Heavy Wireless 013: A University Perspective On Operating Wi-Fi And Testing Vendors

On today's Heavy Wireless episode, Keith Parsons speaks with UMass Amherst CTO Jim Mileski on the history of Wi-Fi at the school. They discuss initial challenges of rolling out wireless, strategic placements of access points, ensuring a good student experience across a myriad of devices, and more. They also discuss how Jim and his team tested their incumbent vendor against a possible replacement, how the replacement won out, and how the transition is going.

The post Heavy Wireless 013: A University Perspective On Operating Wi-Fi And Testing Vendors appeared first on Packet Pushers.

Networking and security teams tasked to converge, collaborate

Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups – or at least boosting collaboration between teams, according to research from Cato Networks.In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams “must work together,” and another 30% said they “must have shared processes.” Another 8% said they’re working to create one networking and security group.The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.To read this article in full, please click here

Networking and security teams tasked to converge, collaborate

Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups – or at least boosting collaboration between teams, according to research from Cato Networks.In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams “must work together,” and another 30% said they “must have shared processes.” Another 8% said they’re working to create one networking and security group.The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.To read this article in full, please click here

Will Network Devices Reject BGP Sessions from Unknown Sources?

TL&DR: Violating the Betteridge’s Law of Headlines, the answer is “Yes, but the devil is in the details.

It all started with the following observation by Minh Ha left as a comment to my previous BGP session security blog post:

I’d think it’d be obvious for BGP routers to only accept incoming sessions from configured BGP neighbors, right? Because BGP is the most critical infrastructure, the backbone of the Internet, why would you want your router to accept incoming session from anyone but KNOWN sources?

Following my “opinions are good, facts are better” mantra, I decided to run a few tests before opinionating1.

Will Network Devices Reject BGP Sessions from Unknown Sources?

TL&DR: Violating the Betteridge’s Law of Headlines, the answer is “Yes, but the devil is in the details.

It all started with the following observation by Minh Ha left as a comment to my previous BGP session security blog post:

I’d think it’d be obvious for BGP routers to only accept incoming sessions from configured BGP neighbors, right? Because BGP is the most critical infrastructure, the backbone of the Internet, why would you want your router to accept incoming session from anyone but KNOWN sources?

Following my “opinions are good, facts are better” mantra, I decided to run a few tests before opinionating1.

Gartner: Top strategic technology trends for 2024

AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here

Gartner: Top strategic technology trends for 2024

AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here

Gartner: Top strategic technology trends for 2024

AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here

Tech Bytes: Secure Hybrid Workers Without Compromising User Experience (Sponsored)

Today on the Tech Bytes podcast we talk about techniques to improve user experience and application performance while also securing end users, applications, and devices. Our sponsor is Palo Alto Networks and we’ll talk about how Palo Alto Networks is integrating technologies such as Remote Browser Isolation and application acceleration into Prisma Access, their cloud-delivered security offering.

Tech Bytes: Secure Hybrid Workers Without Compromising User Experience (Sponsored)

Today on the Tech Bytes podcast we talk about techniques to improve user experience and application performance while also securing end users, applications, and devices. Our sponsor is Palo Alto Networks and we’ll talk about how Palo Alto Networks is integrating technologies such as Remote Browser Isolation and application acceleration into Prisma Access, their cloud-delivered security offering.

The post Tech Bytes: Secure Hybrid Workers Without Compromising User Experience (Sponsored) appeared first on Packet Pushers.

