IDG Contributor Network: Don’t get caught in an IoT security nightmare

Developing an IoT security competency and implementing an IoT risk assessment program should be an important strategic focus for any company implementing an IoT strategy.A great race is underway among companies in the industrial sectors to be leaders in the Internet of Things (IoT) realm. Companies are off and running in their plans to execute IoT strategies, and many are already connecting all manner of “things” to gather and analyze data about product usage and performance, factory output, maintenance issues, etc.The proof is in the spending. A June 2017 report by research firm International Data Corp. (IDC) said spending on IoT in 2017 was expected to grow 17% compared with the previous year, reaching more than $800 billion. By 2021, IDC said, global IoT spending is expected to reach about $1.4 trillion, including hardware, software, services, and connectivity that enable IoT.To read this article in full or to leave a comment, please click here

47% off Garmin vivosmart HR Activity Tracker – Deal Post

Garmin's vivosmart is the touchscreen activity tracker with wrist-based heart rate and a full suite of smart notifications. The sleek band is comfortable to wear all day, and the always-on display shows your stats, even in sunlight. With a built-in heart rate sensor and altimeter, it tracks and displays steps, distance, calories, heart rate, floors climbed and activity intensity. Receive text, call, email, calendar and other alerts on your wrist when paired with your phone. The full featured activity tracker averages 4 out of 5 stars on Amazon from over 2,600 reviewers, and is discounted right now down to just $79.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Strange Error with the Azure CLI

Over the last week or so, I’ve been trying to spend more time with Microsoft Azure; specifically, around some of the interesting things that Azure is doing with containers and Kubernetes. Inspired by articles such as this one, I thought it would be a pretty straightforward process to use the Azure CLI to spin up a Kubernetes cluster and mess around a bit. Simple, right?

Alas, it turned out not to be so simple (if it had been simple, this blog post wouldn’t exist). The first problem I ran into was the upgrading the Azure CLI from version 2.0.13 to version 2.0.20 (which is, to my understanding, the minimum version needed to do what I was trying to do). I’d installed the Azure CLI using this process, so pip install azure-cli --upgrade should take care of it. Unfortunately, on two out of three systems on which I attempted this, the Azure CLI failed to work after the upgrade. I was only able to fix the problem by completely removing the Azure CLI (which I’d installed into a virtualenv), and then re-installing it. First hurdle cleared!

With the Azure CLI upgraded, I proceeded to Continue reading

Is the U.S. finally about to take IoT security seriously?

Does IoT stand for “internet of threats”? One senator says it might soon, and warned that the internet of things could “pose a direct threat to economic prosperity, privacy and our nation’s security.”Indeed, security issues plaguing IoT devices have long been a concern, and last week congressional Democrats introduced a bill designed to help mitigate what are seen as widespread vulnerabilities. But while the effort is noble and may help raise awareness of the issues, there are lots of reasons why the Cyber Shield Act of 2017 won’t end up doing much to actually solve the problem.To read this article in full or to leave a comment, please click here

Is the U.S. finally about to take IoT security seriously?

Does IoT stand for “internet of threats”? One senator says it might soon, and warned that the internet of things could “pose a direct threat to economic prosperity, privacy and our nation’s security.”Indeed, security issues plaguing IoT devices have long been a concern, and last week congressional Democrats introduced a bill designed to help mitigate what are seen as widespread vulnerabilities. But while the effort is noble and may help raise awareness of the issues, there are lots of reasons why the Cyber Shield Act of 2017 won’t end up doing much to actually solve the problem.To read this article in full or to leave a comment, please click here

Modernizing Applications from PoC to Production with Docker Enterprise Edition

Containerizing a single legacy application with Docker Enterprise Edition (EE) can be quite simple and immediately makes the application more portable, scalable, and easier to manage and update. Taking this application to production requires additional planning and collaboration with security teams, performance testing and likely requires detailed operations and disaster recovery plans. This part of the process often has little to do with the technology but with the changes to the organization and governance model.

