Cloud-based network analysis drills down to users and apps

Cloud computing is throwing more variables into network performance, but it’s also helping to make network management smarter. Nyansa, a startup that launched earlier this year with a cloud-based service to pinpoint the sources of enterprise network problems, is now adding the ability to analyze how individual applications are performing. The company's original Voyance service uses a software crawler to capture data about how traffic is flowing over the network and how each piece of infrastructure – such as a router or a Wi-Fi access point -- affects that performance.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Arbor Networks adapts missile defense strategy for DDoS protection

Missile defense is hard.Attacks can come from anywhere. There are seconds to respond. Multiple incoming missiles can overwhelm defenses. Mistakes result in huge damage.There is no margin for error. Military strategists have refined missile defense systems over decades. Early attack visibility and fast countermeasures are essential.When it comes to distributed denial of service (DDoS) attacks, Arbor Networks has found the lessons from missile defense apply. Missile defense The Department of Defense describes missile defense protection :To read this article in full or to leave a comment, please click here

New products of the week 11.7.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ruckus Cloudpath ES 5.0Pricing: based on total number of users and is available in 1/3/5 year subscriptions ranging from: $1.50/user for Education on-prem subscription; $1.70/user for Education cloud subscription; $5.00/user for Education on-prem subscription; $5.80/user for Education cloud subscriptionTo read this article in full or to leave a comment, please click here

New products of the week 11.7.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ruckus Cloudpath ES 5.0Pricing: based on total number of users and is available in 1/3/5 year subscriptions ranging from: $1.50/user for Education on-prem subscription; $1.70/user for Education cloud subscription; $5.00/user for Education on-prem subscription; $5.80/user for Education cloud subscriptionTo read this article in full or to leave a comment, please click here

China passes controversial cybersecurity law

China has passed a new cybersecurity law that gives it greater control over the internet, including by requiring local storage of certain data.Human rights groups and trade associations in the U.S. and other countries have warned of the implications of the law both for internet businesses and human rights in the country.The National People's Congress Standing Committee passed the new cybersecurity law Monday, according to reports.“Despite widespread international concern from corporations and rights advocates for more than a year, Chinese authorities pressed ahead with this restrictive law without making meaningful changes,” said Sophie Richardson, China director of Human Rights Watch in a statement over the weekend.To read this article in full or to leave a comment, please click here

Apple’s AirPods to launch much later than anticipated

It's already early November and, in case you missed it, Apple's AirPods are nowhere to be found in stores. Originally introduced alongside the iPhone 7 in September, Apple's new AirPods were poised to help usher in a new wireless era where the notion of connecting to a device via a cord would seem backwards if not downright antiquated. To that end, the unveiling of Apple's AirPods came at an appropriate time, right next to the iPhone 7 which famously was designed without a traditional 3.5mm headphone jack.Back in September, Apple said that its AirPods would launch in late October. And yet, October has come and gone and the highly-anticipated earbuds still lack a release date. Addressing the delay just ahead of the company's special Mac event in late October, an Apple spokesperson told TechCrunch that the AirPods launch was being pushed back so that Apple could presumably address some lingering bugs and usability issues.To read this article in full or to leave a comment, please click here

FBI sticks to earlier view not to charge Clinton over email server

FBI Director James Comey said new emails that had been found had not changed the agency's July decision not to recommend charges against Democratic presidential candidate Hillary Clinton over her use of a private email server.In a letter Sunday to lawmakers, Comey wrote that based on the FBI's review of the emails, the agency had not changed the conclusion it had expressed in July with regard to Clinton's use of a personal email server when she was secretary of state from 2009 to 2013.The letter from Comey comes ahead of U.S. presidential elections on Tuesday and will likely blunt criticism that Clinton used the email server for confidential government communications.To read this article in full or to leave a comment, please click here

FBI sticks to earlier view not to charge Clinton over email server

FBI Director James Comey said new emails that had been found had not changed the agency's July decision not to recommend charges against Democratic presidential candidate Hillary Clinton over her use of a private email server.In a letter Sunday to lawmakers, Comey wrote that based on the FBI's review of the emails, the agency had not changed the conclusion it had expressed in July with regard to Clinton's use of a personal email server when she was secretary of state from 2009 to 2013.The letter from Comey comes ahead of U.S. presidential elections on Tuesday and will likely blunt criticism that Clinton used the email server for confidential government communications.To read this article in full or to leave a comment, please click here

Yes, the FBI can review 650,000 emails in 8 days

In today's news, Comey announces the FBI have reviewed all 650,000 emails found on Anthony Wiener's computer and determined there's nothing new. Some have questioned whether this could be done in 8 days. Of course it could be -- those were 650,000 emails to Wiener, not Hillary.




Reading Wiener's own emails, those unrelated to his wife Huma or Hillary, is unlikely to be productive. Therefore, the FBI is going to filter those 650,000 Wiener emails to get at those emails that were also sent to/from Hillary and Huma.

That's easy for automated tools to do. Just search the From: and To: fields for email addresses known to be used by Hillary and associates. For example, search for [email protected] (Hillary's current email address) and [email protected] (Huma Abedin's current email).

