IoT startups fill security gaps

As the volume of IoT devices connecting to enterprise networks continues to climb, the number of security threats has been increasing in lockstep. Cybersecurity threats, alongside supply chain issues, chip shortages and geopolitical instability, are a major reason that IoT growth has been slower than many analysts had predicted.Even so, the scale of the IoT security problem is great enough that 52 IoT startups raised a total of $840 million in the latest quarter, and even cautious analysts believe the IoT market will grow steadily in the coming years. In fact, research firm IDC predicts that the IoT market will expand to 55.7 billion connected IoT devices by 2025, with those devices generating 80B zettabytes (ZB) of data.To read this article in full, please click here

IoT startups fill security gaps

As the volume of IoT devices connecting to enterprise networks continues to climb, the number of security threats has been increasing in lockstep. Cybersecurity threats, alongside supply chain issues, chip shortages and geopolitical instability, are a major reason that IoT growth has been slower than many analysts had predicted.Even so, the scale of the IoT security problem is great enough that 52 IoT startups raised a total of $840 million in the latest quarter, and even cautious analysts believe the IoT market will grow steadily in the coming years. In fact, research firm IDC predicts that the IoT market will expand to 55.7 billion connected IoT devices by 2025, with those devices generating 80B zettabytes (ZB) of data.To read this article in full, please click here

IoT startups fill security gaps

As the volume of IoT devices connecting to enterprise networks continues to climb, the number of security threats has been increasing in lockstep. Cybersecurity threats, alongside supply chain issues, chip shortages and geopolitical instability, are a major reason that IoT growth has been slower than many analysts had predicted.Even so, the scale of the IoT security problem is great enough that 52 IoT startups raised a total of $840 million in the latest quarter, and even cautious analysts believe the IoT market will grow steadily in the coming years. In fact, research firm IDC predicts that the IoT market will expand to 55.7 billion connected IoT devices by 2025, with those devices generating 80B zettabytes (ZB) of data.To read this article in full, please click here

Dataplane MAC Learning with EVPN

Johannes Resch submitted the following comment to the Is Dynamic MAC Learning Better Than EVPN? blog post:

I’ve also recently noticed some vendors claiming that dataplane MAC learning is so much better because it reduces the number of BGP updates in large scale SP EVPN deployments. Apparently, some of them are working on IETF drafts to bring dataplane MAC learning “back” to EVPN. Not sure if this is really a relevant point - we know that BGP scales nicely, and its relatively easy to deploy virtualized RR with sufficient VPU resources.

While he’s absolutely correct that BGP scales nicely, the questions to ask is “what is the optimal way to deliver a Carrier Ethernet service?

Dataplane MAC Learning with EVPN

Johannes Resch submitted the following comment to the Is Dynamic MAC Learning Better Than EVPN? blog post:

I’ve also recently noticed some vendors claiming that dataplane MAC learning is so much better because it reduces the number of BGP updates in large scale SP EVPN deployments. Apparently, some of them are working on IETF drafts to bring dataplane MAC learning “back” to EVPN. Not sure if this is really a relevant point - we know that BGP scales nicely, and its relatively easy to deploy virtualized RR with sufficient VPU resources.

While he’s absolutely correct that BGP scales nicely, the questions to ask is “what is the optimal way to deliver a Carrier Ethernet service?

Schedule 0923

Here’s a preview of what I’m working on for those who are interested:

  • September 2023: (this Friday) How Routers Really Work, a three-hour live webinar at Safari Books Online through Pearson
  • October 2023:
    • How the Internet Really Works a four-hour live webinar at Safari Books Online through Pearson; this is newly formatted and reorganized version of the two sessions I used to do
    • I’m speaking at a small theological conference on AI and ethics in Cary, NC
  • November 2023:
    • The new CCST book should be released
    • I have recorded a network basics video series that should be released in late 2023 or early 2024
  • January 2024:
    • What Coders Need to Know about Networks, a new course, co-authored with an engineer from Akamai; a three-hour live webinar at Safari Books Online through Pearson
    • I’ll be teaching a course in network engineering at the University of Colorado for the spring semester
  • February 2024: A new three-hour live webinar on infrastructure interviewing skills at Safari Books Online through Pearson
  • March 2024: BGP Policy, a three-hour live webinar on Safari Books Online through Pearson
  • April 2024: Troubleshooting, a reformatted and rebuilt three-hour live webinar at Safari Books Online through Pearson

