IoT needs to be secured by the network

Everyone who has a stake in the internet of things, from device manufacturers to network service providers to implementers to customers themselves, makes important contributions to the security or lack thereof in enterprise IoT, attendees at Security of Things World were told.“The key to all [IoT devices] is that they are networked,” Jamison Utter, senior business development manager at Palo Alto Networks told a group at the conference. “It’s not just a single thing sitting on the counter like my toaster, it participates with the network because it provides value back to business.”“I think the media focuses a lot on consumer, because people reading their articles and watching the news … think about it, but they’re not thinking about the impact of the factory that built that consumer device, that has 10,000 or 20,000 robots and sensors that are all IoT and made this happen.”To read this article in full, please click here

IoT needs to be secured by the network

Everyone who has a stake in the internet of things, from device manufacturers to network service providers to implementers to customers themselves, makes important contributions to the security or lack thereof in enterprise IoT, attendees at Security of Things World were told.“The key to all [IoT devices] is that they are networked,” Jamison Utter, senior business development manager at Palo Alto Networks told a group at the conference. “It’s not just a single thing sitting on the counter like my toaster, it participates with the network because it provides value back to business.”“I think the media focuses a lot on consumer, because people reading their articles and watching the news … think about it, but they’re not thinking about the impact of the factory that built that consumer device, that has 10,000 or 20,000 robots and sensors that are all IoT and made this happen.”To read this article in full, please click here

Nutanix: We don’t need a traditional channel program | Channelnomics

Interesting piece on Nutanix and resellers: Nutanix’s senior director of EMEA channels Jan Ursi has defended against a claim the firm has no clear channel strategy, suggesting that the hyperconverged vendor does not rely on conventional methods, such as reward programs, in order to foster partner relationships. Some thoughts Building a reseller channel is expensive […]

Edge Computing: 5 Viable Telco Business Models

Edge Computing: 5 Viable Telco Business Models Download the HPE MEC Research Report, . Telecommunications (telco) providers are excited about Multi-Access Edge Computing (MEC) because it promises to make compute and storage capabilities available to customers at the edge of communications networks. Workloads and applications will be closer to customers, potentially enhancing experiences and enabling new services and offers. MEC is being... Read more →

Today, Eufy Genie Speaker With Alexa is Just $19.99 – Deal Alert

This Alexa-enabled smart speaker from Eufy is discounted 43% today on Amazon as part of their "Black Friday Week" event (see all of today's active deals here). Stream music from Spotify, Pandora, SiriusXM and others. Control smart home devices. Ask for weather, sports score, news and more. Eufy Genie currently averages 4 out of 5 stars on Amazon where Its typical list price has been reduced 43% to just $19.99. See it on Amazon here.To read this article in full, please click here

Multi-arch All The Things

[This post was written by Phil Estes and Michael Friis.]

True multi-platform workload portability has long been the holy grail of enterprise computing. All kinds of virtualization strategies have been used over the years to approximate this dream to varying levels of acceptable performance or usability. On the one hand, virtual machines and hardware virtualization are flexible enough that you can mix and match operating systems (and even CPU architectures) on the same host—but they come with a lot of overhead. However, language-based virtual runtimes don’t have packaging formats that encapsulate all system-level app dependencies, and that makes them unsuitable for general-purpose deployment and configuration management.

Docker came along as a unique type of virtualization that only virtualizes the operating system for container processes. Docker uses existing Linux kernel features to offer isolation characteristics that are similar to what is available with virtual machines. The analogy of a “standard shipping container,” combined with these isolation primitives, caught developer interest immediately. With this new shipping metaphor came speed and agility that blew the doors off virtual machine size and speed constraints that impacted developer workflow, not to mention developer happiness! The containerization craze has grown like wildfire since then, but Continue reading

Key Software Firms Reengineer Their Code With OpenACC

Academic centers and government agencies often design and write their own applications, but some of them and the vast majority of enterprise customers with HPC applications usually depend on third parties for their software. They also depend upon those software developers to continually enhance and scale those applications, and that means adding support for GPU accelerators. Two important ones, Gaussian and ANSYS, depend not only on GPUs, but the OpenACC programming model, to extend across more cores and therefore do more work faster.

