Juniper founder, CTO Sindhu cuts role to focus on startup

Founder and current CTO of Juniper Pradeep Sindhu says he will reduce his role at the company to focus on developing technology for a startup he co-founded in 2015 called Fungible.On his Juniper blog Sindhu wrote: I am equally passionate about the success of Juniper Networks, the company I founded in 1996. I believe that the technology I am working on at Fungible, in conjunction with Juniper's technologies, have the potential to revolutionize the industry. This is why Juniper has invested in Fungible. To read this article in full or to leave a comment, please click here

US House approves new privacy protections for email and the cloud

The U.S. House of Representatives approved on Monday the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months. The House approved the bill by voice vote, and it now goes the Senate for consideration.The Email Privacy Act would update a 31-year-old law called the Electronic Communications Privacy Act (ECPA). Some privacy advocates and tech companies have pushed Congress to update ECPA since 2011. Lax protections for stored data raise doubts about U.S. cloud services among consumers and enterprises, supporters of the bill say.To read this article in full or to leave a comment, please click here

US House approves new privacy protections for email and the cloud

The U.S. House of Representatives approved on Monday the Email Privacy Act, which would require law enforcement agencies to get court-ordered warrants to search email and other data stored with third parties for longer than six months. The House approved the bill by voice vote, and it now goes the Senate for consideration.The Email Privacy Act would update a 31-year-old law called the Electronic Communications Privacy Act (ECPA). Some privacy advocates and tech companies have pushed Congress to update ECPA since 2011. Lax protections for stored data raise doubts about U.S. cloud services among consumers and enterprises, supporters of the bill say.To read this article in full or to leave a comment, please click here

The key functions to consider when building or buying a log analysis platform

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. “Life is really simple, but we insist on making it complicated.”  The immortal words of Confucius resonate with anyone who has ever tried to glean useful information from log data. There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.To read this article in full or to leave a comment, please click here

The key functions to consider when building or buying a log analysis platform

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.“Life is really simple, but we insist on making it complicated.”  The immortal words of Confucius resonate with anyone who has ever tried to glean useful information from log data.There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.To read this article in full or to leave a comment, please click here

The key functions to consider when building or buying a log analysis platform

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

“Life is really simple, but we insist on making it complicated.”  The immortal words of Confucius resonate with anyone who has ever tried to glean useful information from log data.

There are consensus-driven definitions of what exactly log analysis is, but a simplified, accessible explanation might be: to organize log entries into a human-friendly display and make business decisions based on what you learn.

To read this article in full or to leave a comment, please click here

17% off MAXSA Innovations Park-Right Laser Garage Parking Device – Deal Alert

An innovative and unique device to help you park your cars, Park-Right automatically shines a laser on your car to guide you to the perfect parking spot every time. Simply drive into your garage and follow the laser. Once the laser is shining on the designated spot on your car, you are parked perfectly. The lasers are adjustable, allowing you to pick the ideal location on your car, so parking is consistent and accurate. Right now this parking gadget averages 4.5 out of 5 stars on Amazon from over 1,300 reviewers (read reviews). It's discounted 17% off its typical list price of $25, so you can save a few bucks and pick it up for $20.68. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Lenovo’s ThinkPad P71 will work with HTC, Oculus VR headsets

Lenovo's ThinkPad P71 is one superfast laptop that can work with HTC's Vive and the Oculus Rift VR headsets.It's technically a workstation and is targeted at professionals creating VR content, editing movies, or running engineering applications. Headsets are needed to create VR content.The laptop, which weighs 3.4 kilograms, has a 17-inch screen and is equipped with Intel's latest Xeon E3-v6 mobile chips, based on the Kaby Lake architecture. It can be configured with an Nvidia mobile Quadro GPU like the P5000M, which aid in the content creation and virtual reality experiences.The laptop will be available in April, starting at US$1,849. The laptop by default comes with an HD screen but can be configured with a 4K screen. It also supports a Thunderbolt 3 slot.To read this article in full or to leave a comment, please click here

DDoS Ransom: An Offer You Can Refuse

DDoS ransom

Cloudflare has covered DDoS ransom groups several times in the past. First, we reported on the copycat group claiming to be the Armada Collective and then not too long afterwards, we covered the "new" Lizard Squad. While in both cases the groups made threats that were ultimately empty, these types of security events can send teams scrambling to determine the correct response. Teams in this situation can choose from three types of responses: pay the ransom and enable these groups to continue their operations, not pay and hope for the best, or prepare an action plan to get protected.

Breaking the Ransom Cycle

We can’t stress enough that you should never pay the ransom. We fully understand that in the moment when your website is being attacked it might seem like a reasonable solution, but by paying the ransom, you only perpetuate the DDoS ransom group’s activities and entice other would be ransomers to start making similar threats. In fact, we have seen reports of victim organizations receiving multiple subsequent threats after they have paid the ransom. It would seem these groups are sharing lists of organizations that pay, and those organizations are more likely to be targeted again in Continue reading

Samsung scraps a Raspberry Pi 3 competitor, shrinks Artik line

Samsung has scrapped its Raspberry Pi 3 competitor called Artik 10 as it moves to smaller and more powerful boards to create gadgets, robots, drones, and IoT devices.A last remaining stock of the US$149 boards is still available through online retailers Digi-Key and Arrow.Samsung has stopped making Artik 10 and is asking users to buy its Artik 7 boards instead."New development for high-performance IoT products should be based on the Samsung Artik 710, as the Artik 1020 is no longer in production. Limited stocks of Artik 1020 modules and developer kits are still available for experimentation and small-scale projects," the company said on its Artik website.To read this article in full or to leave a comment, please click here

