Symantec Shares Its Own Internal Threat Detection Tools for Targeted Attacks
This technology uncovered last year’s Dragonfly 2.0 attacks targeting energy companies to gain access to the power grid.
This technology uncovered last year’s Dragonfly 2.0 attacks targeting energy companies to gain access to the power grid.
It’s a new era for Cumulus technology. We’re thrilled to announce the new Cumulus VP of Engineering – Partho Mishra. Partho joins Cumulus with 25 years of experience in product definition, engineering development and technology evangelization in data science/analytics, wireless and networking.
A truly experienced leader
Prior to joining Cumulus, Partho was running the RASA Network Analytics team at Aruba where he lead as CEO and then VP after RASA was acquired by Aruba in 2016. At RASA analytics, Partho’s team was in charge of developing a product that used ML/AI techniques to analyze data collected from network infrastructure to help Aruba customers with optimizing their wireless network and improving user experience.
Previously, he was Vice President and General Manager of Cisco’s Service Provider Access Business Unit with responsibility for Metro-Ethernet and Wireless Backhaul products including the ASR 901, ASR 903, ME 3400 and CPT 50 products.
Partho is no stranger to bringing startups to the next level. Prior to being acquired, RASA was a VC-funded startup with Khosla Ventures as the lead investor. Additionally, he was involved as part of the initial technology/founding teams in two Silicon Valley start-ups: Airgo Networks (acquired by Qualcomm) and Iospan Wireless (acquired by Continue reading
Bruno Wollman pointed me to an excellent article on the ignorance of expertise and confidence of the dumb. Here’s the TL&DR summary (but you should really read the whole thing):
Enjoy ;)
These three initiatives are all focused on virtualizing the RAN, and some of the same companies belong to all three groups. But why are there three?
DockerCon is the premier container conference where the IT industry comes together to learn, belong, and collaborate on the different phases of the containerization journey. This year, we’re focusing on helping our 6,000+ attendees define their containerization journeys. Whether you’re a developer just getting started with Docker or an Enterprise systems architect ready to scale and innovate, at DockerCon we’ll help you map out and implement a containerization strategy for you, your team and your company.

Throughout the four days, you’ll have the chance to design your own DockerCon journey – selecting from 7 different breakout session tracks, a collection of free hands-on labs and workshops, and our peer to peer networking Hallway Track.
This year at DockerCon we’re designing our conference around the containerization journey and providing opportunities for our attendees to create tailored learning and networking experiences for their particular needs.
We’ve identified four stages of the containerization journey that will be present at DockerCon 2018:

The event program is designed to be a “choose your own adventure,” allowing every attendee to find the content, people, trainings, and labs that are right for them. Maybe you’re new to the Docker platform and are looking for more information on Continue reading
For decades, the IT market has been obsessed with the competition between suppliers of processors, but there are rivalries between the makers of networking chips and the full-blown switches that are based on them that are just as intense. Such a rivalry exists between the InfiniBand chips from Mellanox Technologies and the Omni-Path chips from Intel, which are based on technologies Intel got six years ago when it acquired the InfiniBand business from QLogic for $125 million.
At the time, we quipped that AMD needed to buy Mellanox, but instead AMD turned right around and shelled out $334 million to …
The Battle Of The InfiniBands, Part Two was written by Timothy Prickett Morgan at The Next Platform.
Conference season is upon us, and the NSX team will be out in full effect. Join us at any of the following events to get a demo, ask us questions, and hear us wax poetic about all things security and network virtualization!
April 16–20, 2018
Moscone Center
San Francisco, CA
Booth #4101, North Hall
NSX is delighted to attend everyone’s favorite security conference, RSA. This year’s theme is “Now Matters,” aptly named in time with the astounding number of threats to cybersecurity and data breaches we’ve collectively seen in the news this year. That said, don’t miss a great talk on how app architecture “now matters” when it comes to transforming security by Tomrn, Senior Vice President and General Manager, Security Products, VMware. His session will be on April 17 from 1:00pm–1:45pm. The team will also be doing demos at the VMware booth (#4101 in the North Hall) – so be sure to swing by and chat with us about our offerings.
VMware Speaking Sessions at RSA Conference:
NSX Mindset Reception:
Join us for a NSX Mindset reception with VMware Continue reading
In the ten or so years I ve been blogging, Ivan Pepelnjak has been constant figure in the tech industry. His prolific blogging and sharing of knowledge is one of the inspirations for my own entry into blogging. Over the years, we have usually agreed violently on most things and disagreed on others.
His ipSpace website has grown from a blog into a membership and more recently into a consulting service.
On today’s Priority Queue, Ivan and I talk about automation, intent, product quality and what can be done to improve it, the direction private clouds might take, and whatever else catches our fancy.
Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit paessler.com today.
The post PQ 145: Greg And Ivan Have A Chat appeared first on Packet Pushers.
Way back in 2008 I passed the CCIE R&S lab to obtain my CCIE #22061. Over the past years, I …
The post CCIE Recertification Continuing Education Revie appeared first on Fryguy's Blog.
Last–but not least–in the technology triumvirate presenting a joint session at Networking Field Day 17 was Cumulus Networks. This post looks at the benefits of Cumulus Linux as a NOS on the Mellanox Spectrum Ethernet switch platform.