There will probably Continue reading

China’s 1.5 Exaflops Supercomputer Chases Gordon Bell Prize – Again

The Association for Computing Machinery has just put out the finalists for the Gordon Bell Prize award that will be given out at the SC23 supercomputing conference in Denver, and as you might expect, some of the biggest iron assembled in the world are driving the advanced applications that have their eyes on the prize.

The post China’s 1.5 Exaflops Supercomputer Chases Gordon Bell Prize – Again first appeared on The Next Platform.

China’s 1.5 Exaflops Supercomputer Chases Gordon Bell Prize – Again was written by Timothy Prickett Morgan at The Next Platform.

Cisco snuffs HyperFlex development, hands HCI future to Nutanix

When Cisco and Nutanix partnered in August, it raised questions about the future development of Cisco’s HyperFlex platform. The other shoe dropped this week as Cisco said it would cease development of its hyperconverged infrastructure (HCI) system.Cisco announced the end-of-sale and end-of-life dates for its HyperFlex Data Platform (HXDP); the last day to order any products related to the system is September 11, 2024, and the last day to renew to an existing subscription is February 28, 2029. Active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

Cisco snuffs HyperFlex development, hands HCI future to Nutanix

When Cisco and Nutanix partnered in August, it raised questions about the future development of Cisco’s HyperFlex platform. The other shoe dropped this week as Cisco said it would cease development of its hyperconverged infrastructure (HCI) system.Cisco announced the end-of-sale and end-of-life dates for its HyperFlex Data Platform (HXDP); the last day to order any products related to the system is September 11, 2024, and the last day to renew to an existing subscription is February 28, 2029. Active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

Cisco snuffs HyperFlex development, hands HCI future to Nutanix

When Cisco and Nutanix partnered in August, it raised questions about the future development of Cisco’s HyperFlex platform. The other shoe dropped this week as Cisco said it would cease development of its hyperconverged infrastructure (HCI) system.Cisco announced the end-of-sale and end-of-life dates for its HyperFlex Data Platform (HXDP); the last day to order any products related to the system is September 11, 2024, and the last day to renew to an existing subscription is February 28, 2029. Active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

Cisco snuffs Hyperflex development, hands hyperconverged infrastructure future to Nutanix

When Cisco and Nutanix partnered in August, the writing was on the wall: future development of Cisco’s Hyperflex platform was on the rocks.The other shoe dropped this week as Cisco said it would end development of the hyperconverged (HCI) system, saying it would “end-of-life” the HyperFlex Data Platform (HXDP) and the last day to order any products related to the system would be September 11, 2024. The last day to renew to an existing subscription is February 28, 2029 though active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

Cisco snuffs Hyperflex development, hands hyperconverged infrastructure future to Nutanix

When Cisco and Nutanix partnered in August, the writing was on the wall: future development of Cisco’s Hyperflex platform was on the rocks.The other shoe dropped this week as Cisco said it would end development of the hyperconverged (HCI) system, saying it would “end-of-life” the HyperFlex Data Platform (HXDP) and the last day to order any products related to the system would be September 11, 2024. The last day to renew to an existing subscription is February 28, 2029 though active customers will be able to continue receiving Cisco support as necessary.To read this article in full, please click here

IBM X-Force: Use of compromised credentials darkens cloud security picture

As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here

IBM X-Force: Use of compromised credentials darkens cloud security picture

As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.“Over 35% of cloud security incidents occurred from attackers’ use of valid, compromised credentials,” wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. “Making up nearly 90% of assets for sale on dark web marketplaces, credentials’ popularity among cybercriminals is apparent, averaging $10 per listing – or the equivalent of a dozen doughnuts.”To read this article in full, please click here