Cuckoo Installation and Configuration on Debian 10 Buster

The tutorial covers installation and configuration of Cuckoo Malware Sandbox on Debian 10 Buster. Once you complete successfully all steps, your Cuckoo installation will be ready to perform analysis of malware uploaded to guest VM. It is Windows 7 x64 SP1 VM running on Oracle VirtualBox. The tutorial is based on an excellent YouTube videos […]
Continue reading...

The Supercomputing Efficiency Curve Bends In The Right Direction

Things get a little wonky at exascale and hyperscale. Things that don’t matter quite as much at enterprise scale, such as the cost or the performance per watt or the performance per dollar per watt for a system or a cluster, end up dominating the buying decisions.

The Supercomputing Efficiency Curve Bends In The Right Direction was written by Timothy Prickett Morgan at The Next Platform.

HPE and Cumulus Networks partner for open storage

Cumulus Networks has announced a partnership with HPE that will see its NetQ management software run on HPE's network storage products.Under the deal, HPE's StoreFabric M-Series Ethernet switches will run Cumulus's Linux operating system and NetQ, a move that Cumulus said in a statement will deliver “a flexible networking fabric that is predictable, scalable, and reliable."[Get regularly scheduled insights by signing up for Network World newsletters.] Combining the M-Series switches with Linux and NetQ will offer enterprises a high-bandwidth, low-latency way to connect primary, secondary, hyperconverged, NAS, or object-storage systems, and is an ideal way to build an Ethernet Storage Fabric (ESF), the company added.To read this article in full, please click here

HPE and Cumulus Networks partner for open storage

Cumulus Networks has announced a partnership with HPE that will see its NetQ management software run on HPE's network storage products.Under the deal, HPE's StoreFabric M-Series Ethernet switches will run Cumulus's Linux operating system and NetQ, a move that Cumulus said in a statement will deliver “a flexible networking fabric that is predictable, scalable, and reliable."[Get regularly scheduled insights by signing up for Network World newsletters.] Combining the M-Series switches with Linux and NetQ will offer enterprises a high-bandwidth, low-latency way to connect primary, secondary, hyperconverged, NAS, or object-storage systems, and is an ideal way to build an Ethernet Storage Fabric (ESF), the company added.To read this article in full, please click here

Heavy Networking 497: Good Reasons To Start Your Tech Blog

If one of your New Year's resolutions is to blog more, or start a blog, this episode is for you. We discuss the benefits of technical blogging including raising your profile, improving your own understanding, contributing to the community, and creating new opportunities in your professional life. Our guests are John Mark Troyer and Stephen Foskett.

The post Heavy Networking 497: Good Reasons To Start Your Tech Blog appeared first on Packet Pushers.

‘Major Initiatives in Cybersecurity’ Shows Everyone Can Contribute to Trust

How do we work toward a more secure Internet?

In the Cyber Security discussions that take place in the various policy fora around the world, there is often little appreciation that the security of the Internet is a distributed responsibility, where many stakeholders take action.

By design, the Internet is a distributed system with no central core or point of control. Instead, Internet security is achieved by collaboration where multiple companies, organizations, governments, and individuals take action to improve the security and trustworthiness of the Internet – so that it is open, secure, and available to all.

Today we’ve published Major Initiatives in Cybersecurity: Public & Private Contributions Towards Increasing Internet Security to illustrate, via a handful of examples regarding Internet Infrastructure, there are a great number initiatives working, sometimes together and sometimes independently, in improving the Internet’s security. An approach we call collaborative security.

Major Initiatives in Cybersecurity describes Internet security as the part of cybersecurity that, broadly speaking, relates to the security of Internet infrastructure, the devices connected to it, and the technical building blocks from which applications and platforms are built.

We make no claim to completeness, but we do hope that the paper illustrates the complexity, breath, Continue reading

Stuff The Internet Says On Scalability For January 10th, 2020

 Wake up! It's HighScalability time:

Forrest Brazeal warns you not to spend your limited innovation credits building bespoke, complex systems that provide no direct value to your business, instead position yourself at the top of what heI calls the Wisdom/Cleverness Curve

 

Do you like this sort of Stuff? Your support on Patreon is appreciated more than you can know. I also wrote Explain the Cloud Like I'm 10 for everyone who needs to understand the cloud (which is everyone). On Amazon it has 84 mostly 5 star reviews (147 on Goodreads). Please recommend it. You'll be a real cloud hero.

Number Stuff:

Don't miss all that the Internet has to say on Scalability, click below and become eventually consistent with all scalability knowledge (which means this post has many more items to read so please keep on reading)...

