Privacy groups urge US FTC to investigate WhatsApp promises

The U.S. Federal Trade Commission should stop mobile messaging service WhatsApp from sharing user data with parent company Facebook in violation of earlier privacy promises, several privacy groups said.The FTC should step in to stop WhatsApp from violating "commitments the company previously made to subscribers," the 17 groups said in a letter sent to the agency Thursday. WhatsApp has long billed itself as a secure and private messaging service. WhatsApp's recently released plan to share user data with Facebook as a way to target advertising could amount to an "unfair and deceptive" trade practice, said the groups, including the Center for Digital Democracy, Consumer Action, Consumer Watchdog, and Demand Progress.To read this article in full or to leave a comment, please click here

Privacy groups urge US FTC to investigate WhatsApp promises

The U.S. Federal Trade Commission should stop mobile messaging service WhatsApp from sharing user data with parent company Facebook in violation of earlier privacy promises, several privacy groups said.The FTC should step in to stop WhatsApp from violating "commitments the company previously made to subscribers," the 17 groups said in a letter sent to the agency Thursday. WhatsApp has long billed itself as a secure and private messaging service. WhatsApp's recently released plan to share user data with Facebook as a way to target advertising could amount to an "unfair and deceptive" trade practice, said the groups, including the Center for Digital Democracy, Consumer Action, Consumer Watchdog, and Demand Progress.To read this article in full or to leave a comment, please click here

50% off Inateck USB 3.0 Dual-Bay Hard Drive Cloning Station – Deal Alert

This gadget from Inateck will duplicate any 2.5 inch or 3.5 inch SATA HDD/SSD drive quickly and automatically without the need for a computer, by just pushing a button. Once cloning has started, an LED indicator shows you 25%, 50%, 75%, and 100% completion status. Or don't kick off the cloning process, and the unit allows you to move files freely between drives as you would an external HDD/SSD. Built-in safeguards protect against overheating, overvoltage, current leaks, short circuits, peak voltage, and other disturbances to ensure safe data access and transfers. The unit currently averages 4.5 out of 5 stars on Amazon from over 530 customers (read reviews). With a typical list price of $69.99, this 50% off deal puts it at just $34.99. See the discounted Inateck HDD/SSD cloning station now on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes 2026: What the future holds for big iron

For more than 50 years mainframes have powered thousands of organizations around the world, from banks to militaries to government agencies. Looking looking back at all that history makes me think about the critical role that big iron has played in the world, but it also gets me thinking about the future and what the next 10 years holds for the mainframe industry.+ Also on Network World: The future of virtualization: Don’t forget the so-called 'old' +What makes me so confident that mainframing even has a 2026 worth looking forward to? After all, hasn’t the cloud revolutionized data storage and processing and ushered in the end of mainframes? The truth is that not every disruptive development replaces what it disrupted—sometimes not immediately and sometimes not at all. Globalization did not kill American IT jobs, Metallica didn’t negate Van Halen, and the cloud won’t kill mainframes because mainframes have something that the cloud will need over the next decade: power.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes 2026: What the future holds for big iron

For more than 50 years mainframes have powered thousands of organizations around the world, from banks to militaries to government agencies. Looking looking back at all that history makes me think about the critical role that big iron has played in the world, but it also gets me thinking about the future and what the next 10 years holds for the mainframe industry.+ Also on Network World: The future of virtualization: Don’t forget the so-called 'old' +What makes me so confident that mainframing even has a 2026 worth looking forward to? After all, hasn’t the cloud revolutionized data storage and processing and ushered in the end of mainframes? The truth is that not every disruptive development replaces what it disrupted—sometimes not immediately and sometimes not at all. Globalization did not kill American IT jobs, Metallica didn’t negate Van Halen, and the cloud won’t kill mainframes because mainframes have something that the cloud will need over the next decade: power.To read this article in full or to leave a comment, please click here

Junos MTU Handling on Access & Trunk Ports)

MTU is most important aspect for proper functionality of any application. In this blog post I will highlight MTU handling by Junos based devices for (802.3 un-tag and 802.1Q tag packets) .

802-3

Simple 802.3 packet header is shown above total packet size is 1514 bytes (14 bytes header + 1500 bytes max payload). Now we will see how  Junos based devices handle MTU on access ports.

