The time to deal with IoT security is now

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.”But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula, global product management leader and security expert at SenecaGlobal, what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected devices.To read this article in full, please click here

The time to deal with IoT security is now

In most cases, I try to turn a skeptical eye on hyperbole. So when a cybersecurity expert tells me that IoT security is a “ticking time bomb,” my initial reaction is not to worry about an upcoming “security apocalypse.”But I am already worried about security in the Internet of Things. So, I took the opportunity to ask Srini Vemula, global product management leader and security expert at SenecaGlobal, what’s really at risk as we hurtle toward 2020 and an estimated 20.4 billion connected devices.To read this article in full, please click here

This Holiday Season, Make Sure Your Smart Toy Isn’t a Toy Soldier

In the classic holiday story The Nutcracker, toy soldiers under command of a nutcracker spring to life to fight an army of evil mice. With the growth of smart toys, armies made up of toy “soldiers” could soon become reality. Using the same features that make them “smart,” smart toys can be taken over by outside actors and forced to do their bidding.

But rather than being led by a nutcracker to fight off evil rodents, real armies of toys could be led by criminals to attack you or me.

“Smart toys” (Internet or Bluetooth-enabled toys) are some of the most popular toys this holiday season. Internet or Bluetooth functionality enables smart toys to have amazing features. There are:

  • stuffed animals that play back messages sent from loved one’s smartphones
  • robots that teach children how to code
  • toys integrated with apps that teach reading and spelling skills while still providing physical exercise

Smart toys can do incredible things. Yet, if left unsecured, they not only present real privacy risks to the children and families who use them, but also security risks to everyone who relies on or uses the Internet.

Any Internet-connected device, be it a computer, connected thermostat, or smart toy, is at risk of being Continue reading

Artificial intelligence may not need networks at all

The advancement of edge computing, along with increasingly powerful chips, may make it possible for artificial intelligence (AI) to operate without wide-area networks (WAN).Researchers working on a project at the University of Waterloo say they can make AI adapt as computational power and memory are removed. And indeed if they can do that, it would allow the neural networks to function free of the internet and cloud — the advantages being better privacy, lower data-send costs, portability and the utilization of AI applications in geographically remote areas.The scientists say they can teach AI to learn it doesn’t need lots of resources.To read this article in full, please click here

Artificial intelligence may not need networks at all

The advancement of edge computing, along with increasingly powerful chips, may make it possible for artificial intelligence (AI) to operate without wide-area networks (WAN).Researchers working on a project at the University of Waterloo say they can make AI adapt as computational power and memory are removed. And indeed if they can do that, it would allow the neural networks to function free of the internet and cloud — the advantages being better privacy, lower data-send costs, portability and the utilization of AI applications in geographically remote areas.The scientists say they can teach AI to learn it doesn’t need lots of resources.To read this article in full, please click here

Juniper brings AI bots to intent-based networks

The concept of intent-based networks has received a lot of attention from media and networking professionals since Cisco launched its “Network Intuitive” earlier this year. Cisco has certainly made the term “intent-based” a household term, but that wasn’t the first time I had heard a vendor talk about this vision. Years ago, I was at an event held by Juniper Networks where its founder and CTO at the time, Pradeep Sindhu, talked about the death of Moore’s Law and how that would drive us towards this thing called intent-based networking. To read this article in full, please click here

Juniper brings AI bots to intent-based networks

The concept of intent-based networks has received a lot of attention from media and networking professionals since Cisco launched its “Network Intuitive” earlier this year. Cisco has certainly made the term “intent-based” a household term, but that wasn’t the first time I had heard a vendor talk about this vision. Years ago, I was at an event held by Juniper Networks where its founder and CTO at the time, Pradeep Sindhu, talked about the death of Moore’s Law and how that would drive us towards this thing called intent-based networking. To read this article in full, please click here

History Of Networking – Jeff Tantsura – Segment Routing

In this episode of History of Networking, Jeff Tantsura (Chair of the IETF Routing Area Working Group and Consulting VP of Network Architecture at Futurewei) joins Network Collective to discuss the origins and history of Segment Routing.

Episode Links:


Jeff Tantsura
Guest
Jordan Martin
Host
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Jeff Tantsura – Segment Routing appeared first on Network Collective.

How to extract content from compressed files on Linux

The easiest way to extract the content of compressed files (and compressed archives) on Linux is to prepare a script that both recognizes files by type and uses the proper commands for extracting their contents. Almost every compressed file will have an easily recognizable file extension — .Z, .gz, .tgz etc. And while the commands aren’t very complex, there sure are a lot of them and many options for each.So, why not attack the problem with a script that saves your precious brain cells for more challenging work? Let's look at an example that you might want to consider.To read this article in full, please click here

Data Is Not The New Oil, It’s Nuclear Power

Big Data. I believe that one phrase could get millions in venture capital funding. I don’t even have to put a product with it. Just say it. And make no mistake about it: the rest of the world thinks so too. Data is “the new oil”. At least, according to some pundits. It’s a great headline making analogy that describes how data is driving business and controlling it can lead to an empire. But, data isn’t really oil. It’s nuclear power.

Black Gold, Texas Tea

Crude oil is a popular resource. Prized for a variety of uses, it is traded and sold as a commodity and refined into plastics, gasoline, and other essential items of modern convenience. Oil creates empires and causes global commerce to hinge on every turn of the market. Living in a state that is a big oil producer, the exploration and refining of oil has a big impact.

