IDG Contributor Network: What to understand about health care IoT and its security

As we have seen, the Internet of Things will disrupt and change every industry and how actors within it do business. Along with new paradigms in services and products that one can offer due to the proliferation of IoT, come business risks as well as heightened security concerns – both physical and cyber. In our prior column, we spoke about this topic in the context of the Smart Electric Grid. Today we’re taking a look at how IoT is disrupting the health care market and how we can take steps to secure it.To read this article in full, please click here

IDG Contributor Network: What to understand about health care IoT and its security

As we have seen, the Internet of Things will disrupt and change every industry and how actors within it do business. Along with new paradigms in services and products that one can offer due to the proliferation of IoT, come business risks as well as heightened security concerns – both physical and cyber. In our prior column, we spoke about this topic in the context of the Smart Electric Grid. Today we’re taking a look at how IoT is disrupting the health care market and how we can take steps to secure it.To read this article in full, please click here

The Roadmap Ahead For Exascale HPC In The US

The first step in rolling out a massive supercomputer installed at a government sponsored HPC laboratory is to figure out when you want to get it installed and doing useful work. The second is consider the different technologies that will be available to reach performance and power envelope goals. And the third is to give it a cool name.

Last but not least is to put a stake in the ground by telling the world about the name of the supercomputer and its rough timing, thereby confirming. These being publicly funded machines, this is only right.

As of today, it’s

The Roadmap Ahead For Exascale HPC In The US was written by Timothy Prickett Morgan at The Next Platform.

BrandPost: What is Intelligent Automation?

The operations environment for service providers is growing increasingly complex. While advancements like Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) enable on-demand services, among many other benefits, existing network management and Operational Support Systems (OSSs) lack the scale and flexibility to meet the requirements of these more dynamic network technologies.Simple automation techniques like custom scripting are often used to reduce repetitive manual tasks, but providers are looking for more robust automation capabilities to reduce operational complexity and improve efficiency, at scale. By leveraging software purpose-built for dynamic SDN/NFV environments, and incorporating recent advancements in big data analytics and machine learning, network operators can make true intelligent automation possible from end-to-end and, as a result, run their businesses smarter and much more efficiently.  To read this article in full, please click here

BrandPost: What Is Intelligent Automation?

The operations environment for service providers is growing increasingly complex. While advancements like Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) enable on-demand services, among many other benefits, existing network management and Operational Support Systems (OSSs) lack the scale and flexibility to meet the requirements of these more dynamic network technologies.Simple automation techniques like custom scripting are often used to reduce repetitive manual tasks, but providers are looking for more robust automation capabilities to reduce operational complexity and improve efficiency, at scale. By leveraging software purpose-built for dynamic SDN/NFV environments, and incorporating recent advancements in big data analytics and machine learning, network operators can make true intelligent automation possible from end-to-end and, as a result, run their businesses smarter and much more efficiently.  To read this article in full, please click here

The real cause of large DDoS – IP Spoofing

A week ago we published a story about new amplification attacks using memcached protocol on UDP port 11211. A few things happened since then:

Let's take a deep breath and discuss why such large DDoS attacks are even possible on the modern internet.

Large attacks use IP spoofing

8426525097_cf3ed2db55_z

CC BY-SA 2.0 image by DaPuglet

All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. For greater speed these packets are hand crafted by attackers - they are not generated using high-level, well-behaved libraries. Packets are mashed together as a series of bytes and fired onto the network to inflict the greatest damage.

L3 attacks can be divided into two categories, depending on where the attacker directs their traffic:

  • Direct: where the traffic is sent directly against a victim IP. A SYN flood is a common attack of this type.

  • Amplification: the traffic is sent to vulnerable Continue reading

Cisco Live CAE and Guest Keynote Announcements

As you may have heard by now, there have been a few exciting announcements from Cisco Live 2018 regarding the venue for the customer appreciation event and the closing keynote speakers.

Across The Universe

The first big announcement is the venue for the CAE. When you’re in Orlando, there are really only two options for the CAE. You either go to the House of the Mouse or you go to Universal Studios. The last two times that Cisco Live has gone to Orlando it has been to Universal. 2018 marks the third time!

Cisco is going big this year. They’ve rented the ENTIRE Universal Studios park. Not just the backlot. Not just the side parks. They WHOLE thing. You can get your fix on the Transformers ride, visit Harry Potter, or even partake of some of the other attractions as well. It’s a huge park with a lot of room for people to spread out and enjoy the scenery.

