Summary of Cisco NX-OS security vulnerabilities I uncovered – Maximum Entropy

Cisco took FOUR YEARS to patch disclosed vulnerabilities in NX-OS.

Cisco took FOUR YEARS to patch disclosed vulnerabilities in NX-OS.
It uses Intel and Fortanix software.
Girls in Technology is a community-based initiative to help increase schoolgirls’ participation in emerging Internet technology careers. The pilot project, lead by the Internet Society Sri Lanka Chapter and supported by Beyond the Net Funding Programme, will provide grade 9 girls with coding lessons and extracurricular activities to help them select ICT subjects at grade 10. Niranjan Meegammana, project leader and director of the Shilpa Sayura Foundation, explains how this initiative will contribute to gender equality in STEM education and help the young women reach for the stars.
Internet Society: What motivated the Chapter to take this initiative?
Niranjan Meegammana: Sri Lanka is fast becoming a hub for technology and innovation, offering a wide range of careers in technology fields. However, girls pursuing a career in technology still remain a limited number. Girls are representing 50.28% of school population, but only 20% are actually studying ICT. The gender gap keeps on growing and generating a labor surplus. The root cause of this problem is the scarcity of opportunities for girls and teachers in the Internet sector.
Which innovative solutions will the project attempt to solve this problem?
Girls in Technology is implemented by Sri Lanka Chapter with Continue reading
The President's order cited "credible evidence" that the takeover would be a security risk to the U.S.
In this short take, recently posted over at the Network Collective, I discuss what a side channel attack is, and why they are important.
AOS is the first automation software in the Yahoo Japan data center that it didn’t build itself.
The France-based provider enhanced its WAN capabilities with Versa's Cloud IP platform.
You can't stop the spread of Kubernetes, you can only hope to contain it.
On today’s episode of “The Interview” with The Next Platform we talk about the growing problem of networks within networks (within networks) and what that means for future algorithms and systems that will support smart cities, smart grids, and other highly complex and interdependent optimization problems.
Our guest on this audio interview episode (player below) is Hadi Amini, a researcher at Carnegie Mellon who has focused on the interdependency of many factors for power grids and smart cities in a recent book series on these and related interdependent network topics. Here, as in the podcast, the focus is on the …
Networks Within Networks: Optimization at Massive Scale was written by Nicole Hemsoth at The Next Platform.

The idea of bringing liquids in the datacenter to cool off hot-running systems and components has often unnerved many in the IT field. Organizations are doing it as they look for more efficient and cost-effective ways to run their infrastructures, particularly as the workloads become larger and more complex, more compute resources are needed, parts like processors become more powerful and density increases.
But the concept of running water and other liquids through a system, and the threat of the liquids leaking into the various components and into the datacenter, has created uneasiness with the idea.
Still, the growing demands …
Sandia, NREL Look to Aquarius to Cool HPC Systems was written by Jeffrey Burt at The Next Platform.
The platform monitors more than 5 billion transactions per month, and generates real-time alerts when it detects behavioral anomalies.
Every time you see “Login with Facebook” or “Login with Twitter” etc. on a website or use login credentials issued by your employer or school, you’re using Identity and Access Management (IAM) technologies in the background. IAM has become central to our online interactions, but like a lot of infrastructure it’s largely invisible to users (at least when it’s well designed and implemented). IAM is evolving rapidly, the stakes are high, and enterprises face an increasingly complex and puzzling digital identity landscape. There is also growing concern that businesses know too much about us, and therefore end users should reclaim control over their own identities. IAM is a hot topic in the technology world, with new architectures, business models, and philosophies all in play.
Blockchain technology (sometimes also called distributed ledger technology – DLT) is also gaining attention. Proponents advocate it for a wide variety of use cases, including IAM. Blockchain is a broad class of relatively new data security methods, with certain properties of potential value in IAM. Many IAM companies have launched identity registration solutions “on the blockchain,” while others are developing new blockchain-inspired infrastructure for distributing information about users (called “attributes” and used to inform decisions about Continue reading
Changes to workloads in HPC mean alterations are needed up and down the stack—and that certainly includes storage. Traditionally these workloads were dominated by large file handling needs, but as newer applications (OpenFOAM is a good example) bring small file and mixed workload requirements to the HPC environment, it means storage approaches need to shift to meet the need.
With these changing workload demands in mind, recall that in the first part of our series on future directions for storage for enterprise HPC shops we focused on the ways open source parallel file systems like Lustre fall short for users …
Changing HPC Workloads Mean Tighter Storage Stacks for Panasas was written by Nicole Hemsoth at The Next Platform.
The Container Monitoring Essentials hub page discusses the importance of containers in today’s datacenter environment, predicting that containers will—in time—be the means by which all workloads are deployed on server platforms.
The post BGP / MPLS Layer3 VPNs appeared first on Noction.