At DockerCon Europe, I presented a talk on the best practices and processes for taking a containerized legacy app or set of apps from a proof of concept (PoC) to production with these changes in mind. You can watch the full talk here:

A Prescriptive and Repeatable Methodology

The Modernize Traditional Apps [MTA] Program is the result of working with hundreds of companies over the years with deploying and using Docker Enterprise Edition [EE]. Those experiences have been transformed into a prescriptive methodology with best practices and considerations to help you get successfully from PoC to production.

After the PoC there is a short assessment phase of the existing organization, tools, and processes and then choosing the pilot application that is representative of the application Continue reading

Firewalls Checkpoint : Check Point 1100 Security Appliances Introduction


Today I am going to talk about the Checkpoint Firewalls where i am talking about the Checkpoint 1100 security appliances. There are lot of vendors who have head to head competition on the security domain which includes Palo-Alto, Cisco, Brocade and Checkpoint. The market is moving away from the stateful firewall as they are moving towards the Next generation firewalls which Gartner provide the set of features.

What is Next Generation Firewalls ?
Well I wrote so many articles here in this blog about the Next Generation Firewalls. Next Generation Firewall includes the features like Firewall, IPS, Stability and Reliability with Visibility feature. Below is the basic topology where it is showing where we can deploy the firewalls in the network. The below mentioned network topology showing the firewall is deployed on the gateway and for the internal segmentation of the networks. The network topology uses here is just for the demo purposes and have no relevance with any of the live or enterprise network.

Fig 1.1- Basic Firewall deployment in the Network

I had write some of the articles on Next generation firewalls earlier. Please go through the below links to get the more ideas of Next Generation Firewalls Continue reading

Cisco Access Points- Basics, Comparison with Aruba and Ruckus

Today I am going to talk about the Cisco Wireless topic where I will talk about Aironet 3700 Series Access point which features and the comparison with the other vendors as well. But before we are going to talk about the Aironet 3700 Access point we will talk about the Access points.

What is Access Point ?
Well if you talk about the Access point, It is a hardware device which is capable to creating the Wireless network in the campus or in the office. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.

What is the use of the Access Points?
High-density experience through a purpose-built, innovative chipset with best-in-class RF architecture for a high-performance enterprise network. Below is showing the basic topology of the Cisco Aironet Access points.

Fig 1.1- Cisco Aironet Network Topology

Cisco Aironet 3700 Access Points
The Cisco Aironet 3700 Series Access Point is designed for high-density network environments that utilize mission-critical, high-performance applications.

Fig 1.2- Cisco Aironet Models
The Aironet 3700 Series delivers:
  • The industry's first wireless access point with integrated 802.11ac Wave 1 radio to support a 4x4 MIMO with Continue reading

Introduction to Cloud Computing : Private, Public and Hybrid Cloud Models

Today I am going to talk about the most demanding cloud technology where so many companies are moving towards the next generation cloud computing approach. Even as per the demand, vendors and service providers are taking the new route to provide the cloud based technology to their customers.

There are so many questions as many of you are not aware of what cloud actually is and how they migrate the traditional network to cloud based infrastructure. But make sure if you are moving to the cloud based technology the hardware should be cloud ready to support and even support the third party APIs.

What is Cloud Computing and how are they helpful to the customers ?

Cloud computing approach storing and gaining access to information and applications over the internet rather than your computer's tough power. It is going again to the times of flowcharts and displays that would constitute the huge server-farm infrastructure of the internet as nothing but a puffy, white cumulonimbus cloud, accepting connections and dishing out facts because it floats.

Cloud computing is the result of the evolution and adoption of existing technology and paradigms. The aim of cloud computing is to permit customers to take benefit Continue reading

RONOG4 meeting in Bucharest, Romania

The 4th edition of Romanian NOG (RONOG) is being held today, 31 October 2017, in Bucharest, Romania, and as the largest meeting of Internet technology professionals in Romania it is expecting to hit over 170 attendees.