 

  • LAB> show interfaces xe-1/0/32
    Physical interface: xe-1/0/32, Enabled, Physical link is Up

    Link-level type: Ethernet, MTU: 1514, MRU: 0, Link-mode: Auto, Speed: Auto, BPDU Error: None, MAC-REWRITE Error: None, Loopback: Disabled, Source filtering: Disabled, Flow control: Disabled, Auto-negotiation: Disabled,
    ———-output omitted for brevity——————–
    Protocol eth-switch, MTU: 1514

  • LAB > monitor traffic interface xe-1/0/32 no-resolve layer2-headers print-hex 02:09:00.266841 Out 00:31:46:52:dd:80 > 00:1e:0b:d3:1d:1a, ethertype 802.1Q (0x8100), length 1486: vlan 243, p 0, ethertype IPv4, truncated-ip – 32 bytes missing!
    (tos 0x0, ttl 64, id 49385, offset 0, flags [DF], proto: ICMP (1), length: 1500)
    192.168.243.1 > 192.168.243.52: ICMP echo reply, id 29316, seq 5, length 1480

 

  • As we can see an access interface “xe-1/0/32″ showing MTU 1514 but when we monitor traffic on Continue reading

Integrating RHV & OpenStack with Neutron

Hi folks, I recently posted an article on one of the official Red Hat blogs about the new Neutron integration between RHV and RHOSP. I have to say it’s very cool and might change the way you look at networking capabilities in RHV, at least if you’re also using RHOSP in the same data center.

As a side note, I’ve mentioned my friend and colleague, Tony James in recent posts and he makes another appearance this week. He helped pull together the configuration steps as well as the demo that we recorded. Big kudos to to “Big T”.

Back to the actual integration. If you don’t want to look at the other article, the condensed version of “why should you might care” is as follows:

  1. Run applications across RHV & RHOSP – front end of the app on RHOSP and the back end on RHV using the Neutron integration to bridge the network gap.
  2. Add SDN capabilities to RHV via the Neutron integration, even if the app only exists in RHV.
  3. Manage the SDN network topologies for both RHV and RHOSP from a single management space (web or programmatic).

Those are the 3 big use cases, in a nutshell. If Continue reading

Impending cumulative updates unnerve Windows patch experts

Microsoft's decision to force Windows 10's patch and maintenance model on customers running the older-but-more-popular Windows 7 has patch experts nervous."Bottom line, everyone is holding their breath, hoping for the best, expecting the worst," said Susan Bradley in an email. Bradley is well known in Windows circles for her expertise on Microsoft's patching processes: She writes on the topic for the Windows Secrets newsletter and moderates the PatchMangement.org mailing list, where business IT administrators discuss update tradecraft.Bradley's anxiety stems from Microsoft's announcement last month that beginning in October it will offer only cumulative security updates for Windows 7 and 8.1, ending the decades-old practice of letting customers choose which patches they apply.To read this article in full or to leave a comment, please click here

Impending cumulative updates unnerve Windows patch experts

Microsoft's decision to force Windows 10's patch and maintenance model on customers running the older-but-more-popular Windows 7 has patch experts nervous."Bottom line, everyone is holding their breath, hoping for the best, expecting the worst," said Susan Bradley in an email. Bradley is well known in Windows circles for her expertise on Microsoft's patching processes: She writes on the topic for the Windows Secrets newsletter and moderates the PatchMangement.org mailing list, where business IT administrators discuss update tradecraft.Bradley's anxiety stems from Microsoft's announcement last month that beginning in October it will offer only cumulative security updates for Windows 7 and 8.1, ending the decades-old practice of letting customers choose which patches they apply.To read this article in full or to leave a comment, please click here

New Relic aims to be your dashboard of the future

In Lew Cirne's view, all companies are now software companies and understanding how your software is treating your customers is key to business success. Cirne is the founder and CEO of New Relic, a cloud-based provider of application management tools. In this CEO Interview Series conversation with IDG Chief Content Officer John Gallant, Cirne explained how New Relic gets IT and business execs on the same page in improving operations and customer experience, and he described the company's new tools for keeping highly virtualized private and public infrastructure in synch. He also talked about a 'unique' pricing scheme that recognizes the dynamic nature of computing today, and outlined why existing management tool vendors have a long way to go to catch up with New Relic.To read this article in full or to leave a comment, please click here(Insider Story)

