IoT roundup: VMware, Nokia beef up their IoT

When attempting to understand the world of IoT, it’s easy to get sidetracked by all the fascinating use cases: Automated oil and gas platforms! Connected pet feeders! Internet-enabled toilets! (Is “the Internet of Toilets” a thing yet?) But the most important IoT trend to follow may be the way that major tech vendors are vying to make large portions of the market their own.VMware’s play for a significant chunk of the IoT market is called Pulse IoT Center, and the company released version 2.0 of it this week. It follows the pattern set by other big companies getting into IoT: Leveraging their existing technological strengths and applying them to the messier, more heterodox networking environment that IoT represents.To read this article in full, please click here

Kernel of Truth season 2 episode 6: Infrastructure as code

 

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

Our consultants are often the first to hear about trends and issues that customers and the industry as a whole are seeing and dealing with. Recently we’ve found that quite a few were unaware of what “infrastructure as code” is so we thought, let’s demystify it for everyone! Host Brian talks to Nick Mitchell and Eric Pulvino, two of our consultants who have first-hand knowledge about the topic and share not only what it is but what the problems infrastructure as code is solving for and why you should care! As you listen beware, there may be a “dad joke” and an attempt at Buzzword Bingo along the way. Apparently, it can’t be helped when you’re talking about “git.”

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the Continue reading

Buy More, Save More — This HP Coupon Code Cuts Prices on Business PCs

If you're looking to buy a new business PC, HP is currently offering a "buy more, save more" discount that gets activated at 3 different price points, and using a special code. Configure your new PC to the $599+ price point and apply code BMSM60 to save $60. Or configure to $1,299+ and use code BMSM150 to save $150. Configure to $1,999+ and use code BMSM350 for a whopping $350 off your new PC.  Click the codes just mentioned to learn more, or click right here to review available models, specs, and configurations.To read this article in full, please click here

xdpcap: XDP Packet Capture

xdpcap: XDP Packet Capture

Our servers process a lot of network packets, be it legitimate traffic or large denial of service attacks. To do so efficiently, we’ve embraced eXpress Data Path (XDP), a Linux kernel technology that provides a high performance mechanism for low level packet processing. We’re using it to drop DoS attack packets with L4Drop, and also in our new layer 4 load balancer. But there’s a downside to XDP: because it processes packets before the normal Linux network stack sees them, packets redirected or dropped are invisible to regular debugging tools such as tcpdump.

To address this, we built a tcpdump replacement for XDP, xdpcap. We are open sourcing this tool: the code and documentation are available on GitHub.

xdpcap uses our classic BPF (cBPF) to eBPF or C compiler, cbpfc, which we are also open sourcing: the code and documentation are available on GitHub.

xdpcap: XDP Packet Capture
CC BY 4.0 image by Christoph Müller

Tcpdump provides an easy way to dump specific packets of interest. For example, to capture all IPv4 DNS packets, one could:

$ tcpdump ip and udp port 53

xdpcap reuses the same syntax! xdpcap can write packets to a pcap file:

$ xdpcap /path/to/hook capture.pcap  Continue reading

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities. Cisco Talos security researchers, who discovered DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”To read this article in full, please click here

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities. Cisco Talos security researchers, who discovered DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”To read this article in full, please click here

Mentorship and Early Career Development

In this episode of the Network Collective, John Fraizer, Denise Fishburn, and Trey Aspelund join the NC crew to talk about the importance of mentorship and practical advice on how to mentor and be mentored.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

How data storage will shift to blockchain

If you thought cloud storage was digging in its heels to become the go-to method for storing data, and at the same time grabbing share from own-server, in-house storage, you may be interested to hear that some think both are on the way out. Instead organizations will use blockchain-based storage.Decentralized blockchain-based file storage will be more secure, will make it harder to lose data, and will be cheaper than anything seen before, say organizations actively promoting the slant on encrypted, distributed technology.[ Read also: Why blockchain (might be) coming to an IoT implementation near you ] Storing transactional data in a blockchain China company FileStorm, which describes itself in marketing materials as the first Interplanetary File Storage (IPFS) platform on blockchain, says the key to making it all work is to only store the transactional data in blockchain. The actual data files, such as large video files, are distributed in IPFS.To read this article in full, please click here

How data storage will shift to blockchain

If you thought cloud storage was digging in its heels to become the go-to method for storing data, and at the same time grabbing share from own-server, in-house storage, you may be interested to hear that some think both are on the way out. Instead organizations will use blockchain-based storage.Decentralized blockchain-based file storage will be more secure, will make it harder to lose data, and will be cheaper than anything seen before, say organizations actively promoting the slant on encrypted, distributed technology.[ Read also: Why blockchain (might be) coming to an IoT implementation near you ] Storing transactional data in a blockchain China company FileStorm, which describes itself in marketing materials as the first Interplanetary File Storage (IPFS) platform on blockchain, says the key to making it all work is to only store the transactional data in blockchain. The actual data files, such as large video files, are distributed in IPFS.To read this article in full, please click here

History Of Networking – MIME – Nathaniel Borenstein

Nathaniel Borenstein is credited with being the primary author of MIME, empowering multimedia to be sent via email. In this History of Networking episode Nathaniel joins us to talk about his story and how this protocol came to be.

Nathaniel Borenstein
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – MIME – Nathaniel Borenstein appeared first on Network Collective.

Datanauts 163: Hybrid Cloud DNS Design With AWS Route 53

Why is hybrid cloud DNS with AWS hard? What has AWS recently done to make it better? Should we use the new Route 53 Resolver features? The Datanauts tackles these questions and other cloud DNS issues with guest Matt Adorjan. We also explore Matt's CloudPing utility that measures inter-region latency in AWS.

The post Datanauts 163: Hybrid Cloud DNS Design With AWS Route 53 appeared first on Packet Pushers.

Gartner: IT spending to drop due to falling equipment prices

Gartner has updated its forecasts for IT spending this year with a downward projection, but it's not necessarily due to declining sales. It’s because the strengthening U.S. dollar is driving prices down and undercutting previous predictions.Overall spending is expected to increase by 1.1% over 2018, to $3.79 trillion, down from a prediction of 2.8% growth made in January.“Currency headwinds fueled by the strengthening U.S. dollar have caused us to revise our 2019 IT spending forecast down from the previous quarter,” said John-David Lovelock, research vice president at Gartner, in a statement. “Through the remainder of 2019, the U.S. dollar is expected to trend stronger, while enduring tremendous volatility due to uncertain economic and political environments and trade wars."To read this article in full, please click here