Protecting the Network from Ransomware
Follow these security best practices to prevent your organization from falling victim to a ransomware attack.
Follow these security best practices to prevent your organization from falling victim to a ransomware attack.
One of my readers found this Culumus Networks article that explains why you can’t have more than a few hundred VXLAN-based VLAN segments on every port of 48-port Trident-2 data center switch.
Expect to see similar limitations in most other chipsets. There’s a huge gap between millions of segments enabled by 24-bit VXLAN Network Identifier and reality of switching silicon. Most switching hardware is also limited to 4K VLANs.
Read more ...Drupal has recently announced an update to fix a critical remote code execution exploit (SA-CORE-2018-002/CVE-2018-7600). In response we have just pushed out a rule to block requests matching these exploit conditions for our Web Application Firewall (WAF). You can find this rule in the Cloudflare ruleset in your dashboard under the Drupal category with the rule ID of D0003.
Drupal Advisory: https://www.drupal.org/sa-core-2018-002
For those who might expect Microsoft to favor its own Windows-centric platforms and tools to power comprehensive infrastructure for serving AI compute and software services for internal R&D groups, plan on being surprised.
While Microsoft does rely on some core windows features and certainly its Azure cloud services, much of its infrastructure is powered by a broad suite of open source tools. As Jim Jernigan, senior R&D systems engineer at Microsoft Research told us at the GPU Technology Conference (GTC18) this week, the highest volume of workloads running on the diverse research clusters Microsoft uses for AI development are running …
An Inside Look at What Powers Microsoft’s Internal Systems for AI R&D was written by Nicole Hemsoth at The Next Platform.
Amdocs' leadership position in ONAP seems to have given it an entrée with a major public cloud provider. And an Amdocs exec says open source is an environment where you cannot disconnect technical relationships from business.
Metaswitch’s routing and control plane protocols run as applications on top of AT&T’s disaggregated network operating system. That dNOS platform this week moved to the open source community as DANOS.
Drupal has recently announced an update to fix a critical remote code execution exploit (SA-CORE-2018-002/CVE-2018-7600). This patch is to disallow forms and form fields from starting with the “#” character which results in remote code execution.
We have also in accordance, just pushed out a rule to block requests matching these exploit conditions for our Web Application Firewall (WAF). You can find this rule in the Cloudflare ruleset in your dashboard under the Drupal category with the rule ID of D0003.
Drupal Advisory: https://www.drupal.org/sa-core-2018-002
The disaggregation push of its service provider OS includes support for routers using off-the-shelf silicon, but device support is limited to “a curated set of third-party devices.”
For more than a decade, GE has partnered with Nvidia to support their healthcare devices. Increasing demand for high quality medical imaging and mobile diagnostics alone has resulted in building a $4 billion segment of the $19 billion total life sciences budget within GE Healthcare.
This year at the GPU Technology Conference (GTC18), The Next Platform sat in as Keith Bigelow, GM & SVP of Analytics, and Erik Steen, Chief Engineer at GE Healthcare, discussed the challenges of deploying AI focusing on cardiovascular ultrasound imaging.
There are a wide range of GPU accelerated medical devices as well as those that …
Getting to the Heart of HPC and AI at the Edge in Healthcare was written by James Cuff at The Next Platform.
As we built our new website, one of my own guiding principles was “POSSE“, a content publishing model from the “IndieWeb” movement. The idea is:
Publish on your
Own
Site,
Syndicate
Elsewhere
Essentially, make sure you own your own content – and then share it out onto other sites and services. (See the IndieWeb page about POSSE for more discussion.) Make your own website the “hub” for all your content, and then have spokes going out to all the other places where people might discover and learn about your content.
To me, this model is the best way to support the principles of the open Internet, while engaging people in the places where they already are.
This is part of a series of posts about the evolution of our new site.
We aren’t just publishing reports, papers, blog posts and articles for the sake of talking about what we are doing.
We are publishing content to bring about change that ensures the Internet remains open, globally connected, and secure. As we said in our vision statement for the new website:
Our website is a driving force in Continue reading
Policing traffic and shaping traffic are two completely different things, but it is hard to know, in the wild, what the impact of one or the other will have on a particular traffic flow, or on the performance of applications in general. While the paper under review here, An Internet-Wide Analysis of Traffic Policing, is largely focused on the global ‘net, specifically from a content provider’s perspective, it contains lessons for just about every network operator who needs to manage Quality of Service (QoS) in a sane and meaningful way.
Traffic policing involves setting up a queue with a pool of tokens. For some unit of traffic—assume a packet here—received, a token is consumed. When a packet is transmitted, the token is added back to the pool. If the pool is sized correctly, short bursts in the traffic stream will be allowed through, but if the application attempts to establish a session using more bandwidth Continue reading