Cisco NX-OS Graceful Insertion and Removal (GIR)

Cisco GIR

If you operate a data-center network with Cisco Nexus, you’ve probably already faced the problem of how to perform a maintenance on one of the two switches of a vPC pair, with minimum impact and risks for the production network. Cisco NX-OS contains a feature called “Graceful Insertion and Removal” or GIR to help you for that. Here is how it works. Scenario Let’s take the example below: (click on the image to see a larger version) We have two Nexus (in nx-os mode) in vPC. Doing layer-2 aggregation and …

The post Cisco NX-OS Graceful Insertion and Removal (GIR) appeared first on AboutNetworks.net.

Doing The Math On Fractal HPC

At every key leap in processing capacity in high performance computing – and just rattling off more than two decades from teraflops through petaflops, and now on the verge of exaflops in two years or so – there has been this tension between custom-built systems that break through performance barriers and more general purpose machines based on more off of the shelf components that cost less and tend to be fast followers.

Doing The Math On Fractal HPC was written by Timothy Prickett Morgan at The Next Platform.

The Art of Saying “No”

No.

It’s the shortest sentence in the English language. It requires no other parts of speech. It’s an answer, a statement, and a command all at once. It’s a phrase that some people have zero issues saying over and over again. And yet, some others have an extremely difficult time answering anything in the negative.

I had a fun discussion on twitter yesterday with some friends about the idea behind saying “no” to people. It started with this tweet:

Coincidentally, I tweeted something very similar to what Bob Plankers had tweeted just hours before:

The gist is the same though. Crazy features and other things that have been included in software and hardware because someone couldn’t tell another person “no”. Sadly, it’s something Continue reading

Equinix CEO Talks Edge: Friend or Foe?

“In a fully densified 5G world will a set of use cases begin to emerge that are going to demand...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Money Moves: December 2019

Intel challenges Nvidia with its $2 billion Habana purchase; Cisco buys Exablaze; Fortinet snapped...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Ten challenges for making automation a ‘team player’ in joint human-agent activity

Ten challenges for making automation a ‘team player’ in joint human-agent activity, Klein et al., IEEE Computer Nov/Dec 2004

With thanks to Thomas Depierre for the paper suggestion.

Last time out we looked at some of the difficulties inherit in automating control systems. However much we automate, we’re always ultimately dealing with some kind of human/machine collaboraton. Today’s choice looks at what it takes for machines to participate productively in collaborations with humans. Written in 2004, the ideas remind me very much of Mark Burgess’ promise theory, which was also initially developed around the same time.

Let’s work together

If a group of people (or people and machines) are going to coordinate with each other to achieve a set of shared ends then there are four basic requirements that must be met to underpin their joint activity:

  1. They must agree to work together (the authors call this agreement a Basic Compact).
  2. They must be mutually predictable in their actions
  3. They must be mutually directable.
  4. They must maintain common ground.

A basic compact is…

… an agreement (often tacit) to facilitate coordination, work toward shared goals, and prevent breakdowns in team coordination. This Compact involves a commitment Continue reading

DIY communications networks to trend in 2020, says major telco

Communications networks without a centralized infrastructure will become more popular this year as folks become increasingly aware of data collection from governments and tech companies, says telecommunications provider Telenor Group.The company refers to fully encrypted mesh and peer-to-peer apps as the technology that will enable these consumer-level “off-the-grid, build-it-yourself” links. Mesh apps will also be useful in disasters where traditional networks fail.[Get regularly scheduled insights by signing up for Network World newsletters.] “Communicating without a central coordinating network is appealing to people for many reasons, and in 2020, we expect to see more go that route, especially in conflict situations, to mobilize for protests, and simply to stay below the radar,” the company says on its website.To read this article in full, please click here

Aruba reinforces SD-Branch with security, management upgrades

Aruba has taken steps to bolster the security and manageability of its branch-office networking package for customers with lots of branch sites.The HPE company enhanced its SD-Branch software with identity-based attack detection and intrusion prevention, and improvements to its SD-WAN Orchestrator to make it easier to deploy security features on a large scale.See predictions about what's big in IT tech for the coming year. Aruba’s SD-Branch software runs on its branch gateways and includes a variety of integrated features like a firewall that support LAN, WAN, Wi-Fi networks, and segmentation as well integration with the company’s ClearPass policy-management software and its cloud-based package Aruba Central. The package can integrate its data with partner security platforms such as Check Point, Palo Alto Networks, and Z-Scaler.To read this article in full, please click here

Aruba SD-Branch Update Targets Retail

The update includes new branch hardware with built-in cellular capabilities, improved security...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Veeam Snatched Up by Insight for $5B

Strong growth, high customer retention, and expansion opportunities make Veeam "one of the most...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.