The only thing constant is change

Several things of note for the near future.

As of today, I have moved into a role at Juniper networks. You will probably hear more about what I am working on over time, both here and there, and probably other places as well.

I hope to be changing platforms from WordPress to Craft in the spring; work is currently underway. This will likely mean some things about the design of this site will change; others will remain the same. Content wise, I am going to continue highlighting interesting research, soft skills, and networking technologies, but I will be trying to focus a bit more on disaggregation in all of these areas, rather than just floating around all over the place.

More as 2019 develops.

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Top 10 IoT vulnerabilities

Security questions have dogged the Internet of Things (IoT) since before the name was invented. Everyone from vendors to enterprise users to consumers is concerned that their fancy new IoT devices and systems could be compromised. The problem is actually worse than that, as vulnerable IoT devices can be hacked and harnessed into giant botnets that threaten even properly secured networks.But what exactly are the biggest problems and vulnerabilities to avoid when building, deploying, or managing IoT systems? And, more to the point, what can we do to mitigate these issues?To read this article in full, please click here

Orange Matter: Silo-Busting and Dream-Dashing

Orange Matter Logo

I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. I love automation, but it seems that dreams of a smooth customer experience can be destroyed by the persistence of engineering silos in many organizations.

This post appeared on Orange Matter as “Silo-Busting and Dream-Dashing; More Fun With Automation“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent. Actually, quite a lot more irreverent in this particular case…

Silo Busting Automation

I’d love it if you were to take a moment to visit and read, and maybe even comment!

If you liked this post, please do click through to the source at Orange Matter: Silo-Busting and Dream-Dashing and give me a share/like. Thank you!

The Week in Internet News: Connected Hot Tub Lands in Hot Water

Hot tub vulnerabilities: New connections to the Internet of Things for hot tubs – allowing users to do things like adjust water temperature using their smartphones – also may make the products vulnerable to attacks, Naked Security writes. At least one connected hot tub would be easy to attack by a nearby hacker, according to research.

IoT security by BlackBerry: The vintage smartphone maker is rebranding itself as an IoT security vendor, with the release of three products, CNet reports. BlackBerry wants to license its technology to IoT device makers.

It’s a fake fake news study: Researchers who released a study on fake news in mid-2017 have retracted it, saying erroneous data lead to the study’s conclusion, Vice reports. The study had suggested that fake news is as likely to go viral on social media as true information, but the reevaluated data doesn’t support that conclusion, the authors said.

The golden years for fake news: Meanwhile, people over age 65 are likely to share the most fake news on Facebook, The Verge says. That’s the conclusion of researchers from New York University and Princeton University.  Older users shared more fake news than younger ones regardless of education, sex, race, income, Continue reading

Tools: Dropping and Shaping Packets with iptables and tc on Linux

You can drop packets using iptables on a Linux host with some level of randomness. iptables -A INPUT -m statistic --mode random --probability 0.8 -s example.com -p icmp -j DROP I also did not know that Linux has a traffic control tool for packet shaping ‘tc’: tc qdisc change dev eth0 root netem loss 5% […]

The post Tools: Dropping and Shaping Packets with iptables and tc on Linux appeared first on EtherealMind.

What Is Continuous Integration?

In spring 2019 Building Network Automation Solutions course we’ll have Kristian Larsson diving into continuous integration and his virtual networking lab product (you might want to listen to the Software Gone Wild episode we did with him to get a taste of what he’ll be talking about). Christoph Jaggi did a short interview with him starting with the obvious question:

What is CI testing and how does it differ from other testing methods?

CI is short for Continuous Integration and refers to a way of developing software where changes written by individual developers are frequently (or "continuously") integrated together into a master branch/trunk, thus continuous integration.

Read more ...

Serverless computing: one step forward, two steps back

Serverless computing: one step forward, two steps back Hellerstein et al., CIDR’19

The biennial Conference on Innovative Data Systems Research has come round again. Today’s paper choice is sure to generate some healthy debate, and it’s a good set of questions to spend some time thinking over as we head into 2019: Where do you think serverless is heading? What is it good for today? What’s the end-goal here?

The authors see ‘critical gaps’ in current first-generation serverless offerings from the major cloud vendors (AWS, Azure, GCP). I’m sure some will read the paper as serverless-bashing, but I read into it more of an appeal from the heart to not stop where we are today, but to continue to pursue infrastructure and programming models truly designed for cloud platforms. Platforms that offer ‘unlimited’ data storage, ‘unlimited’ distributed processing power, and the ability to harness these only as needed.

We hope this paper shifts the discussion from ‘What it serverless?’ Or ‘Will serverless win?’ to a rethinking of how we design infrastructure and programming models to spark real innovation in data-rich, cloud-scale systems. We see the future of cloud programming as far, far brighter than the promise of Continue reading

Vagrant SSH Config Trick

I discovered a nice little trick to make working with Vagrant VMs a little easier by utilizing the openssh config file to define the SSH connection parameters for Vagrant VMs. This post will walk you through getting it setup. For reference the following software will be used in this post. ...