Cybersecurity Pros to Trump: Critical Infrastructure Is Very Vulnerable to a Cyber-Attack

Last week, President-elect Donald Trump received a comprehensive briefing on Russian hacking related to the 2016 Presidential election.  In response, Trump released a statement that included the following:"Whether it is our government, organizations, associations or business we need to aggressively combat and stop cyberattacks. I will appoint a team to give me a plan within 90 days of taking office.” These “teams” tend to be made up of a combination of Washington insiders with intelligence and/or military experience as well as an assortment of industry folks.  For example, President Obama’s recent Commission on Enhancing National Cybersecurity, included former NSA director Keith Alexander, former IBM CEO Sam Palmisano, etc.To read this article in full or to leave a comment, please click here

HPE Powers Up The Machine Architecture

Hewlett Packard Enterprise is not just a manufacturer that takes components from Intel and assembles them into systems. The company also has a heritage of innovating, and it was showing off its new datacenter architecture research and development testbed, dubbed The Machine, as 2016 came to a close.

While The Machine had originally attracted considerable attention as a vehicle for HPE to commercialize memristors, it is a much broader architectural testbed. This first generation of hardware can use any standard DDR4 DIMM-based memories, volatile or non-volatile. And while large, non-volatile memory pools are interesting research targets, HPE realizes that it

HPE Powers Up The Machine Architecture was written by Timothy Prickett Morgan at The Next Platform.

When we weren’t looking, smartwatches became niche items

It became pretty clear when the Apple Watch Series 2 focused on athletes and exercise. If even Apple knew it couldn’t make a smartwatch that appealed to everyone, what hope did all the other market contenders have? And at this year's CES, you could see this trend playing out from tech outfits to traditional watch brands to athletic wear and shoe manufacturers.When the Apple Watch 2 came out in September of 2016, it struck a fine balance in terms of new features and continuity—at least in terms of the product itself. But Apple’s positioning of the device changed dramatically. Instead of trying to be the perfect device for everyone to wear on their wrists all the time, it was now focused primarily on workouts and activity tracking. To read this article in full or to leave a comment, please click here

How Network World covered the original iPhone announcement from Jan. 9, 2007

While Network World writes a lot more about Apple these days than we did 10 years ago, we didn't skip over the original iPhone announcement on Jan. 9, 2007.Here's a look back at how we covered the story, and you can check out the recorded Facebook Live video below, which features a couple of physical Network World magazine issues from early 2007 (we converted to an online-only publication in mid-2013).MORE iPHONE 10TH ANNIVERSARY COVERAGE: Whirlwind look back at every iPhone model | iPhone prototypes that never saw the light of day | 10 iPhone features that rocked the smartphone world | A look back at prognostications that the iPhone would be a flopTo read this article in full or to leave a comment, please click here

One Weird Trick to really be Smarter

For some reason, I seem to be a bit of a question magnet. Not that I mind, of course, because… Well, you’ll discover why in just a moment. I was reminded of this, this week, when someone asked me—”how do you know so much about so many different things?” Before I answered them, Steve Hood published his first post on his journey to the CCNA. Buried in this post is something very important in relation to the question in hand—

Further, over the last six months I have worked, for the first time, in environments in which I am not the sole networking professional. Simply being able to say “hey, what do you think of doing ____?” has been awesome. Before joining a networking team I could only see my own perspective and the things I thought to google. Now I have the advantage of a reply from someone with more or different experience.

This completely exposes one of my primary pathways to knowing a lot of stuff about a lot of stuff. If you don’t see it yet, here it is in plain language, one weird trick that will really make you smarter.

Make certain you are Continue reading

Nokia returns to smartphones at long last, but you can’t buy it (and probably don’t want to)

In December, Finland-based HMD Global announced to some fanfare that its first Nokia-branded Android handsets would be landing in early 2017. Less than 10 days into the new year, the first model has already arrived, but those in the U.S. looking to get their hands on the first Nokia phone in years will have to wait a little longer.If the Nokia 6, as HMD is calling it, is any indication of what’s to come from its licensing deal, there isn’t too much to get excited about. Squarely aimed at the budget market, the phone features a 5.5-inch LCD screen, 4GB of RAM, a 16MP camera, 64GB of storage, and a 3,000 mAh battery. Under the screen is a Snapdragon 430 processor, and while the phone does run Nougat, it remains to be seen what kind of skin HMD has applied to it. It will sell for around $250 in an exclusive deal with China’s Jingdong Mall online shop. The My Nokia Blog also also uncovered a commercial for the phone.To read this article in full or to leave a comment, please click here

