-terminating forward proxies forward TLS connections without any ability to inspect encrypted traffic). A TLS-terminating forward proxy sits Continue reading

Cross-vCenter NSX at the Center for Advanced Public Safety

Jason Foster is an IT Manager at the Center for Advanced Public Safety at the University of Alabama. The Center for Advanced Public Safety (CAPS) originally developed a software that provided crash reporting and data analytics software for the State of Alabama. Today, CAPS specializes in custom software mostly in the realm of law enforcement and public safety. They have created systems for many states and government agencies across the country.

Bryan Salek, Networking and Security Staff Systems Engineer, spoke with Jason about network virtualization and what led the Center for Advanced Public Safety to choosing VMware NSX Data Center and what the future holds for their IT transformation.

 

The Need for Secure and Resilient Infrastructure

As part of a large modernize data center initiative, the forward-thinking CAPS IT team began to investigate micro-segmentation. Security is a primary focus at CAPS due to the fact that the organization develops large software packages for various state agencies. The applications that CAPS writes and builds are hosted together, but contain confidential information and need to be segmented from one another.

Once CAPS rolled out the micro-segmentation use-case, the IT team decided to leverage NSX Data Center for disaster recovery purposes as Continue reading

The Network Sized Holes in Serverless

Until about 2017, the cloud was going to replace all on-premises data centers. As it turns out, however, the cloud has not replaced all on-premises data centers. Why not? Based on the paper under review, one potential answer is because containers in the cloud are still too much like “serverfull” computing. Developers must still create and manage what appear to be virtual machines, including:

  • Machine level redundancy, including georedundancy
  • Load balancing and request routing
  • Scaling up and down based on load
  • Monitoring and logging
  • System upgrades and security
  • Migration to new instances

Serverless solves these problems by placing applications directly onto the cloud, or rather a set of libraries within the cloud.

Jonas, Eric, Johann Schleier-Smith, Vikram Sreekanti, Chia-Che Tsai, Anurag Khandelwal, Qifan Pu, Vaishaal Shankar, et al. “Cloud Programming Simplified: A Berkeley View on Serverless Computing.” ArXiv:1902.03383 [Cs], February 9, 2019. http://arxiv.org/abs/1902.03383.

The authors define serverless by contrasting it with serverfull computing. While software is run based on an event in serverless, software runs until stopped in a cloud environment. While an application does not have a maximum run time in a serverfull environment, there is some maximum set by the provider in a serverless Continue reading

The Week in Internet News: Four Visions of the Internet

Competing visions: The World Economic Forum’s blog looks at four competing visions of the Internet that it sees emerging. These include Silicon Valley’s open Internet, Beijing’s paternal Internet, Brussels’ bourgeois Internet, and Washington’s commercial Internet. Will one vision win out?

Searching for fakes: WhatsApp, the popular messaging app owned by Facebook, is testing reverse image search in its efforts to battle fake news, TheNextWeb reports.  The chat app may use Google APIs to compare the targeted image with similar pictures as a way to filter out doctored images.

Working against itself: An Artificial Intelligence that can right fake news articles may also be useful for spotting them, the MIT Technology Review says. Recently, OpenAI withheld the release of its new language model on fears that it could be used to spread misinformation, but researchers say the tool may be useful for the opposite effect.

Privacy laundering: Lawfareblog.com take a hard look at Facebook’s recent announcement that it was moving to end-to-end encryption. The social media giant won’t fix its privacy problems with the move, however, the article says. “Facebook’s business model is the quintessential example of ‘surveillance capitalism,’ with user data serving as the main product that Facebook sells to Continue reading