FPGAs, OpenHMC Push SKA HPC Processing Capabilities

Astronomy is the oldest research arena, but the technologies required to process the massive amount of data created from radio telescope arrays represents some of the most bleeding-edge research in modern computer science.

With an exabyte of data expected to stream off the Square Kilometer Array (SKA), teams from both the front and back ends of the project have major challenges ahead. One “small” part of that larger picture of seeing farther into the universe than ever before is moving the data from the various distributed telescopes into a single unified platform and data format. This means transferring data from

FPGAs, OpenHMC Push SKA HPC Processing Capabilities was written by Nicole Hemsoth at The Next Platform.

New Podcast for the Podcatcher – The Network Collective

I am giving a great big shout out to a new community podcast. The Network Collective is only five session in, AND it is a great podcast. I’m looking forward to catching many future episodes.

Episode 1 – Top 10 Ways To Break Your Network

Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may does not reflect the position of past, present or future employers.

The post New Podcast for the Podcatcher – The Network Collective appeared first on PacketU.

ISOC’s Policy Statement at the WSIS Forum: Support Your Local Heroes

On 13 June 2017, Internet Society Vice President, Global Engagement, Raúl Echeberría, and Senior Director, Global Internet Policy, Constance Bommelaer de Leusse, participated in the Opening Ceremony and the High-Level Policy Session on Bridging Digital Divides at the World Summit on the Information Society Forum (WSIS) 2017. Here are their reflections.

Constance Bommelaer de Leusse
Mr. Raúl Echeberría

Q&A: Fast Application Deployment with Ansible and F5 BIG-IP

Ansible-and-F5-Blog-Header.png

The following post contains answers to questions asked during our webinar about Fast Application Deployment with Ansible and F5 Big-IP.

Q: How can we define BIG-IP in one sentence? What is its significance in DevOps?

F5 BIG-IP is an API-enabled application delivery platform supporting a full seven layers of traffic and security services. It's not a tool that will make DevOps easier per-se, but the BIG-IP has (historically) been difficult to administer in an automated way. These Ansible modules are intended to make it less difficult so that you can drive your BIG-IP devices via code (Ansible) instead of by having to manually configure it via the Web UI.

Q: Is there documentation that details all the F5 modules being presented in the webinar?

The documentation is in two places:

  1. The official list of F5 modules can be found in Ansible docs.
  2. The upstream/community developer docs are on the F5 readthedocs page or you can find many technical resources at F5 devcentral. The latest virtual appliance that you will find are the 13.x branch of BIG-IP module. 

There will be documentation on these modules once the modules are released with Ansible version 2.4. For sample Playbooks on Continue reading

On the ‘web: All you ever wanted to know about EIGRP

In episode 5 the Network Collective panel dives deep into the inner-workings of EIGRP and how to tune the protocol to work best for you. This isn’t your run of the mill EIGRP training session though, so buckle up and dig in to learn a lot about a protocol which appears pretty straight forward on the surface.

This last week I was on the Network Collective discussing EIGRP with Nick Russo; even if you think this protocol is dead, it’s well worth watching or listening to. And if this isn’t enough EIGRP for you, the EIGRP book on Addision-Wesley is another good resource.

eigrp-for-ip

The post On the ‘web: All you ever wanted to know about EIGRP appeared first on rule 11 reader.

Hackers Marketing ‘Most Sophisticated’ Mac Malware Ever

Hackers with their targets set on devices running Apple’s MacOS are selling access to new, sophisticated attacks that can infect machines and hold them for ransom. The attacks, which include a malware-as-a-service (MaaS) known as MacSpy and a ransomware-as-a-service called MacRansom — both of which attackers can purchase to use to direct at a target— …

Knights Landing System Development Targets Dark Matter Study

Despite the best efforts of leading cosmologists, the nature of dark energy and dark matter – which comprise approximately 95% of the total mass-energy content of the universe – is still a mystery.

Dark matter remains undetected even with all the different methods that have been employed so far to directly find it.  The origin of dark energy is one of the greatest puzzles in physics. Cosmologist Katrin Heitmann, PI of an Aurora Early Science Program effort at the Argonne Leadership Computing Facility (ALCF) and her team are conducting research to shed some light on the dark universe.

“The reach

Knights Landing System Development Targets Dark Matter Study was written by Nicole Hemsoth at The Next Platform.

Crash Override: Malware that took down a power grid may have been a test run

Two security firms have released reports about the malware which was used in the December 2016 Ukraine power outage, warning that the partial power outage in Kiev may have been test run; the malware could be leveraged against other countries, including the US.The malware, dubbed Crash Override in the Dragos report (pdf) and Industroyer in the ESET report (pdf), has nothing to do with espionage and everything to do with cyber-sabotage.Crash Override, Dragos says, “is the first ever malware framework designed and deployed to attack electric grids.” It could be “leveraged at multiple sites simultaneously.” Dragos founder Robert M. Lee told Reuters, “The malware is capable of causing outages of up to a few days in portions of a nation's grid, but is not potent enough to bring down a country's entire grid.”To read this article in full or to leave a comment, please click here

Crash Override: Malware that took down a power grid may have been a test run

Two security firms have released reports about the malware which was used in the December 2016 Ukraine power outage, warning that the partial power outage in Kiev may have been test run; the malware could be leveraged against other countries, including the US.The malware, dubbed Crash Override in the Dragos report (pdf) and Industroyer in the ESET report (pdf), has nothing to do with espionage and everything to do with cyber-sabotage.Crash Override, Dragos says, “is the first ever malware framework designed and deployed to attack electric grids.” It could be “leveraged at multiple sites simultaneously.” Dragos founder Robert M. Lee told Reuters, “The malware is capable of causing outages of up to a few days in portions of a nation's grid, but is not potent enough to bring down a country's entire grid.”To read this article in full or to leave a comment, please click here