I’ve not yet managed to deploy Cumulus Linux in anger, but it’s on a fairly short list of Network Operating Systems (NOS) which I would like to evaluate in earnest, because every time I hear about it, I conclude that it’s a great solution. In fact, I’m having difficulty typing this post because I have to stop frequently to wipe the drool from my face.
Cumulus Linux supports around 70 switches from 8 manufacturers at this time, and perhaps obviously, that includes the Mellanox Spectrum switches that were presented during this session. This is the beauty of disaggregation of course; it’s possible to make a hardware selection, then select the software to run on it. Mellanox made a fairly strong case for why the Spectrum-based hardware is better than others, so now Cumulus has to argue for why they would be the best NOS to run on the Mellanox hardware.
Cumulus Linux, as the name suggests, is based on Debian linux. Continue reading
Will speakers at the upcoming Cloud Foundry Summit provide real insight into how to solve container deployment challenges?
The startup maintains a free and open source monitoring framework as well as a commercial platform.
Hi,
What started to be a exploration project is now turning out to be pretty useful for me in day to day analysis. Back in days when I worked in support, there was nothing to predict or really worry about historical events for any future work, just grep for logs and you are done with the last flap and analysis.
Customers / Networks now look for more data, while there are systems which do the telemetry and prediction, from an analysis point of view, as an engineer I want to know if the device or a circuit over an interface is stable over a period of time or even if it flaps what is the likely time and day it flaps in a week for a smoother migration.
Requirement : Plot a simple graph analyzing the interface flaps over a period of one week for a specific interface and decide the actions next from the log messages.[in this case i used a junos device]
Well grepping the logs is not something new for a seasoned engineer but having visual data will prove to be useful for a cutover or migration.
There are systems which can do this work on Continue reading
The company is building a software platform that can be deployed on virtually any edge device in support of IoT. This involves a lightweight software stack that can adapt to different deployment models.
With the growing presence and sophistication of online threats like viruses, ransomware, and phishing scams, it’s increasingly important to have the right protection and tools to help protect your devices, personal information, and files from being compromised. Microsoft already provides robust security for Office services, including link checking and attachment scanning for known viruses and phishing threats, encryption in transit and at rest, as well as powerful antivirus protection with Windows Defender. Today, we’re announcing new advanced protection capabilities coming to Office 365 Home and Office 365 Personal subscribers to Continue reading
Operators want to be able to use different radio heads from different vendors and have them interoperate with existing baseband units. This spec will make that possible.

As engineers at Cloudflare quickly adapt our software stack to run on ARM, a few parts of our software stack have not been performing as well on ARM processors as they currently do on our Xeon® Silver 4116 CPUs. For the most part this is a matter of Intel specific optimizations some of which utilize SIMD or other special instructions.
One such example is the venerable jpegtran, one of the workhorses behind our Polish image optimization service.
A while ago I optimized our version of jpegtran for Intel processors. So when I ran a comparison on my test image, I was expecting that the Xeon would outperform ARM:
vlad@xeon:~$ time ./jpegtran -outfile /dev/null -progressive -optimise -copy none test.jpg
real 0m2.305s
user 0m2.059s
sys 0m0.252s
vlad@arm:~$ time ./jpegtran -outfile /dev/null -progressive -optimise -copy none test.jpg
real 0m8.654s
user 0m8.433s
sys 0m0.225s
Ideally we want to have the ARM performing at or above 50% of the Xeon performance per core. This would make sure we have no performance regressions, and net performance gain, since the ARM CPUs have double the core count as our current 2 socket setup.
In this case, however, I Continue reading