Colocation provider plans to use modular nuclear reactors to power its data centers

It’s no secret that data centers are facing power shortage issues, especially in high density areas. One colocation provider has come up with a unique solution: It’s building small nuclear power plants for itself.Data center provider Standard Power specializes in high-performance computing, such as blockchain mining and AI workloads. These kinds of workloads demand a lot of compute power, which equals a very large electric bill.The company was concerned about the ability of local electric providers to deliver the capacity needed for such demanding workloads. So, rather than rely on the local electrical grid, Standard is partnering with NuScale Power Corporation, a maker of small modular nuclear-powered plants, for its Ohio and Pennsylvania facilities.To read this article in full, please click here

Colocation provider plans to use modular nuclear reactors to power its data centers

It’s no secret that data centers are facing power shortage issues, especially in high density areas. One colocation provider has come up with a unique solution: It’s building small nuclear power plants for itself.Data center provider Standard Power specializes in high-performance computing, such as blockchain mining and AI workloads. These kinds of workloads demand a lot of compute power, which equals a very large electric bill.The company was concerned about the ability of local electric providers to deliver the capacity needed for such demanding workloads. So, rather than rely on the local electrical grid, Standard is partnering with NuScale Power Corporation, a maker of small modular nuclear-powered plants, for its Ohio and Pennsylvania facilities.To read this article in full, please click here

Introducing the Project Argus Datacenter-ready Secure Control Module design specification

Introducing the Project Argus Datacenter-ready Secure Control Module design specification
Introducing the Project Argus Datacenter-ready Secure Control Module design specification

Historically, data center servers have used motherboards that included all key components on a single circuit board. The DC-SCM (Datacenter-ready Secure Control Module) decouples server management and security functions from a traditional server motherboard, enabling development of server management and security solutions independent of server architecture. It also provides opportunities for reducing server printed circuit board (PCB) material cost, and allows unified firmware images to be developed.

Today, Cloudflare is announcing that it has partnered with Lenovo to design a DC-SCM for our next-generation servers. The design specification has been published to the OCP (Open Compute Project) contribution database under the name Project Argus.

A brief introduction to baseboard management controllers

A baseboard management controller (BMC) is a specialized processor that can be found in virtually every server product. It allows remote access to the server through a network connection, and provides a rich set of server management features. Some of the commonly used BMC features include server power management, device discovery, sensor monitoring, remote firmware update, system event logging, and error reporting.

In a typical server design, the BMC resides on the server motherboard, along with other key components such as the processor, memory, CPLD and so on. This Continue reading

Displaying dates and times on Linux

Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date Mon Oct 16 11:24:44 AM EDT 2023 The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here

Displaying dates and times on Linux

Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date Mon Oct 16 11:24:44 AM EDT 2023 The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here

Network Break 451: Making A Ruckus About Wi-Fi 7; Arista Announces 25G Layer 1 Switches; AWS To Require MFA

This week's Network Break covers a new set of Layer 1 switches from Arista for high-frequency trading, Ruckus announcing a (pre-ratified) Wi-Fi 7 AP, and AWS planning to require multi-factor authentication starting in mid-2024. MGM Resorts says it will take a $100 million hit due to a security breach, the UK finally fines Equifax for a 2017 breach, and Broadcom may have cleared a China hurdle to its VMware acquisition.

Network Break 451: Making A Ruckus About Wi-Fi 7; Arista Announces 25G Layer 1 Switches; AWS To Require MFA

This week's Network Break covers a new set of Layer 1 switches from Arista for high-frequency trading, Ruckus announcing a (pre-ratified) Wi-Fi 7 AP, and AWS planning to require multi-factor authentication starting in mid-2024. MGM Resorts says it will take a $100 million hit due to a security breach, the UK finally fines Equifax for a 2017 breach, and Broadcom may have cleared a China hurdle to its VMware acquisition.

The post Network Break 451: Making A Ruckus About Wi-Fi 7; Arista Announces 25G Layer 1 Switches; AWS To Require MFA appeared first on Packet Pushers.

Worth Reading: AI Risks

Bruce Schneier wrote a thoughtful article on the various perceptions of AI Risks including this gem:

As the science-fiction author Ted Chiang has said, fears about the existential risks of AI are really fears about the threat of uncontrolled capitalism, and dystopias like the paper clip maximizer are just caricatures of every start-up’s business plan.

Enjoy!