That’s not all. The wristband that gets you into the CAE also gets you access to Islands of Adventure before the full park opens! You can pregame the party by hanging out at Hogwarts, going to Jurassic Park, or joining your Continue reading

Cumulus content roundup: March

Welcome back to the Cumulus content roundup! This month we’re all about trying new networking solutions and practices. Whether it’s experimenting with EVPN or allowing automation to improve your network, we’re providing you with everything you need to help you start testing out the waters. We’ve got webinars, white papers and more to guide you, so get out your compass and start navigating the new world of networking!

What’s cooking at Cumulus?

The business benefits of Cumulus EVPN: Cumulus Ethernet Virtual Private Network (EVPN) is here to provide the solutions to your architectural complexities and make your data center even more efficient. Don’t believe us? Read this EVPN white paper to learn about the high-level business benefits your organization can leverage with Cumulus EVPN.

Networking in the container age: You definitely don’t want to miss this webinar! In this episode, you’ll learn about the popular container networking models and the pros and cons of each. Watch it now and find out how to best leverage orchestration tools such as Docker and Kubernetes.

5 Ways you can leverage the Linux community for your data center network: One of the greatest advantages of using a network operating system based Continue reading

IDG Contributor Network: IoT security: whose job is it anyway?

It’s been nearly two decades since the coining of the term “Internet of Things,” yet we are still asking the same question: “Whose responsibility is it to secure the billions of IoT devices?” Given the market’s progress of late, you would think we’d have it figured out by now; but, it’s not that simple.Although IoT security has long been a hot topic of discussion, it has become more important—and more challenging – than ever. First, gone are the days when operational technology (OT) was single-handedly responsible for securing IoT, often taking a “security by obscurity” approach by physically separating production operations and industrial networks from enterprise networks and the Internet. Although enterprises are realizing the need to converge IT with OT to drive new use cases, enable an open flow of data between networks and applications, support better business decisions, lower costs, and reduce complexity, new attack surfaces are arising between the gaps in IT and OT practices.To read this article in full, please click here

IDG Contributor Network: Submarine cable boom fueled by new tech, soaring demand

It’s been 160 years since the world’s first submarine cable linked a remote corner of Trinity Bay, Newfoundland, with Valentia Island on the west coast of Ireland in 1858. That telegraph cable failed after three weeks, but a new method for transoceanic communications had been established, and today submarine cables are a critical piece of digital infrastructure that’s fast expanding in prevalence and prominence globally – though not yet quickly enough to meet voracious demand for capacity.Between 2013 and 2017, the subsea cable industry has added an average of 32 percent of capacity annually on major submarine cable routes, according to the industry magazine SubTel Forum. Still, the industry needs to do more. “It will have to increase activity to stay ahead of demand,” SubTel Forum said in its annual report this year.To read this article in full, please click here

IDG Contributor Network: Submarine cable boom fueled by new tech, soaring demand

It’s been 160 years since the world’s first submarine cable linked a remote corner of Trinity Bay, Newfoundland, with Valentia Island on the west coast of Ireland in 1858. That telegraph cable failed after three weeks, but a new method for transoceanic communications had been established, and today submarine cables are a critical piece of digital infrastructure that’s fast expanding in prevalence and prominence globally – though not yet quickly enough to meet voracious demand for capacity.Between 2013 and 2017, the subsea cable industry has added an average of 32 percent of capacity annually on major submarine cable routes, according to the industry magazine SubTel Forum. Still, the industry needs to do more. “It will have to increase activity to stay ahead of demand,” SubTel Forum said in its annual report this year.To read this article in full, please click here

IDG Contributor Network: Submarine cable boom fueled by new tech, soaring demand

It’s been 160 years since the world’s first submarine cable linked a remote corner of Trinity Bay, Newfoundland, with Valentia Island on the west coast of Ireland in 1858. That telegraph cable failed after three weeks, but a new method for transoceanic communications had been established, and today submarine cables are a critical piece of digital infrastructure that’s fast expanding in prevalence and prominence globally – though not yet quickly enough to meet voracious demand for capacity.Between 2013 and 2017, the subsea cable industry has added an average of 32 percent of capacity annually on major submarine cable routes, according to the industry magazine SubTel Forum. Still, the industry needs to do more. “It will have to increase activity to stay ahead of demand,” SubTel Forum said in its annual report this year.To read this article in full, please click here

Recent Changes in my “Learning Tools” Repository

A couple years ago, I created a “learning-tools” repository on GitHub with the goal of creating environments/tools that would help others learn new technologies. At first, the contents of the repository were almost exclusively leveraging Vagrant, but over time I’ve extended the environments to also leverage Ansible and to use tools such as Terraform. Over the past month or so, I’ve made a few additional (albeit relatively minor) updates that I also wanted to share.