As specified in the meeting agenda, I’ll deliver my talk about NAT64 experiments in the go6lab and also one very useful tool that came out of this testing – NAT64Check. I also have the honour of chairing the IPv6/IOT session.

I’m looking forward to being back in Bucharest and if you happen to be at RONOG4, please come and find me in the hallways as I’m always happy to chat about technology, IPv6, DNSSEC, DANE and everything else that makes our Internet a bit of a better place!

The post RONOG4 meeting in Bucharest, Romania appeared first on Internet Society.

How GlaxoSmithKline is Accelerating Science with Docker Enterprise Edition

GlaxoSmithKline is a global pharmaceutical company headquartered in the United Kingdom. Their company mission is “to help people do more, feel better, and live longer”. One way they are doing that is by using data science to find new drug formulations that can improve lives. At DockerCon Europe, Ranjith Raghunath, the director of Big Data Solutions and Lindsay Edwards, the head of Respiratory Data Sciences at GlaxoSmithKline presented how Docker Enterprise Edition (Docker EE) is helping them accelerate drug discovery through a project called Edge Node On Demand.

Letting Science Drive Technology at GlaxoSmithKline

Leveraging Data Science for Improved Outcomes

The biggest challenge in pharmaceutical research is that hundreds of drugs formulations need to be created to take one successfully to market only 3% of formulated molecules actually become medicine. Lindsay Edwards heads a Data Science group that is focused on respiratory illnesses like Chronic Obstructive Pulmonary Disease (COPD) and asthma. His group uses big data analytics to mine research data and previous patient trial data to arrive at results more rapidly.

However, data science is a new and emerging field. There are new software tools and open source data analytics solutions coming to market all the time and different hardware Continue reading

The Tug Of War Between InfiniBand And Ethernet

If you want to get a microcosmic view of the epic battle between Ethernet and InfiniBand (which also includes Omni-Path no matter how much Intel protests) as they relate to high performance computing in its many modern guises, there is perhaps no better place to look at what Mellanox Technologies is selling.

Mellanox, which has been peddling InfiniBand chips, switches, and adapters since the inception of this technology, bought its biggest rival in switch sales, Voltaire, for $218 million back in November 2010. And that was perhaps its smartest move right up to the moment where the company launched

The Tug Of War Between InfiniBand And Ethernet was written by Timothy Prickett Morgan at The Next Platform.

Network Automation Engineer Persona: Targeted Learning

The series of Network Automation Engineer (NAE) Persona blog posts have churned some comments in the community around learning. Part of the feedback appears to be the hero syndrome fighting back and also the odd misunderstanding, which might be a result of fear. Change often results in fear, so this is natural.

Network Heroes

Some people love networking because it makes them feel special. Some people have got used to that special feeling and hang on to the fact that they’re

important
. These network engineers feel like a “Packet Lord”.

Automation is designed to remove from humans deterministic and testable tasks. One result is fewer self-titled “Prime minister of Packets” and fewer bottlenecks. Taking IaC (Infrastructure as Code), it becomes so much simpler to define tasks, implement them and test for success or failure. Dealing with sources of truth is part of the natural flow of the process instead of an afterthought on a Friday afternoon.

The hero very much becomes the norm at this point.

Articles

At a high level, the articles discuss the evolving NAE persona and not what you should or shouldn’t learn. The articles do not discourage learning, they recognise and promote learning. After all, you Continue reading

IDG Contributor Network: Zombie companies are everywhere! But there’s a cure

It’s zombie season again! Not only was The Walking Dead back with new episodes this month, but neighborhoods around the country are about to be crawling with zombies (most can be staved off with a little chocolate).In business, unfortunately, zombie season has been in full swing for some time. This is an era of digital disruption, and it’s completely changed the way business is done, but not everyone has gotten on board. Companies are persisting with outdated business models, investing in outdated products, and committed to outdated delivery methods. To me, these companies are zombies, dead without knowing it. They may be moving forward, but don’t let the motion fool you, they’re only moving toward obsolescence.To read this article in full or to leave a comment, please click here