LSA issue @ February 2, 2017 at 10:28PM

It is remarkable how quickly technology giants like Facebook, Google, Amazon and others became newsmakers No1 in the networking area. Seriously, for 5 breaking news from these guys its only 1 serious announcement from vendor-camp. Keeping the ratio in favor of tech giants meet the roundup of the recent Facebook' even called Disaggregate: Networking. [1]

Q&A: 15 Questions AWS Users Ask About DDC For AWS

Docker is deployed across all major cloud service providers, including AWS. So when we announced Docker Datacenter for AWS (which makes it even easier to deploy DDC on AWS) and showed live demos of the solution at AWS re:Invent 2016 it was no surprise that we received a ton of interest about the solution. Docker Datacenter for AWS, as you can guess from its name, is now the easiest way to install and stand up the Docker Datacenter (DDC)  stack on an AWS EC2 cluster. If you are an AWS user and you are looking for an enterprise container management platform, then this blog will help answer questions you have about using DDC on AWS.

In last week’s webinar,  Harish Jayakumar,  Solutions Engineer at Docker, provided a solution overview and demo to showcase how the tool works, and some of the cool features within it. You can watch the recording of the webinar below:

We also hosted a live Q&A session at the end where we opened up the floor to the audience and did our best to get through as many questions as we could. Below, are fifteen of the questions that we received from the audience. We selected Continue reading

Chip Makers and the China Challenge

China represents a big and growing market opportunity for IT vendors around the world. It’s huge population and market upside compared with the more mature regions across the globe is hugely attractive to system and component makers, and the Chinese government’s willingness to spend money to help build up the country’s compute capabilities only adds to the allure. In addition, it is home to such hyperscale players as Baidu, Alibaba and Tencent, which like US counterparts Google, Facebook and eBay are building out massive datacenters that are housing tens of thousands of servers.

However, those same Chinese government officials aren’t

Chip Makers and the China Challenge was written by Nicole Hemsoth at The Next Platform.

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also "automatically activate and configure subscribers and deliver advanced services via service packages" over mobile, fiber, cable, and other ISP networks."A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges," Cisco said in its advisory.To read this article in full or to leave a comment, please click here

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also "automatically activate and configure subscribers and deliver advanced services via service packages" over mobile, fiber, cable, and other ISP networks."A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges," Cisco said in its advisory.To read this article in full or to leave a comment, please click here

Cisco patches critical flaw in Prime Home device management server

Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also "automatically activate and configure subscribers and deliver advanced services via service packages" over mobile, fiber, cable, and other ISP networks."A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges," Cisco said in its advisory.To read this article in full or to leave a comment, please click here

Cisco: Faulty clock part could cause failure in some Nexus switches, ISR routers, ASA security appliances

Cisco this week issued a notice that faulty clock timing chips in some of its switches, routers and security appliances could fail after about 18 months of service – causing those devices to crash and not recover. The notice includes some of the company’s most widely deployed products, from certain models of its Series 4000 Integrated Services Routers, Nexus 9000 Series switches, ASA security devices to Meraki Cloud Managed Switches. Clock components are critical to the synchronization of multiple levels of a given device. +More on Network World: Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option+To read this article in full or to leave a comment, please click here

Cisco: Faulty clock part could cause failure in some Nexus switches, ISR routers, ASA security appliances

Cisco this week issued a notice that faulty clock timing chips in some of its switches, routers and security appliances could fail after about 18 months of service – causing those devices to crash and not recover.The notice includes some of the company’s most widely deployed products, from certain models of its Series 4000 Integrated Services Routers, Nexus 9000 Series switches, ASA security devices to Meraki Cloud Managed Switches. Clock components are critical to the synchronization of multiple levels of a given device.+More on Network World: Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option+To read this article in full or to leave a comment, please click here

More DockerCon Speakers Announced

Today, we are announcing the next group of awesome DockerCon speakers and we can’t wait for the lessons, stories, tips, tricks and insights they will share.

  • Need tips on how to create effective images, even when you have to include a bunch of image processing libraries?
  • What about learning how other organizations are taking Docker into production and adopting DevOps?
  • Want to deep dive into the Docker internals from Docker’s technical staff?

Join us at the largest container conference in the world to hear these stories and many more DockerCon speakers from the community. 

Docker Security Deep Dive

Journey to Docker Production: Evolving Your Infrastructure and Processes

Creating Effective Docker Images

Plug-ins: Building, Shipping, Storing and Running

Docker for Ops

Docker Networking

 

 

 

 

 

 

 

Modern Storage Platform for Containerized Environments

Do you really want to attend sessions from these DockerCon speakers, but are having a hard time convincing your manager on pulling the trigger to send you? Have you already explained that sessions, training and hands-on exercises are definitely worth the financial investment and time away from your desk?