As I said, the updates are relatively minor:

  • I’ve added environments for running generic versions of Fedora Atomic Host (26 and 27), Ubuntu 16.04, and Debian 9.x. These environments are probably of limited value by themselves, but in the future I may use them as the basis for more complex environments based on these operating systems. Of course, others may leverage them as the basis for projects of their own.
  • I’ve added Libvirt support for a number of the Vagrant-based environments, based on my experience with the Vagrant Libvirt provider. This support is limited to areas where I was able to find Libvirt-formatted Vagrant boxes, so you’ll find Libvirt support for the environments using CentOS Atomic Host, Fedora Atomic Host, and Debian. Continue reading

Enterprise IoT: Business uses for RFID technology

Internet of Things (IoT) has made a big buzzword over the past few years as organizations have added intelligent controls to refrigerators, soda machines, washer and dryers, medical robots and lightbulbs. While the consumerization of IoT is in our everyday life, enterprises have been looking for ways IoT can benefit them and their users to improve day to day tasks.+Related: Testing RFID devices for enterprise deployment; Most powerful internet of things companies+To read this article in full, please click here

Routing Security BoF – APRICOT 2018

On Sunday, 25 February, the first day of APRICOT 2018, a “Routing Security BoF” (birds of a feather: An informal discussion group) was organized to address the ever-growing routing related incidents happening on daily basis. We have discussed routing security in general within the Asia Pacific region but there was a need to have a platform for open and candid discussion among the network operator community to find a possible way forward, where operators can share their approach in securing their own infrastructure and keeping the internet routing table clean as well.

A quick introduction was provided by the moderator (Aftab Siddiqui) on why it is important to have this BoF. Here are the introductory slides:

The first technical community presenter was Yoshinobu Matsuzaki (Maz) from Internet Initiative Japan (IIJ), the first ISP in Japan started in 1992. IIJ is one of the few ISPs in the region implementing prefix filtering, source address validation for their end customers, and making sure that all their routing information is reflecting the current status in the peeringdb for AS2497. IIJ was the first Asia Pacific ISP to join MANRS (Mutually Agreed Norms for Routing Security), a global initiative, supported by the Continue reading

Model-Driven Telemetry Isn’t as New as Some People Think

During the Campus Evolution with Cat9K presentation (I hope I got it right - the whole event was an absolute overload) the presenter mentioned the benefits of brand-new model-driven telemetry, which immediately caused me to put my academic hat on and state that we had model-driven telemetry for at least 30 years.

Don’t believe me? Have you ever looked at an SNMP MIB description? Did it look like random prose to you or did it seem to have some internal structure?

Read more ...

Istanbul (not Constantinople): Cloudflare’s 124th Data Center

Istanbul (not Constantinople): Cloudflare’s 124th Data Center

Istanbul (not Constantinople): Cloudflare’s 124th Data Center

Cloudflare is excited to turn up our newest data center in Istanbul, Turkey. This is our 124th data center globally (and 62nd country), and it is throwing a curveball in our data center by continent tracking. Istanbul is one of the only cities in the world to span two continents: Europe and Asia. Technically, we’ll specify this is our 34th data center in Europe. In the coming weeks, we’ll continue to attract more traffic to this deployment as more networks interconnect with us locally.

March 2018 is a big month for us, as we’ll be announcing (on average) nearly one new Cloudflare data center per day. Stay tuned as we continue to meaningfully expand our geographic coverage and capacity.

Turkish Internet

Istanbul (not Constantinople): Cloudflare’s 124th Data Center
The Hagia Sophia - Photo by Blaque X / Unsplash

Istanbul itself is home to more than 16 million people, and Turkey is home to over 80 million people. For reference, Turkey’s population is comparable to Germany’s, where Cloudflare turned up its 11th, 31st, 44th, 72nd and 110th data centers in Frankfurt, Düsseldorf, Berlin, Hamburg and Munich. Internet usage in Turkey is approaching 70%, while the rate of Turkish households with access to Internet now exceeds Continue reading