Deploying F5 BIG-IP LTM VE within GNS3 (part-1)

One of the advantages of deploying VMware (or VirtualBox) machines inside GNS3, is the available rich networking infrastructure environment. No need to hassle yourself about interface types, vmnet or private? Shared or ad-hoc? In GNS3 it is as simple and intuitive as choosing  a node interface and connect it to whatever other node interface. In this lab, […]

FAA advises against using or charging Galaxy Note 7 phones on planes

The Federal Aviation Administration has advised passengers not to turn on or charge their Galaxy Note 7 smartphones on board aircraft, following reports of exploding batteries in the device made by Samsung Electronics.The U.S. aviation regulator said Thursday in a statement that in the light of the incidents and concerns raised by Samsung about the devices, it also advises passengers not to stow the phones away in any checked baggage.Samsung last week offered to replace the phones for its customers in the wake of 35 cases reported worldwide as of Sept. 1 that suggested a battery cell issue in some of the devices. The company said it was conducting an inspection with suppliers to identify possible affected batteries in the market. The company stopped meanwhile sales of the Galaxy Note 7.To read this article in full or to leave a comment, please click here

Technology Short Take #71

Welcome to Technology Short Take #71! As always, I have a list of links related to various data center technologies found below; hopefully something here proves useful.

Networking

Servers/Hardware

Security

Yes, U.S. did hack Elysée Palace in 2012, French ex-spy says

Bernard Barbier, a former head of the French signals intelligence service, shared a few stories with students of CentraleSupélec, the elite engineering school from which he graduated in 1976, at a symposium this summer.There was that time he caught the U.S. National Security Agency delving into computers at the Elysée Palace, residence of the French president, for example. And flew to Washington to tell them they'd been found out. Or when the Canadians said they -- and the Iranians, the Spaniards, the Algerians and a few others -- had all been hacked by a Frenchman, and they were totally right, although the French government denied it.These little confessions to the members of a student association at his old school, though, have reached a somewhat larger audience than he may have planned on.To read this article in full or to leave a comment, please click here

Yes, U.S. did hack Elysée Palace in 2012, French ex-spy says

Bernard Barbier, a former head of the French signals intelligence service, shared a few stories with students of CentraleSupélec, the elite engineering school from which he graduated in 1976, at a symposium this summer.There was that time he caught the U.S. National Security Agency delving into computers at the Elysée Palace, residence of the French president, for example. And flew to Washington to tell them they'd been found out. Or when the Canadians said they -- and the Iranians, the Spaniards, the Algerians and a few others -- had all been hacked by a Frenchman, and they were totally right, although the French government denied it.These little confessions to the members of a student association at his old school, though, have reached a somewhat larger audience than he may have planned on.To read this article in full or to leave a comment, please click here

The New Dell Stops Trying To Be The Old IBM

It is week one of the new Dell Technologies, the conglomerate glued together with $60 billion from the remaining parts of the old Dell it has not sold off to raise cash to buy storage giant EMC and therefore server virtualization juggernaut VMware, which is owned mostly by EMC but remains a public company in the wake of the deal.

By adding EMC and VMware to itself and shedding its outsourcing services and software business units, Dell is becoming the largest supplier of IT gear in the world, at least by its own reckoning. You could argue that consumer PCs

The New Dell Stops Trying To Be The Old IBM was written by Timothy Prickett Morgan at The Next Platform.

Cisco exec churn: Enterprise chief Soderbery out

The Cisco executive wheels keep churning. Today the person in charge of Cisco’s enterprise engineering organizations Robert Soderbery said he has left the company via a post on LinkedIn. More on Network World: Cisco: IP traffic will surpass the zettabyte level in 2016+ Soderbery wrote: “It has been a fascinating time to be at Cisco and there are many experiences I take away with me. It was an incredibly diverse set of challenges, from the incessant battle with the likes of HP and Huawei for market share, to creating new products, businesses and even markets. My colleagues and I were fortunate to be early movers in IoT and the digital transition, which led to new businesses in new industries for Cisco; manufacturing, transportation, utilities and smart cities. In October of 2012 I met the Meraki [a company Cisco acquired in 2012] founding team and realized that the amazing company they built, when combined with the power of Cisco, would be something very special, which indeed turned out to be true. And of course the more recent work in networking innovation with Cisco Digital Network Architecture, and driving the transition to a software centric architecture has been exciting Continue reading

Cisco exec churn: Enterprise chief Soderbery out

The Cisco executive wheels keep churning. Today the person in charge of Cisco’s enterprise engineering organizations Robert Soderbery said he has left the company via a post on LinkedIn. More on Network World: Cisco: IP traffic will surpass the zettabyte level in 2016+ Soderbery wrote: “It has been a fascinating time to be at Cisco and there are many experiences I take away with me. It was an incredibly diverse set of challenges, from the incessant battle with the likes of HP and Huawei for market share, to creating new products, businesses and even markets. My colleagues and I were fortunate to be early movers in IoT and the digital transition, which led to new businesses in new industries for Cisco; manufacturing, transportation, utilities and smart cities. In October of 2012 I met the Meraki [a company Cisco acquired in 2012] founding team and realized that the amazing company they built, when combined with the power of Cisco, would be something very special, which indeed turned out to be true. And of course the more recent work in networking innovation with Cisco Digital Network Architecture, and driving the transition to a software centric architecture has been exciting Continue reading