Well, fear not! We’ve put together a few more resources and reasons to help Continue reading

IDG Contributor Network: Service insertion—Why it’s so important

One of the major challenges that’s long faced enterprise network is the ability to spin up new network services. SD-WANs make this a lot easier through service insertion and service chaining.Suppose for a moment you want to construct a secure perimeter around your compute resources in your data center and Amazon Web Services (AWS) implementation. Normally, you’d introduce a firewall and an Intrusion Detection System (IDS) into each location. That way, should a security incident happen in one location, such as a malware outbreak or a denial of service attack, you would be able to mitigate that event without any reengineering work. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Service insertion—Why it’s so important

One of the major challenges that’s long faced enterprise network is the ability to spin up new network services. SD-WANs make this a lot easier through service insertion and service chaining.Suppose for a moment you want to construct a secure perimeter around your compute resources in your data center and Amazon Web Services (AWS) implementation. Normally, you’d introduce a firewall and an Intrusion Detection System (IDS) into each location. That way, should a security incident happen in one location, such as a malware outbreak or a denial of service attack, you would be able to mitigate that event without any reengineering work. To read this article in full or to leave a comment, please click here

Outlook for iOS speeds up work with third-party add ins

Users of Microsoft's Outlook app for iPhone and iPad can now get work done quicker using third-party integrations.As of Thursday, Outlook for iOS supports add-ins, which let software companies build extensions to their own products that interact with emails in Outlook on a user’s smartphone and tablet. At launch, the app supports add-ins from Evernote, GIPHY, Nimble, Trello and Smartsheet, in addition to those that Microsoft has created.For example, users will be able to translate emails using a Microsoft Translator add-in, add cards to a Trello board straight from their email and quickly reply to an email thread with a funny animated GIF.To read this article in full or to leave a comment, please click here

Memory at the Core of New Deep Learning Research Chip

Over the last two years, there has been a push for novel architectures to feed the needs of machine learning and more specifically, deep neural networks.

We have covered the many architectural options for both the training and inference sides of that workload here at The Next Platform, and in doing so, started to notice an interesting trend. Some companies with custom ASICs targeted at that market seemed to be developing along a common thread—using memory as the target for processing.

Processing in memory (PIM) architectures are certainly nothing new, but because the relatively simple logic units inside of

Memory at the Core of New Deep Learning Research Chip was written by Nicole Hemsoth at The Next Platform.

IDG Contributor Network: CRM and contact center are on a collision course

The arcs of two industries, customer relationship management (CRM) and contact center, are about to entangle. More descriptively, these two industries are on a collision course. Consequences include exciting new innovations in customer experience and dramatic market-wide change.Changing times Propelled in an age of big data and artificial intelligence (AI), CRM is entering the industry’s platinum age. At the same time, contact center is facing disruption as newer communications protocols come to broader acceptance, old guard companies face transitions, and ways of deploying applications—cloud for one—accelerate in adoption.  + Also on Network World: How to conquer a CRM monster + The two industries have existed in the same universe, that of the key ways that customers interact with an enterprise, but for the most part it's as if they have occupied different dimensions. As CRM matured, it was embraced by marketing, sales and service delivery. CRM and contact center would occasionally interact, such as when telephony call controls were added to a CRM screen or when a service call turned into an upselling opportunity. However, true synergies have seldom really gelled.To read this article in full or to leave a comment, please click here

Many Life Sciences Workloads, One Single System

The trend at the high end, from supercomputer simulations to large-scale genomics studies, is to push heterogeneity and software complexity while reducing the overhead on the infrastructure side. This might sound like a case of dueling forces, but there is progress in creating a unified framework to run multiple workloads simultaneously on one robust cluster.

To put this into context from a precision medicine angle, Dr. Michael McManus shared his insights about the years he spent designing infrastructure for life sciences companies and research. Those fields have changed dramatically in just the last five years alone in terms of data

Many Life Sciences Workloads, One Single System was written by Nicole Hemsoth at The Next Platform.

50% off Watch Dogs 2, Playstation 4 – Deal Alert

Explore the birthplace of the tech revolution as Marcus Holloway, a brilliant young hacker who has fallen victim to ctOS 2.0's predictive algorithms and accused of a crime he did not commit. In Marcus' quest to shut down ctOS 2.0 for good, hacking is the ultimate weapon. Players can not only hack into the San Francisco Bay Area's infrastructure but also every person and any connected device they possess to trigger unpredictable chains of events in this vast open world. Watch Dogs 2 for the Playstation 4 is currently discounted 50% off its list price on Amazon, so you can pick it up for just $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here