You’ll see right through this iPhone 8 concept design

Designers are really trying to outdo each other in early 2017, pumping out Apple iPhone 8 design concept videos at a rapid pace in advance of an expected iPhone 8 (or iPhone 10 or iPhone X?) release in the fall. The latest to grab attention -- with more than 61K views on Youtube as of this writing -- envisions a transparent smartphone screen.The design for the iPhone 7 follow-on comes courtesy of Georgy Pashkov via ConceptsiPhone. Featured design elements beyond the transparent screen (with optical sensor) include an ultrasonic fingerprint sensor and piezeoelectric speaker.As for the likelihood of a transparent screen on the actual iPhone 8? Highly unlikely, say Apple watchers. Though advances in Harry Potter-like invisibility cloaks are for real.To read this article in full or to leave a comment, please click here

You can now make smart gadgets and IoT devices that use Bluetooth 5

In a few months, Bluetooth 5 will finally arrive in smartphones and tablets. But you can already test the technology on developer boards being shipped by hardware makers.Bluetooth 5 is a major step ahead for the venerable technology, which was introduced in 1999 to hook up devices wirelessly. It is two times faster than predecessor Bluetooth 4.2, has four times longer range, and boasts cool new connectivity features.It can transfer data at speeds of up to 2Mbps (bits per second) and has a realistic range of 120 meters. The range could be even longer in a clear line of sight, the standards setting organization Bluetooth Special Interest Group said.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why managing trust is critical for digital transformation

Digital disruption has demolished more than 50% of the Fortune 500 since 2000 Technology is creating new online-only companies—i.e., Kickstarter for funding, Sofi for lending and Venmo for payments. The digital disruption and, more important, its pace continues to disrupt long-established business models. Incumbents, not wanting to become another cautionary tale of digital disruption, are making radical changes to their businesses to focus on online and mobile channels.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why managing trust is critical for digital transformation

Digital disruption has demolished more than 50% of the Fortune 500 since 2000 Technology is creating new online-only companies—i.e., Kickstarter for funding, Sofi for lending and Venmo for payments. The digital disruption and, more important, its pace continues to disrupt long-established business models. Incumbents, not wanting to become another cautionary tale of digital disruption, are making radical changes to their businesses to focus on online and mobile channels.To read this article in full or to leave a comment, please click here

Whitebox networking – coming soon to an edge near you?


What is whitebox networking and why is it important?

whitebox-switch_500px-wide

A brief history of the origins of whitebox

One of the many interesting conversations to come out of my recent trip to Network Field Day 14 (NFD14) hosted by Gestalt IT was a discussion on the future of whitebox. As someone who co-founded a firm that consults on whitebox and open networking, it was a topic that really captivated me and generated a flurry of ideas on the subject. This will be the first in a series of posts about my experiences and thoughts on NFD14.

Whitebox is a critical movement in the network industry that is reshaping the landscape of what equipment and software we use to build networks. At the dawn of the age of IT in the late 80s and early 90’s, we used computing hardware and software that was proprietary – a great example would be an IBM mainframe.

Then we evolved into the world of x86 and along came a number of operating systems that we could choose from to customize the delivery of applications and services. Hardware became a commodity and software became independent of the hardware manufacturer.

ONIE – The beginning of independent network Continue reading

Whitebox networking – coming soon to an edge near you?


What is whitebox networking and why is it important?

whitebox-switch_500px-wide

A brief history of the origins of whitebox

One of the many interesting conversations to come out of my recent trip to Network Field Day 14 (NFD14) hosted by Gestalt IT was a discussion on the future of whitebox. As someone who co-founded a firm that consults on whitebox and open networking, it was a topic that really captivated me and generated a flurry of ideas on the subject. This will be the first in a series of posts about my experiences and thoughts on NFD14.

Whitebox is a critical movement in the network industry that is reshaping the landscape of what equipment and software we use to build networks. At the dawn of the age of IT in the late 80s and early 90’s, we used computing hardware and software that was proprietary – a great example would be an IBM mainframe.

Then we evolved into the world of x86 and along came a number of operating systems that we could choose from to customize the delivery of applications and services. Hardware became a commodity and software became independent of the hardware manufacturer.

ONIE – The beginning of independent network Continue reading

Mitigating DDoS

Your first line of defense to any DDoS, at least on the network side, should be to disperse the traffic across as many resources as you can. Basic math implies that if you have fifteen entry points, and each entry point is capable of supporting 10g of traffic, then you should be able to simply absorb a 100g DDoS attack while still leaving 50g of overhead for real traffic (assuming perfect efficiency, of course—YMMV). Dispersing a DDoS in this way may impact performance—but taking bandwidth and resources down is almost always the wrong way to react to a DDoS attack.

But what if you cannot, for some reason, disperse the attack? Maybe you only have two edge connections, or if the size of the DDoS is larger than your total edge bandwidth combined? It is typically difficult to mitigate a DDoS attack, but there is an escalating chain of actions you can take that often prove useful. Let’s deal with local mitigation techniques first, and then consider some fancier methods.

  • TCP SYN filtering: A lot of DDoS attacks rely on exhausting TCP open resources. If all inbound TCP sessions can be terminated in a proxy (such as a load balancer), Continue reading