New Relic aims to be your dashboard of the future

In Lew Cirne's view, all companies are now software companies and understanding how your software is treating your customers is key to business success. Cirne is the founder and CEO of New Relic, a cloud-based provider of application management tools. In this CEO Interview Series conversation with IDG Chief Content Officer John Gallant, Cirne explained how New Relic gets IT and business execs on the same page in improving operations and customer experience, and he described the company's new tools for keeping highly virtualized private and public infrastructure in synch. He also talked about a 'unique' pricing scheme that recognizes the dynamic nature of computing today, and outlined why existing management tool vendors have a long way to go to catch up with New Relic.To read this article in full or to leave a comment, please click here(Insider Story)

6 expert tips to better secure third-party network access

Third-party accessImage by Harris & Ewing Collection (Library of Congress)Earlier this year, the Soha Third-Party Advisory Group conducted a study that surveyed more than 200 enterprise IT and security C-Level executives, directors and managers about the daily challenges they face providing fast and secure third-party application access to their contractors and suppliers. The survey revealed that 98 percent of respondents do not consider third-party access a top priority in terms of IT initiatives and budget allocation. This is a huge concern, considering that third parties cause or are implicated in 63 percent of all data breaches.To read this article in full or to leave a comment, please click here

6 expert tips to better secure third-party network access

Third-party accessImage by Harris & Ewing Collection (Library of Congress)Earlier this year, the Soha Third-Party Advisory Group conducted a study that surveyed more than 200 enterprise IT and security C-Level executives, directors and managers about the daily challenges they face providing fast and secure third-party application access to their contractors and suppliers. The survey revealed that 98 percent of respondents do not consider third-party access a top priority in terms of IT initiatives and budget allocation. This is a huge concern, considering that third parties cause or are implicated in 63 percent of all data breaches.To read this article in full or to leave a comment, please click here

5 tech trends that have Turing Award winners worried

Technology has considerable potential to make the world better, but those benefits are far from guaranteed. Plenty of downsides can pop up along the way, and some of them have Turing Award winners especially worried.1. The internet echo chamber "Technology by itself is not evil, but people can use it for bad things," Barbara Liskov, an Institute Professor at MIT, told an audience of journalists Thursday at the Heidelberg Laureate Forum in Germany. "I do worry a lot about what's going on."The ability to selectively filter out news and opinions that don't agree with one's own viewpoint is one of Liskov's top concerns.To read this article in full or to leave a comment, please click here

Saving Backup/Rescue Config on Juniper

A lot of times I find myself having to back a config up on a Juniper before I start work. Usually, I want a quick point I can restore to if I need to rollback. So enter rescue configurations to the, errr, rescue?

request system configuration rescue save

This saves the current saved system configuration as a rescue configuration you can easily rollback to with.

#rollback rescue
#commit

You can also save the current configuration to file using:
>file copy /config/juniper.conf.gz /var/tmp/temp_backup.cfg

/config/juniper.conf.gz is synonymous with the current running configuration.

Potentially, you could stash files in /var/tmp/ and restore them using the above. And restore using your backup with #load replace /var/tmp/temp_backup.cfg

View your stashed files using file list /var/tmp


Vint Cerf’s dream do-over: 2 ways he’d make the internet different

Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again."If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday during a press conference at the Heidelberg Laureate Forum in Germany.IPv4, the first publicly used version of the Internet Protocol, included an addressing system that used 32-bit numerical identifiers. It soon became apparent that it would lead to an exhaustion of addresses, however, spurring the creation of IPv6 as a replacement. Roughly a year ago, North America officially ran out of new addresses based on IPv4.  To read this article in full or to leave a comment, please click here

Vint Cerf’s dream do-over: 2 ways he’d make the internet different

Vint Cerf is considered a father of the internet, but that doesn't mean there aren't things he would do differently if given a fresh chance to create it all over again."If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn't have to go through this painful, 20-year process of going from IPv4 to IPv6," Cerf told an audience of journalists Thursday during a press conference at the Heidelberg Laureate Forum in Germany.IPv4, the first publicly used version of the Internet Protocol, included an addressing system that used 32-bit numerical identifiers. It soon became apparent that it would lead to an exhaustion of addresses, however, spurring the creation of IPv6 as a replacement. Roughly a year ago, North America officially ran out of new addresses based on IPv4.  To read this article in full or to leave a comment, please click here