Moby Summit June 2017 Recap

On June 19 2017, 90 members of the Moby community gathered at Docker headquarter in San Francisco for the second Moby Summit.  This was an opportunity for the community to discuss the progress and future of the Moby project, two months after it was announced.

We started the day with an introduction by Solomon Hykes, and a look at the website redesign: the Moby project website now has a blog, an event calendar, a list of projects, and a community page with links to various community resources. The website code is open source, issues and PRs to make it better are welcome.

Then each team gave an update on their progress: Linuxkit, containerd, InfraKit, SwarmKit and LibNetwork, as well as the three new Moby Special Interest Groups, Linuxkit Security, Security Scanning & Notary and Orchestration Security. All these talks have been recorded and you can find the videos and slides below.

In the afternoon, we split into 5 Birds Of Feathers (BOF) sessions: runc/containerd, LinuxKit, InfraKit, Security, and Security Scanning. You can find links to the BOF Notes at the end of this post.

We ended the day with a recap of the BOF sessions, and Continue reading

U.S. Military Sees Future in Neuromorphic Computing

The novel architectures story is still shaping out for 2017 when it comes machine learning, hyperscale, supercomputing and other areas.

From custom ASICs at Google, new uses for quantum machines, FPGAs finding new routes into wider application sets, advanced GPUs primed for deep learning, hybrid combinations of all of the above, it is clear there is serious exploration of non-CMOS devices. When the Department of Energy in the U.S. announced its mission to explore novel architectures, one of the clear candidates for investment appeared to be neuromorphic chips—efficient pattern matching devices that are in development at Stanford (NeuroGrid), The

U.S. Military Sees Future in Neuromorphic Computing was written by Nicole Hemsoth at The Next Platform.

Time to consider a move to IPv6

Organizations should consider migrating their network infrastructure and devices over to IPv6. It may be a challenge to persuade leadership to prioritize it over other projects such as cloud computing or big data migrations, but it is essential to start planning for a migration.Many service providers, such as Comcast, Verizon and AT&T, have already started using IPv6 addresses and are presently encouraging other organizations across the United States to do the same. The Internet Engineering Task Force (IETF) has encouraged organizations to move forward with these migrations for over a decade, and with more devices connecting to the internet, the need has increased. To read this article in full or to leave a comment, please click here

Time to consider a move to IPv6

Organizations should consider migrating their network infrastructure and devices over to IPv6. It may be a challenge to persuade leadership to prioritize it over other projects such as cloud computing or big data migrations, but it is essential to start planning for a migration.Many service providers, such as Comcast, Verizon and AT&T, have already started using IPv6 addresses and are presently encouraging other organizations across the United States to do the same. The Internet Engineering Task Force (IETF) has encouraged organizations to move forward with these migrations for over a decade, and with more devices connecting to the internet, the need has increased. To read this article in full or to leave a comment, please click here

Machine Learning and the Language of the Brain

For years, researchers have been trying to figure out how the human brain organizes language – what happens in the brain when a person is presented with a word or an image. The work has academic rewards of its own, given the ongoing push by researchers to better understand the myriad ways in which the human brain works.

At the same time, ongoing studies can help doctors and scientists learn how to better treat people with aphasia or other brain disorders caused by strokes, tumors or trauma that impair a person’s ability to communicate – to speak, read, write and

Machine Learning and the Language of the Brain was written by Nicole Hemsoth at The Next Platform.

Ohio government websites defaced by pro-ISIS hackers

Hackers proclaiming to be pro-ISIS defaced 10 Ohio government websites on Sunday as well as the government websites for Howard County, Maryland, and Brookhaven, Long Island.“Hacked by Team System DZ,” the defacements read. “Anti: Govt all word.”The pro-ISIS message continued: You will be held accountable Trump, you and all your people for every drop of blood flowing in Muslim countries. I Love Islamic state. Ohio Department of Rehabilitation and Corrections via Ohio Treasurer Josh Mandel A screenshot of the defaced Ohio Department of Rehabilitation and Corrections website was posted on Facebook and Twitter by Ohio Treasurer Josh Mandel. He added, “OH Dept of Corrections website right now, this is what you see. Wake up freedom-loving Americans. Radical Islam infiltrating the heartland.”To read this article in full or to leave a comment, please click here

