Oracle does-in Dyn, resets DNS services to cloud

Some may call it a normal, even boring course of vendor business operations but others find it a pain the rump or worse.That about sums up the reaction to news this week that Oracle will end its Dyn Domain Name System enterprise services by 2020 and try to get customers to move to DNS services provided through Oracle Cloud. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key Oracle said that since its acquisition of Dyn in 2016 and the ensuing acquisition of Zenedge, its engineering teams have been working to integrate Dyn’s products and services into the Oracle Cloud Infrastructure platform. “Enterprises can now leverage the best-in-class DNS, web application security, and email delivery services within Oracle Cloud Infrastructure and enhance their applications with a comprehensive platform to build, scale, and operate their cloud infrastructure," according to Oracle's FAQ on the move. "As a result, Dyn legacy Enterprise services are targeted to be retired on May 31, 2020 with the exception of Internet Intelligence.”To read this article Continue reading

Oracle does-in Dyn, resets DNS services to cloud

Some may call it a normal, even boring course of vendor business operations but others find it a pain the rump or worse.That about sums up the reaction to news this week that Oracle will end its Dyn Domain Name System enterprise services by 2020 and try to get customers to move to DNS services provided through Oracle Cloud. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key Oracle said that since its acquisition of Dyn in 2016 and the ensuing acquisition of Zenedge, its engineering teams have been working to integrate Dyn’s products and services into the Oracle Cloud Infrastructure platform. “Enterprises can now leverage the best-in-class DNS, web application security, and email delivery services within Oracle Cloud Infrastructure and enhance their applications with a comprehensive platform to build, scale, and operate their cloud infrastructure," according to Oracle's FAQ on the move. "As a result, Dyn legacy Enterprise services are targeted to be retired on May 31, 2020 with the exception of Internet Intelligence.”To read this article Continue reading

Where are all the IoT experts going to come from?

If the internet of things (IoT) is going to fulfill its enormous promise, it’s going to need legions of smart, skilled, trained workers to make everything happen. And right now, it’s not entirely clear where those people are going to come from.That’s why I was interested in trading emails with Keith Flynn, senior director of product management, R&D at asset-optimization software company AspenTech, who says that when dealing with the slew of new technologies that fall under the IoT umbrella, you need people who can understand how to configure the technology and interpret the data. Flynn sees a growing need for existing educational institutions to house IoT-specific programs, as well as an opportunity for new IoT-focused private colleges, offering a well -ounded curriculumTo read this article in full, please click here

Tracking down library injections on Linux

While not nearly commonly seen on Linux systems, library (shared object files on Linux) injections are still a serious threat. On interviewing Jaime Blasco from AT&T's Alien Labs, I've become more aware of how easily some of these attacks are conducted.In this post, I'll cover one method of attack and some ways that it can be detected. I'll also provide some links that will provide more details on both attack methods and detection tools. First, a little background. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Shared library vulnerability Both DLL and .so files are shared library files that allow code (and sometimes data) to be shared by various processes. Commonly used code might be put into one of these files so that it can be reused rather than rewritten many times over for each process that requires it. This also facilitates management of commonly used code.To read this article in full, please click here

Tracking down library injections on Linux

While not nearly commonly seen on Linux systems, library (shared object files on Linux) injections are still a serious threat. On interviewing Jaime Blasco from AT&T's Alien Labs, I've become more aware of how easily some of these attacks are conducted.In this post, I'll cover one method of attack and some ways that it can be detected. I'll also provide some links that will provide more details on both attack methods and detection tools. First, a little background. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Shared library vulnerability Both DLL and .so files are shared library files that allow code (and sometimes data) to be shared by various processes. Commonly used code might be put into one of these files so that it can be reused rather than rewritten many times over for each process that requires it. This also facilitates management of commonly used code.To read this article in full, please click here

MPLS is dead, Long live MPLS

The initial hype of SD-WAN claimed that MPLS was dead as SD-WAN was going to remove all need for SLA based circuits. Now that we’re several years in and have some experience under our collective belts, we take a look at whether or not the original hype was correct and what real world customers are doing when it comes to selecting circuits for their SD-WAN networks.

 

Jason Gintert
Guest
Matt Ouellette
Guest
Jordan Martin
Host
Eyvonne Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post MPLS is dead, Long live MPLS appeared first on Network Collective.