RSA: Expect business as usual now that Dell owns it

RSA Amit Yoran Enterprises should expect business as usual from RSA in the wake of its being swept up by Dell this week in the largest tech deal ever, with company executives saying it will retain a good deal of autonomy to carry out its strategic plans.To read this article in full or to leave a comment, please click here

RSA: Expect business as usual now that Dell owns it

RSA Amit Yoran Enterprises should expect business as usual from RSA in the wake of its being swept up by Dell this week in the largest tech deal ever, with company executives saying it will retain a good deal of autonomy to carry out its strategic plans.To read this article in full or to leave a comment, please click here

Data hoarders are shining a spotlight on past breaches

Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.Earlier this week, Keen, a data collector who runs the site Vigilante.pw, helped to uncover details about stolen data taken from the popular porn site Brazzers. A copy of almost 800,000 accounts, probably originally hacked back in 2012, fell into his hands.The stolen database is just one of the many Keen has on file, in fact, and each one can involve thousands or even millions of internet accounts. Vigilante.pw continually archives past data breaches as a way to warn the public. To read this article in full or to leave a comment, please click here

Data hoarders are shining a spotlight on past breaches

Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.Earlier this week, Keen, a data collector who runs the site Vigilante.pw, helped to uncover details about stolen data taken from the popular porn site Brazzers. A copy of almost 800,000 accounts, probably originally hacked back in 2012, fell into his hands.The stolen database is just one of the many Keen has on file, in fact, and each one can involve thousands or even millions of internet accounts. Vigilante.pw continually archives past data breaches as a way to warn the public. To read this article in full or to leave a comment, please click here

55% off Travel Cord Organizer – Electronics Accessories Case & Cable Organizer – Deal Alert

Designed to protect and safeguard your electronic gadgets and save time on the go by easily storing and finding everything you need. This travel organizer offers a secure storage space for cord management, laptop and computer accessories putting everything you need in one place. This organizer also gives you special space inside for credit cards, passports, also for boarding passes, smartphone, tickets and has many pockets where you can put coins, keys, USB, SIM card, earphones, and other small accessories. Give yourself or someone else the gift of stress-free travel.  The travel cord organizer's typical list price of $30.99 has been reduced 55% to $13.99. See the discounted Travel Cord Organizer now on Amazon.To read this article in full or to leave a comment, please click here

Intel’s siloed business units unify around IoT and connectivity

Intel has many disparate business units doing their own thing. The challenging task of tethering them is a top priority for Intel's second-in-command, Venkata Renduchintala.Renduchintala, known as Murthy, was appointed last November to run Intel's PC, client, and internet of things businesses. He's made his presence felt: Within six months of his appointment, Intel cut struggling products like mobile CPUs and sharpened its focus on growth areas of IoT, servers, and connectivity.One common thread in all the areas of growth is connectivity, with modems and wireless products now as important to Intel as its CPUs. Intel needed a serious kick in its modem development efforts, which is why CEO Brian Krzanich poached Renduchintala from Qualcomm, a bitter Intel rival, where he was in charge of connectivity offerings. To read this article in full or to leave a comment, please click here

Binding to an IPv6 Subnet

In the original framework of the IP architecture, hosts had network interfaces, and network interfaces had single IP addresses. These days, many operating systems allow a configuration to add additional addresses to network interfaces by enumerating these additonal addresses. But can we bind a network interface to an entire subnet of IP addresses without having to enumerate each and every individual address?

NuData Security adds ‘unspoofable’ dimensions to the identity process  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  In 2012, the social networking site LinkedIn suffered a data breach in which username/password combinations were stolen. Four years later, in 2016, at least 117 million sets of credentials from this breach were available for purchase online. MySpace suffered a similar data breach, and years later 427 million sets of credential were posted online.These events have prompted e-commerce companies that have not suffered a data breach to urge their customers to change their passwords as soon as possible.To read this article in full or to leave a comment, please click here

Closing the incident response gap: Q&A with Sean Convery of ServiceNow

A decade ago, security meant a big firewall at a single ingress point. All devices and applications were under IT’s tight control, so they did not create significant security risks. Today, everything has changed. The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology. This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here

Closing the incident response gap: Q&A with Sean Convery of ServiceNow

A decade ago, security meant a big firewall at a single ingress point.  All devices and applications were under IT’s tight control, so they did not create significant security risks.  Today, everything has changed.  The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology.  This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here