Below is an example email header from the Podesta dump:

From: Jennifer Palmieri <[email protected]>
Date: Sat, 2 May 2015 11:23:56 -0400
Message-ID: <-8018289478115811964@unknownmsgid>
Subject: WJC NBC interview
To: H <[email protected]>, John Podesta <[email protected]>,
Huma Continue reading

Docker Weekly Roundup | October 30, 2016

 

weekly-roundup.png

This week, we delve into the top considerations for running Windows Server 2016 with Hyper-V, the suite of Docker security tools available and the three steps required to get MSBuild in Docker. As we begin a new week, let’s recap our top five most-read stories for the week of October 30, 2016:

  • Docker For Windows Server With Hyper-V – top considerations for running Docker for Windows Server 2016 with Hyper-V VM to understand how they can work together.
  • Docker Security – an overview of the suite of tools available to help secure a container and their range of enhancements built into the Docker platform by Benjamin Wootton.
  • MSBuild With Docker – three steps needed to get MSBuild in a Docker container and have it build an ASP.NET WebAPI application with Windows Containers by Alex Ellis.
  • Docker Enterprise Case Studies – five application case studies covering everything from legacy processes to CI/CD pipelines and how Docker helped reduce customer cost, complexity and chaos.
  • AWS, Docker, And Deep Learning – a method to speed the digital artist transformation, by relying on an artificial intelligence system. AI system is based on a Deep Neural Network that creates artistic images Continue reading

Microsoft to protect World Chess Champion Magnus Carlsen from Russian hackers

If you were the World Chess Champion and you were about to defend your title in a 12-round match against a Russian grandmaster, should you be worried about being hacked? Apparently so, since current World Chess Champion Magus Carlsen has asked Microsoft to protect him from attacks by Russian hackers.It’s not like Carlsen, who became a grandmaster at age 13, practices by playing against a computer. In fact, grandmaster and author Andrew Soltis told NPR that “Carlsen won't even play his computer. He uses it to train, to recommend moves for future competition. But he won't play it, because he just loses all the time and there's nothing more depressing than losing without even being in the game.”To read this article in full or to leave a comment, please click here

Microsoft to protect World Chess Champion Magnus Carlsen from Russian hackers

If you were the World Chess Champion and you were about to defend your title in a 12-round match against a Russian grandmaster, should you be worried about being hacked? Apparently so, since current World Chess Champion Magus Carlsen has asked Microsoft to protect him from attacks by Russian hackers.It’s not like Carlsen, who became a grandmaster at age 13, practices by playing against a computer. In fact, grandmaster and author Andrew Soltis told NPR that “Carlsen won't even play his computer. He uses it to train, to recommend moves for future competition. But he won't play it, because he just loses all the time and there's nothing more depressing than losing without even being in the game.”To read this article in full or to leave a comment, please click here

BGP Large Communities

IPv4 addresses are not the only Internet number resource that has effectively run out in recent times. Another pool of Internet numbers under similar consumption pressures has been the numbers that are intended to uniquely identify each network in the Internet’s inter-domain routing space. These are Autonomous System numbers.

Devops in Networking presentation

This link has the slides that I presented as part of lightning talk at Devops Days India, 2016. In the slides, I have tried to capture how automation in networking area is evolving. I attended first day of the conference and it had a pretty decent collection of talks in Devops area.

Tools you need: W3 Schools color libraries and Bootstrap Studio for Web building

I often find myself hacking away at web sites and today I have a couple of tools to share that have made my life easier. Well, slightly easier.The first is a neat set of CSS libraries I discovered on W3 Schools. These libraries define commonly used color values for things like safety standards, highway signs, army camouflage colors, and so on. The libraries can be linked to your Web pages by referencing them directly:<link rel="stylesheet" href=“http://www.w3schools.com/lib/w3-colors-highway.css">To read this article in full or to leave a comment, please click here

Alexa Voice Service, a singing fish, and the FABRIQ speaker

In my last post I discussed implementing Amazon’s Alexa Voice Service on a Raspberry Pi but you can also do the same on other platforms; witness AVS driving a hacked Big Mouth Billy Bass: Created by Brian Kane, a a teacher at Rhode Island School of Design, this is a wonderful rethink of a 20-year old, hideous … what could you call it? Toy? Thing? Conversation piece? Built on an Arduino, Kane’s Big Mouth Alexa Bass (my name, not Brian’s) is a work of genius.To read this article in full or to leave a comment, please click here

Putting Alexa on a Raspberry Pi

Every geek worth his nerdiness has wanted to be able to converse with their computer since we saw Star Trek's Data talk to the Enterprise's computer back in the 1960s. For most of the time since then, having a real conversation with a computer has seemed something that was really, really far away. Recently, it's got a lot closer ...Just over a year ago I reviewed Amazon’s Echo which I judged to be amazing and I still think it's amazing although even though the technology is still in its early days. The problem is that the Echo isn't really conversational as it's limited to a basic request-response model (though its occasional weird weird non-sequiturs are hysterical and TV ads from Amazon of course get hilarious responses). That said, the Echo, which uses the Alexa Voice Service, remains a compelling, useful product and since I wrote about it, Alexa’s abilities have grown rapidly. Alexa now understands a much greater range of ways to make a request, can deliver information on a wider range of topics, and has an API that has matured and expanded impressively. Here's how the Echo works: On the backend, there’s the Alexa Skills Kit (ASK) which is: Continue reading

Update your Belkin WeMo devices before they become botnet zombies

Owners of WeMo home automation devices should upgrade them to the latest firmware version, which was released this week to fix a critical vulnerability that could allow hackers to fully compromise them.The vulnerability was discovered by researchers from security firm Invincea in the Belkin WeMo Switch, a smart plug that allows users to remotely turn their electronics on or off by using their smartphones. They confirmed the same flaw in a WeMo-enabled smart slow cooker from Crock-Pot, and they think it's probably present in other WeMo products, too.WeMo devices like the WeMo Switch can be controlled via a smartphone app that communicates with them over a local Wi-Fi network or over the Internet through a cloud service run by Belkin, the creator of the WeMo home automation platform.To read this article in full or to leave a comment, please click here