RSA Innovation Sandbox winners: One year later

With the annual RSA security conference just around the corner, we decided to touch base with the 10 companies selected as finalists in last year’s Innovation Sandbox competition and see how they’re making out.The RSA Conference had 88 submissions for Innovation Sandbox slots last year and the field was whittled down to Bastille Networks, Illusive Networks, Menlo Security, Phantom Cyber, Prevoty, ProtectWise, SafeBreach, Skyport, Vera and Versa Networks. In last year’s competition, each vendor pitched their product to a panel of judges, as well as a packed house of attendees at the Moscone Center in San Francisco. Phantom Networks was selected as the overall winner.To read this article in full or to leave a comment, please click here(Insider Story)

Google ordered by US court to produce emails stored abroad

Google has been ordered by a federal court in Pennsylvania to comply with search warrants and produce customer emails stored abroad, in a decision that is in sharp contrast to that of an appeals court in a similar case involving Microsoft.Magistrate Judge Thomas J. Rueter of the U.S. District Court for the Eastern District of Pennsylvania ruled Friday that the two warrants under the Stored Communications Act (SCA) for emails required by the government in two criminal investigations constituted neither a seizure nor a search of the targets' data in a foreign country.Transferring data electronically from a server in a foreign country to Google's data center in California does not amount to a seizure because “there is no meaningful interference with the account holder's possessory interest in the user data,” and Google’s algorithm in any case regularly transfers user data from one data center to another without the customer's knowledge, Judge Rueter wrote.To read this article in full or to leave a comment, please click here

Google ordered by US court to produce emails stored abroad

Google has been ordered by a federal court in Pennsylvania to comply with search warrants and produce customer emails stored abroad, in a decision that is in sharp contrast to that of an appeals court in a similar case involving Microsoft.Magistrate Judge Thomas J. Rueter of the U.S. District Court for the Eastern District of Pennsylvania ruled Friday that the two warrants under the Stored Communications Act (SCA) for emails required by the government in two criminal investigations constituted neither a seizure nor a search of the targets' data in a foreign country.Transferring data electronically from a server in a foreign country to Google's data center in California does not amount to a seizure because “there is no meaningful interference with the account holder's possessory interest in the user data,” and Google’s algorithm in any case regularly transfers user data from one data center to another without the customer's knowledge, Judge Rueter wrote.To read this article in full or to leave a comment, please click here

New products of the week 2.6.17

New products of the weekImage by FortinetOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Red Armor NSE7000Image by corsaTo read this article in full or to leave a comment, please click here

New products of the week 2.6.17

New products of the weekImage by FortinetOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Red Armor NSE7000Image by corsaTo read this article in full or to leave a comment, please click here

S. Korea plans to tighten battery regulations post Note7 crisis

In the wake of the Note7 debacle, South Korea is introducing new tests and regulations to ensure battery and smartphone safety, the Ministry of Trade, Industry and Energy said.The new measures will include requiring manufacturers to certify the safety of lithium-ion batteries based on new technologies in the process of production.The announcement Monday by MOTIE also agrees with the analysis by Samsung Electronics and some experts on the cause of the overheating and even explosions of some Galaxy Note7 smartphones.Samsung, backed by experts from Exponent, TUV Rheinland and UL, said in January that the overheating of some Note7 phones was likely caused by the faulty design and manufacturing of batteries by two suppliers, rather than by the design of the smartphone itself.To read this article in full or to leave a comment, please click here

Lenovo’s Yoga A12 Android 2-in-1 has futuristic touch panel keyboard

Lenovo is ditching the hard keyboard for a cool new touch one on its new Yoga A12 2-in-1, which can be an Android tablet or a laptop. But for those seeking the latest and greatest hardware, there's a disappointment. It runs on an old chip from Intel, which has rolled back its development of Android, raising questions on the frequency of OS updates. The highlight of Yoga A12 is the versatile touch panel that can be a smartphone-like virtual keyboard. It's a feature adapted from the Yoga Book, which was introduced last year. The Yoga A12 has a 12.2-inch touchscreen, and a back-lit input touch panel replaces the hard keyboard. Lenovo said the virtual keyboard provides a user experience similar to on-screen ones on smartphones and tablets.To read this article in full or to leave a comment, please click here

Non-Interactive SSH use case with Python

Sometimes the best way to learn to do something useful with a scripting language is with a starting point and a real world use case. While I don’t consider myself a Python expert, I can usually figure out how to put things together and get a task accomplished. For this article I challenged myself to create a simple script that performs the following:

  • Open a file for a list of devices and credentials
  • Log in to each device in the file using the credentials found
  • Remove the current NTP server (1.1.1.1)
  • Add a new NTP server (2.2.2.2)
  • Save the configuration

I am sharing the script below as an example. Note this Python file uses paramiko. Therefore that library needs to be installed (MAC users – sudo pip install paramiko)

NTPChange.py

import paramiko

####devices.txt format
#### username,password,host
#### username,password,host

qbfile = open("devices.txt", "r")

for aline in qbfile:
    values = aline.split(",")
    myuser = values[0]
    mypass = values[1]
    myhost = values[2].rstrip()
    ssh = paramiko.SSHClient()
    ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
    ssh.connect(myhost, username=myuser, password=mypass)
    channel = ssh.invoke_shell()
    stdin = channel.makefile('wb')
    stdout = channel.makefile('rb')
    stdin.write('''
    conf t
    no ntp server  Continue reading

Fighting CLI cowboys with Napalm – An Introduction

A lot of people who aren’t familiar with Napalm tend to laugh nervously when you suggest they use it in their network. The name Napalm is partly based on getting that perfect acronym and partly a desire to incinerate the old way of doing things and move to network automation. This article is about explaining what Napalm is and what lies behind the acronym.