However, when compared to Big Data, oil isn’t the right metaphor. Much like oil, data needs to be refined before use. But oil can be refined into many different distinct things. Data can only be turned into information. Oil burns up when consumed. Aside from some smoke and Continue reading

$50 off PlayStation 4 Slim 1TB Console: Star Wars Battlefront II Bundle – Deal Alert

Right now Amazon has the PS4 Slim 1TB console, Star Wars Battlefront II bundle for $50 off its typical list price, so you can buy it now for $249. This bundle will vault you into the greatest galactic battles in the Star Wars universe. Featuring a Jet Black 1TB PS4 and a DUALSHOCK 4 wireless controller, there's no better place to be a hero and dominate the galaxy. Crush the Rebel Alliance, or fight for freedom from the Empire. Dismantle the Resistance, or protect it from the First Order. The choice is yours in an all-new playground of intense galactic struggle. From epic ground assaults to stunning vehicle play and heart-pounding aerial dogfights, dominate every game mode in battles that span across all eras of the Star Wars universe. See this deal on Amazon.To read this article in full, please click here

The Future of Journalism in the Internet age: Watchdogs or Lapdogs?

Media watchdogs, increasingly criticized, threatened and attacked by corporate interests and global governments, are also among the prominent victims of falling public trust in the wake of the proliferation of so-called ‘fake’ news.

Despite some self-inflicted problems, such as those highlighted by the Leveson inquiry in the United Kingdom five years ago, news media and responsible journalism remain of critical importance to democracy.

The Internet Society’s 2017 Global Internet Report reveals how media is intricately entwined with society and it will become more so as more people and services go online. The Internet has grown from 400 million users in 2000 to 3.5 billion users today and as access expands further the media have countless new opportunities to increase their reach and better inform their audiences.

But “going online” also introduces unique challenges for the media. In the next five to seven years, the Internet will continue to fundamentally impact society and the media. According to Reporters without Borders, media freedom violations – impacting particularly anonymity, privacy and free expression – have increased by 14 percent in the past five years, for example.

As the Internet and news media become more converged, it is relatively easy to identify Continue reading

oVirt 4.2 Is Now Generally Available

We are delighted to announce the general availability of oVirt 4.2, as of December 19, 2017, for Red Hat Enterprise Linux 7.4, CentOS Linux 7.4, or similar.

oVirt 4.2 is an altogether more powerful and flexible open source virtualization solution. The release is a major milestone for the project, encompassing over 1000 individual changes and a wide range of enhancements spanning storage, network, engine, user interface, and analytics.

What’s new in oVirt 4.2?

The big new features:

The Administration Portal has been redesigned using Patternfly, a widely adopted standard in web application design that promotes consistency and usability across IT applications. The result is a more intuitive and user-friendly user interface, featuring improved performance. Here is a screenshot of the Administration Portal dashboard:

A new VM Portal for non-admin users. Built with performance and ease of use in mind, the new VM portal delivers a more streamlined experience.

A High Performance VM type has been added to the existing "Server" and "Desktop" types. The new type enables administrators to easily optimize a VM for high performance workloads.

The oVirt Metrics Store is a real-time monitoring solution, providing complete infrastructure visibility for decision making Continue reading

oVirt 4.2 Is Now Generally Available

We are delighted to announce the general availability of oVirt 4.2, as of December 19, 2017, for Red Hat Enterprise Linux 7.4, CentOS Linux 7.4, or similar.

oVirt 4.2 is an altogether more powerful and flexible open source virtualization solution. The release is a major milestone for the project, encompassing over 1000 individual changes and a wide range of enhancements spanning storage, network, engine, user interface, and analytics.

What’s new in oVirt 4.2?

The big new features:

The Administration Portal has been redesigned using Patternfly, a widely adopted standard in web application design that promotes consistency and usability across IT applications. The result is a more intuitive and user-friendly user interface, featuring improved performance. Here is a screenshot of the Administration Portal dashboard:

A new VM Portal for non-admin users. Built with performance and ease of use in mind, the new VM portal delivers a more streamlined experience.

A High Performance VM type has been added to the existing "Server" and "Desktop" types. The new type enables administrators to easily optimize a VM for high performance workloads.

The oVirt Metrics Store is a real-time monitoring solution, providing complete infrastructure visibility for decision making Continue reading

Unique IPv6 Prefix Per Host – How Complex Do You Want IPv6 to Be?

In December 2017 IETF published RFC 8273 created by the v6ops working group (which means there must have been significant consensus within the working group that we need the solution and that it makes at least marginal sense).

The RFC specifies a mechanism by which the first-hop router allocates a unique /64 IPv6 prefix for every host attached to a subnet and uses unicast and multicast RA responses sent to unicast MAC addresses to give every host the impression that it’s the sole host on its own subnet.

The first thought of anyone even vaguely familiar with how complex IPv6 already is should be “WTF???” Unfortunately, there are good reasons we need this monstrosity.

Read more ...

Introduction to Multi-Chassis Link Aggregation

Today I am going to talk about another technology named as Multi-Chassis Link Aggregation which is generally used is many of the vendors like Juniper, Arista Networks and so on. Here in this article I am going to have discussion with respect to Arista Networks.

As i said, before i will start with the Multi-Chassis Link Aggregation, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

Now the question is what is Multi-Chassis Link Aggregation ?
A multi-chassis link aggregation group (MLAG) is a pair of links that terminate on two cooperating switches and appear as an ordinary link aggregation group (LAG). The cooperating switches are MLAG peer switches and communicate through an interface called a peer link. 

While the peer link’s primary purpose is exchanging MLAG control information between peer switches, it also carries data traffic from devices that are attached to only one MLAG peer and Continue reading