Let’s start with Gaussian.

The way that chemicals react can be the difference between a product success

Key Software Firms Reengineer Their Code With OpenACC was written by Timothy Prickett Morgan at The Next Platform.

Basic Configuration of OSPF Over non-Broadcast Networks ( NBMA)

Today I will talk about the basic set of configurations of OSPF NBMA network type over the non Broadcast networks. Many of you guys already aware of the NBMA network type in the OSPF network. 

Before we start with the OSFP NBMA configuration part, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Lets have a Basic OSPF Network diagram for you guys, then we will come up with the diagram showing the routers connected in the OSPF via Frame-Relay network which will act as a NBMA OSPF network type.


Fig 1.1- OSPF Network Connected to other Campus Via NBMA Networks- Frame Relay

NBMA stands for Non-Broadcast Multiple Access where the network types X.25 and Frame Relay has no capability to support Broadcast traffic. Here in our example we will take Frame-Relay as a NBMA network which is connected via two routers 1 and 2. I defined these routers as Continue reading

BrandPost: MPLS, SD-WAN Not an Either/Or Scenario

Software-defined Wide Area Network (SD-WAN) technology is providing enterprises with greater flexibility and agility over WAN connectivity, but is being used to supplement rather than replace existing implementations of Multiprotocol Label Switching (MPLS) WAN circuits.That may be a surprise to many who are wowed by the fast pace of SD-WAN adoption. “In the classic engineer’s formulation, ‘You can have it cheaper, faster, or better…pick two,’” writes John Burke, CIO and Principal Research Analyst - Nemertes Research. “From time to time new technology comes along and, by changing the basic assumptions underlying existing solutions, manages to be cheaper and faster and better all at once. SD-WAN promises to hit the trifecta.”To read this article in full, please click here

Why Does It Take So Long to Upgrade Network Devices?

One of my readers sent me a question about his favorite annoyance:

During my long practice, I’ve never seen an Enterprise successfully managing the network device software upgrade/patching cycles. It seems like nothing changed in the last 20 years - despite technical progress, in still takes years (not months) to refresh software in your network.

There are two aspects to this:

Read more ...

Why Linus is right (as usual)

People are debating this email from Linus Torvalds (maintainer of the Linux kernel). It has strong language, like:
Some security people have scoffed at me when I say that security
problems are primarily "just bugs".
Those security people are f*cking morons.
Because honestly, the kind of security person who doesn't accept that
security problems are primarily just bugs, I don't want to work with.
I thought I'd explain why Linus is right.

Linus has an unwritten manifesto of how the Linux kernel should be maintained. It's not written down in one place, instead we are supposed to reverse engineer it from his scathing emails, where he calls people morons for not understanding it. This is one such scathing email. The rules he's expressing here are:
  • Large changes to the kernel should happen in small iterative steps, each one thoroughly debugged.
  • Minor security concerns aren't major emergencies; they don't allow bypassing the rules more than any other bug/feature.
Last year, some security "hardening" code was added to the kernel to prevent a class of buffer-overflow/out-of-bounds issues. This code didn't address any particular 0day vulnerability, but was designed to prevent a class of future potential exploits from being exploited. This is reasonable.

Network Automation Engineer Persona: Proof-of-concepts

If you’ve chosen to do a proof-of-concept (PoC), you should already know what the challenge or requirement is, what your satisfactory results look like and what the product or tool set is that will deliver on your commitment. A proof-of-concept is a recipe that should give you a well baked set of results.

Approaching a PoC

Approaching a PoC is a conscious decision to trial an idea that if successful, your business will put in to daily production to satisfy one or more business requirements.

So why aren’t the results more apparent in our day to day lives? Why do we not see these decision points more transparently?

Some people approach PoCs as a tyre kicking exercise, or a means to get a vendor to commit to them and then use as leverage against cost. If you’re just playing, you’re wasting time. If you’re tyre kicking then be prepared for lack of commitment or interest in the future from individuals or organisations. Genuine PoCs and evaluations are a normal and acceptable part of business, so the responses are different from those assisting with PoCs.

Approach a PoC with clear intent and understanding of the challenge that faces you. You must Continue reading