Versa Breaks Into the Chinese Market with China Telecom Win
China Telecom could have chosen Huawei, but didn’t.
China Telecom could have chosen Huawei, but didn’t.
ONF consolidates open source communities; More than 21,000 people attended the first Mobile World Congress Americas.
Equifax Inc. (NYSE: EFX) today announced a cybersecurity incident potentially impacting approximately 143 million U.S. consumers.The word consumers was widely translated to customers, as in this Bloomberg story:
Equifax Inc. said its systems were struck by a cyberattack that may have affected about 143 million U.S. customers of the credit reporting agencyBut these aren't the same thing. Equifax is a credit rating agency, keeping data on people who are not its own customers. It's an important difference.
Equifax has been intensely Continue reading
The two companies also collaborate on the Cyber Threat Alliance.
The pace of vendor adoption of software remains an ongoing concern.
Microsoft is using its Coco Framework technology to encrypt data in use for Azure SQL Database.
Hey, it's HighScalability time:
If you like this sort of Stuff then please support me on Patreon.
Billions of Bluetooth-enabled devices may be exposed to a new remote attack called “BlueBorne”, even without user interaction or pairing. Affected systems include Windows, iOS (older than iOS 10), the Linux kernel, and Android. What should you do about it?
Bluetooth is ubiquitous, commonly connecting accessories like headsets and keyboards, but is also used throughout the brave new Internet of Things (IoT) world. An attacker exploiting these BlueBorne vulnerabilities can mount a man-in-the-middle attack, or even take control of a device without the user even noticing it.
The vulnerabilities were discovered by a security company called Armis earlier this year. Researchers reached out to the companies responsible for vulnerable implementations that lead to the coordinated disclosure (and patches) on September 12. (You can read more about our views on responsible disclosure and collaborative security in Olaf Kolkman’s blog post here.)
This case once again highlights how crucial it is that software update mechanisms are available to fix vulnerabilities, update configuration settings, and add new functionality to devices. There are challenges, both technological and economic, in having update capabilities ubiquitously deployed, as discussed in the recently published Report from the Internet of Things Software Update (IoTSU) Workshop 2016.
Vulnerabilities Continue reading
The post Worth Reading: Hunting AdwindRAT appeared first on rule 11 reader.

You might have seen this Register article this week which summarized a Future:Net talk from Peyton Koran. In the article and the talk, Peyton talks about how the network vendor and reseller market has trapped organizations into a needless cycle of bad hardware and buggy software. He suggests that organizations should focus on their new “core competency” of software development and run whitebox or merchant hardware on top of open source networking stacks. He says that developers can use code that has a lot of community contributions and shares useful functionality. It’s a high and mighty goal. However, I think the open source part of the equation is going to cause some issues.
The idea behind open source isn’t that hard to comprehend. Everything available to see and build. Anyone can contribute and give back to the project and make the world a better place. At least, that’s the theory. Reality is sometimes a bit different.
Many times, I’ve had off-the-record conversations with organizations that are consuming open source resources and projects as a starting point for building something that will end up containing many proprietary resources. When I ask them about contributing back to Continue reading
It’s designed to function as the VIM in NFV networks.
We discussed LAG (Link Aggregation Group) and the ECMP (Equal Cost Multipath) on real network deployments with the Service Provider/Telco Engineer engineers on my slack group. I thought it was good discussion so you can see what others are doing and the reasons of their deployments. In this talk, three people involved. Myself […]
The post LAG vs. ECMP discussion on real network deployments appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
SolarWinds survey provides insight into the lives of IT professionals.
IRP Lite – the free version of the Intelligent Routing Platform just got even better. It is now equipped with the Circuit Issues Detection
The post IRP Lite (free IRP version) now equipped with the Circuit Issues Detection feature appeared first on Noction.

It’s that moment you’ve been waiting for…It’s time to build your DockerCon Agenda!
DockerCon is coming back to Europe with some of the best content we’ve ever presented. Don’t miss out and register now before it’s too late. If you are just learning about Docker or have been dabbling in containers for a while, we’re confident that DockerCon will have the right content for you. With eight tracks, two summits (Moby Project Summit and Enterprise Summit) and more than 60 sessions presented by Docker Engineering, Docker Captains, partners, practitioners and customers such as Finnish Railways, MetLife, PayPal, Splunk and Assa Abloy, DockerCon 2017 will cover a wide range of use cases and topics.
We encourage you to review the full catalogue of DockerCon sessions and build your agenda for the week. You’ll find a new agenda builder that allows you to apply filters based on your areas of interest, experience, job role and more! If you’ve registered you’ll also be able to get recommended sessions as well build you schedule.
One of our favorite features of the Agenda Builder is the recommendations generated based on your profile and marked interest Continue reading
Long story short: I’m offering a few free seats in my Ansible for Networking Engineers online course to undergraduate or master’s students.
Interested? Check out the details, and apply before October 1st.
Too old? Please spread the word ;)