Russia: US fueling ‘witch hunt’ with election hacking claims

Russia dismissed an intel report claiming that the Kremlin meddled with the U.S. presidential election, saying the accusations were "amateurishly emotional" and driving a "witch-hunt.""There was nothing in this report that deserved to be read in detail," said Kremlin spokesman Dmitry Peskov on Monday, according to the Russian news agency TASS.The U.S. intel report, published on Friday, accused Russian President Vladimir Putin of personally ordering a secret campaign meant to influence last year's presidential election.To read this article in full or to leave a comment, please click here

Russia: US fueling ‘witch hunt’ with election hacking claims

Russia dismissed an intel report claiming that the Kremlin meddled with the U.S. presidential election, saying the accusations were "amateurishly emotional" and driving a "witch-hunt.""There was nothing in this report that deserved to be read in detail," said Kremlin spokesman Dmitry Peskov on Monday, according to the Russian news agency TASS.The U.S. intel report, published on Friday, accused Russian President Vladimir Putin of personally ordering a secret campaign meant to influence last year's presidential election.To read this article in full or to leave a comment, please click here

The Road Ahead for Deep Learning in Healthcare

While there are some sectors of the tech-driven economy that thrive on rapid adoption on new innovations, other areas become rooted in traditional approaches due to regulatory and other constraints. Despite great advances toward precision medicine goals, the healthcare industry, like other important segments of the economy, is tied by several specific bounds that make it slower to adapt to potentially higher performing tools and techniques.

Although deep learning is nothing new, its application set is expanding. There is promise for the more mature variants of traditional deep learning (convolutional and recurrent neural networks are the prime example) to morph

The Road Ahead for Deep Learning in Healthcare was written by Nicole Hemsoth at The Next Platform.

Turks point to U.S. as source of cyberattacks, but don’t level blame

Figuring out who’s behind cyberattacks is always difficult, and responsible security analysts are reluctant to point fingers without a smoking gun, which seems to be the case with recent disruptions of the power system in Turkey.News sources here and here say the Turkish Energy Ministry blames storms and sabotage of underground power lines for outages around the country. It also says coordinated cyberattacks originating in the United States have been thwarted but also been keeping security teams busy. It doesn’t like the outages directly to the cyberattacks, the sources say.To read this article in full or to leave a comment, please click here

Turks point to U.S. as source of cyberattacks, but don’t level blame

Figuring out who’s behind cyberattacks is always difficult, and responsible security analysts are reluctant to point fingers without a smoking gun, which seems to be the case with recent disruptions of the power system in Turkey.News sources here and here say the Turkish Energy Ministry blames storms and sabotage of underground power lines for outages around the country. It also says coordinated cyberattacks originating in the United States have been thwarted but also been keeping security teams busy. It doesn’t like the outages directly to the cyberattacks, the sources say.To read this article in full or to leave a comment, please click here

I discussed some IP Mobility solutions including LISP

Couple days ago I discussed some IP Mobility solutions, including LISP (Locator Identity Separation Protocol) with the CCDE students. Basically all IP Mobility solutions work in a similar way. New location of the host Address needs to be learned either via routing system or authoritative server. Host information is called identity and it can be MAC […]

The post I discussed some IP Mobility solutions including LISP appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Container Namespaces – Deep dive into container networking



Of late, there have been various Open source projects to manage networking for containers. Docker implemented "libnetwork". I've written in the past about using Calico with Docker containers. Debugging and low level tweaks to performance isn't easy without an in-depth understanding of how the network stack works for a container. This post tries to explain network namespaces and its role in container networking using default networking that comes out-of-box with docker.

As you probably already know containers use namespaces to isolate resources and rate limit their use. Linux's network namespaces are used to glue container processes and the host networking stack. Docker spawns a container in the containers own network namespace (use the CLONE_NEWNET flag defined in sched.h when calling the clone system call to create a new network namespace for the subprocess) and later on runs a veth pair (a cable with two ends) between the container namespace and the host network stack. If you are new to network namespaces this blog post by Scott gives a quick overview and serves as a good 101 refresher if you are already familiar with these concepts but haven't used them for a while.

Now lets see how to Continue reading