Continue reading

Spousetivities at DockerCon 2017

DockerCon 2017 is coming up in mid-April in Austin, TX, and Spousetivities will once again be offering activities for folks traveling to Austin with conference attendees. This is Spousetivities’ second time at DockerCon, and Crystal has a great lineup of activities planned.

Here’s a quick preview of the activities organized for DockerCon:

  • Trip to Magnolia Market (from HGTV’s “Fixer Upper”)
  • Tour of LBJ State Park
  • Visit to Fredricksburg
  • Sightseeing through the Hill Country around Austin
  • Lunch at the Salt Lick BBQ

Austin in the spring should be a great place to visit, and Crystal has some really enjoyable activities planned—it’s a great reason to bring your spouse, girlfriend/boyfriend, significant other, or family member with you to Austin when you come for DockerCon. Of course, the chance to win some great prizes is nice too…

Crystal’s blog post on the Spousetivities site has a few more details, and registration is open right now.

Nvidia’s new Quadro GP100 GPU brings NVLink to Windows computers

Nvidia's Quadro GP100 shares many features with the company's most advanced Tesla P100 GPU, but it also brings the superfast NVLink to Windows PCs and workstations.The Quadro GP100 isn't targeted at gaming -- it's aimed more at virtual reality content creation, simulation, and engineering applications. The GPU is based on the Pascal architecture and is capable of supporting up to 5K displays at 60Hz.The new GPU is the fastest Quadro yet, with 32-bit floating point performance of about 12 teraflops via 3,584 CUDA cores. That outpaces the Quadro P6000, which delivers 10 teraflops of performance.The GP100 also delivers 64-bit floating point performance of 5 teraflops via 1,792 cores for more precise calculations.To read this article in full or to leave a comment, please click here

How to watch the Super Bowl from your iPhone and iPad

Later this afternoon, the New England Patriots will face off against the Atlanta Falcons in Super Bowl 51. Per usual, the eyes of the world be fixated on what is typically the most watched Television event of the year. What's more, the Super Bowl has historically been where we can check out some of the more creative and jaw-dropping commercial spots. As a quick point of interest, the average cost of a Super Bowl ad this year checks in at a whopping $5 million.If you happen to be travelling or will be on the go for Super Bowl Sunday, that's no reason for you to miss the big game. Indeed, you can actually watch all of the Football action straight from your iPhone or iPad.To read this article in full or to leave a comment, please click here

36 – VXLAN EVPN Multi-Fabrics – Path Optimisation (part 5)

Ingress/Egress Traffic Path Optimization

In the VXLAN Multi-fabric design discussed in this post, each data center normally represents a separate BGP autonomous system (AS) and is assigned a unique BGP autonomous system number (ASN).

Three types of BGP peering are usually established as part of the VXLAN Multi-fabric solution:

  • MP internal BGP (MP-iBGP) EVPN peering sessions are established in each VXLAN EVPN fabric between all the deployed leaf nodes. As previously discussed, EVPN is the intrafabric control plane used to exchange reachability information for all the endpoints connected to the fabric and for external destinations.
  • Layer 3 peering sessions are established between the border nodes of separate fabrics to exchange IP reachability information (host routes) for the endpoints connected to the different VXLAN fabrics and the IP subnets that are not stretched (east-west communication). Often, a dedicated Layer 3 DCI network connection is used for this purpose. In a multitenant VXLAN fabric deployment, a separate Layer 3 logical connection is required for each VRF instance defined in the fabric (VRF-Lite model). Although either eBGP or IGP routing protocols can be used to establish interfabric Layer 3 connectivity, the eBGP scenario is the most common and is the one discussed in Continue reading

36 – VXLAN EVPN Multi-Fabrics – Host Mobility (part 4)

Host Mobility across Fabrics

This section discusses support for host mobility when a distributed Layer 3 Anycast gateway is configured across multiple VXLAN EVPN fabrics.

In this scenario, VM1 belonging to VLAN 100 (subnet_100) is hosted by H2 in fabric 1, and VM2 on VLAN 200 (subnet_200) initially is hosted by H3 in the same fabric 1. Destination IP subnet_100 and subnet_200 are locally configured on leaf nodes L12 and L13 as well as on L14 and L15.

This example assumes that the virtual machines (endpoints) have been previously discovered, and that Layer 2 and 3 reachability information has been announced across both sites as discussed in the previous sections.

Figure 1 highlights the content of the forwarding tables on different leaf nodes in both fabrics before virtual machine VM2 is migrated to fabric 2.

Figure 18: Content of Forwarding Tables before Host Mobility

Figure 1 : Content of Forwarding Tables before Host Mobility

The following steps show the process for maintaining communication between the virtual machines in a host mobility scenario, as depicted in Figure 2

Figure 19: VXLAN EVPN Multi-Fabric and Host Mobility

Figure 2 : VXLAN EVPN Multi-Fabric and Host Mobility

  1. For operational purposes, virtual machine VM2 moves to host H4 located in fabric 2 and connected to leaf nodes L21 and L22.
  2. After Continue reading