Juniper’s Mist adds WiFi 6, AI-based cloud services to enterprise edge

Mist, now a Juniper Networks company, has rolled out an artificial-intelligence, cloud-based appliance and a WiFi 6 access point that together aim at helping users deploy smart, high-density wireless networks.Leading the rollout is the Mist Edge appliance that extends Mist’s cloud services to the branch and lets enterprises manage the distributed Wi-Fi infrastructure from a central location.  More about 802.11ax (Wi-Fi 6) Why 802.11ax is the next big thing in wireless FAQ: 802.11ax Wi-Fi Wi-Fi 6 (802.11ax) is coming to a router near you Wi-Fi 6 with OFDMA opens a world of new wireless possibilities 802.11ax preview: Access points and routers that support Wi-Fi 6 are on tap The Mist Edge device features the company’s artificial-intelligence engine that helps automate tasks such as adjusting Wi-Fi signal strength and troubleshooting.  According to Mist, some other potential use cases for Mist Edge include:To read this article in full, please click here

Extreme targets cloud services, SD-WAN, WiFi 6 with $210M Aerohive grab

Extreme Networks opened the checkbook again this week to the tune of $210 million for wireless-networking vendor Aerohive.The move will bring to Extreme Aerohive’s wireless-networking technology – including its new WiFi 6 gear, SD-WAN software and cloud-management services.  See reviews of free, open-source network monitoring tools Icinga: Enterprise-grade, open-source network-monitoring that scales Nagios Core: Network-monitoring software with lots of plugins, steep learning curve Observium open-source network monitoring tool: Won’t run on Windows but has a great user interface Zabbix delivers effective no-frills network monitoring Gartner wrote, "Aerohive's wireless-focused access-network portfolio comprises stand-alone and stackable campus switches, access points and branch-office routers, with a cloud-managed distributed control architecture. Organizations typically employ Aerohive’s HiveManager network management platform [which manages Wi-Fi, Switching, SD-WAN, and NAC] as a public or private cloud, although it also may be deployed on-premises. To manage a multivendor unified access network, the enterprise can use HiveManager to configure, provision and monitor Aerohive APs in conjunction with switches from Aerohive or with N-Series switches from OEM partner Dell EMC." The company also has a relationship with Juniper to managed wired devices.To read this article in full, please click here

Response: Certifications Are Not A Big Deal. Stop Being a Princess About It.

  Toothy McGrin left a comment after I talked how little effort is required to acheive a  vendor certification. Its a hot topic. Here is the discussion, its about 2 minutes in.  CCNA/CCNP may not be a big deal in the circles you travel in, but for a lot of employees and employers they […]

The post Response: Certifications Are Not A Big Deal. Stop Being a Princess About It. appeared first on EtherealMind.

10 HCI startups bucking the consolidation trend

The rapidly growing hyperconverged infrastructure industry – IDC says converged-systems revenue grew 14.8 percent year-over-year in the last quarter of 2018 – is starting to consolidate, with tech giants HPE, Juniper Networks, Cisco and Red Hat all buying promising HCI startups.To read this article in full, please click here(Insider Story)

10 HCI startups bucking the consolidation trend

The rapidly growing hyperconverged infrastructure industry – IDC says converged-systems revenue grew 14.8 percent year-over-year in the last quarter of 2018 – is starting to consolidate, with tech giants HPE, Juniper Networks, Cisco and Red Hat all buying promising HCI startups.To read this article in full, please click here(Insider Story)

Designing far memory data structures: think outside the box

Designing far memory data structures: think outside the box Aguilera et al., HotOS’19

Last time out we looked at some of the trade-offs between RInKs and LInKs, and the advantages of local in-memory data structures. There’s another emerging option that we didn’t talk about there: the use of far-memory, memory attached to the network that can be remotely accessed without mediation by a local processor. For many data center applications this looks to me like it could be a compelling future choice.

Far memory brings many potential benefits over near memory: higher memory capacity through disaggregation, separate scaling between processing and far memory, better availability due to separate fault domains for far memory, and better shareability among processors.

It’s not all straightforward though. As we’ve seen a number of times before, there’s a trade-off between fast one-sided access that doesn’t involve the remote CPU, and a more traditional RPC style that does. In particular, if you end up needing to make multiple one-sided requests to get to the data you really need, it’s often faster to just go the RPC route.

Therefore, if we want to make full use of one-sided far memory, we need to think Continue reading