Ohio government websites defaced by pro-ISIS hackers

Hackers proclaiming to be pro-ISIS defaced 10 Ohio government websites on Sunday as well as the government websites for Howard County, Maryland, and Brookhaven, Long Island.“Hacked by Team System DZ,” the defacements read. “Anti: Govt all word.”The pro-ISIS message continued: You will be held accountable Trump, you and all your people for every drop of blood flowing in Muslim countries. I Love Islamic state. Ohio Department of Rehabilitation and Corrections via Ohio Treasurer Josh Mandel A screenshot of the defaced Ohio Department of Rehabilitation and Corrections website was posted on Facebook and Twitter by Ohio Treasurer Josh Mandel. He added, “OH Dept of Corrections website right now, this is what you see. Wake up freedom-loving Americans. Radical Islam infiltrating the heartland.”To read this article in full or to leave a comment, please click here

Tools that increase IT efficiency pave the way for digital transformations

Inflexible IT architectures can be a barrier to organizational change. As companies embark on digital transformations aimed at improving their business, the pressure is on IT to reduce complexity and increase the efficiency of enterprise systems and applications. Fave Raves is an annual feature from Network World that invites IT pros to share hands-on assessments of products they love. Several tools that enable organizations to simplify their infrastructure and automate key tasks ranked among the favorites in 2017 and recent years. Here’s what IT pros had to say, in their own words. For more enterprise favorites, check out the full Fave Raves collection.To read this article in full or to leave a comment, please click here

Tools that increase IT efficiency pave the way for digital transformations

Inflexible IT architectures can be a barrier to organizational change. As companies embark on digital transformations aimed at improving their business, the pressure is on IT to reduce complexity and increase the efficiency of enterprise systems and applications. Fave Raves is an annual feature from Network World that invites IT pros to share hands-on assessments of products they love. Several tools that enable organizations to simplify their infrastructure and automate key tasks ranked among the favorites in 2017 and recent years. Here’s what IT pros had to say, in their own words. For more enterprise favorites, check out the full Fave Raves collection.To read this article in full or to leave a comment, please click here

Cisco and Juniper Routers : OSPF point to multipoint configurations

Today I am going to discuss on the OSPF configuration part, As you already know about the OSPF protocol and the network types in OSPF.

OSPF is a link state routing protocol and i wrote some of the articles on OSPF earlier as well. Please go through that articles to understand more about OSPF protocol

OSPF Basics
OSPF States
OSPF vs RIP protocols
Routing Basics : Distance Vector vs Link State Routing Protocol

Above are some of the articles on OSPF will help you more in the interview preparation.

OSPF Point to Multipoint Networks
In the point-to-multipoint configurations, we need to emulate broadcast capability, it seeks to organise the PVCs into a collection of point-to-point networks. In the case of OSPF point to multipoint networks, the hello packets must still be replicated and transmitted individually to each neighbor, but the multipoint approach offers two distinct advantages: no DR/BDR is needed, and the emulated point-to-point links can occupy a common subnet.

Apart from all these today I am going to have sample configurations on OSPF point to multipoint networks.

Here in this article I am going to take a topology of OSPF point to multipoint network and let you know the Continue reading

Even weak hackers can pull off a password reset MitM attack via account registration

At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” (pdf). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures.They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram.To read this article in full or to leave a comment, please click here

Even weak hackers can pull off a password reset MitM attack via account registration

At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” (pdf). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures.They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram.To read this article in full or to leave a comment, please click here

“Focusing on the Gift” (aka How Fish views Presenting)

CiscoLive starts today and so do my presentations.  If you have ever wondered what I’m thinking about right prior to a presentation…. I am imagining a small and beautifully wrapped gift that I want to give to each and every person in the audience. That is what I am doing.  I am “Focusing on the Gift”.

Have I always done that?  LOL.  Uh… no.  But fortunately I don’t think my 2006 Networkers presentation on EIGRP is available on video.   Otherwise I think I’d be truly embarrassed.  Why?  Because it was my first Networkers/CiscoLive presentation and I was beyond belief nervous.  Worried if I’d do okay… worried if you were enjoying the session… oh the list goes on and on as to everything I was thinking and worried about.

And then I realized something.  You know what? It really isn’t about me at all.  I am just a vehicle.  It is all about “The Gift”.  So in 2007 I went out and bought a tiny little Christmas tree sized ornament of a perfectly wrapped gift box.  Small enough that I could hide it up on the stage Continue reading