Russian hackers breach DNC computers, steal data on Trump

Russian hackers managed to breach the computer network of the Democratic National Committee and stole opposition research on Republican presidential candidate Donald Trump.The hackers had access to email and chat traffic as far back as last summer, the Washington Post reported on Tuesday. No financial data was stolen, however, suggesting that espionage was the motive.The hackers belong to two separate groups that have been linked to the Russian government, according to security firm Crowdstrike, which was hired to mitigate the data breach.To read this article in full or to leave a comment, please click here

Russian hackers breach DNC computers, steal data on Trump

Russian hackers managed to breach the computer network of the Democratic National Committee and stole opposition research on Republican presidential candidate Donald Trump.The hackers had access to email and chat traffic as far back as last summer, the Washington Post reported on Tuesday. No financial data was stolen, however, suggesting that espionage was the motive.The hackers belong to two separate groups that have been linked to the Russian government, according to security firm Crowdstrike, which was hired to mitigate the data breach.To read this article in full or to leave a comment, please click here

The Walls Come Down On The Last Bastion Of Proprietary

Open source software has done a lot to transform the IT industry, but perhaps more than anything else it has reminded those who architect complex systems that all elements of a datacenter have to be equally open and programmable for them to make the customizations that are necessary to run specific workloads efficiently and therefore cost effectively.

Servers have been smashed wide open in large enterprises, HPC centers, hyperscalers, and cloud builders (excepting Microsoft Azure, of course) by the double whammy of the ubiquity of the X86 server and the open source Linux operating system, and storage has followed suit

The Walls Come Down On The Last Bastion Of Proprietary was written by Timothy Prickett Morgan at The Next Platform.

Framing Questions for Optimized I/O Subsystems

Building high performance systems at the bleeding edge hardware-wise without considering the way data actually moves through such a system is too common—and woefully so, given the fact that understanding and articulating an application’s requirements can lead to dramatic I/O improvements.

A range of “Frequently Unanswered Questions” are at the root of inefficient storage design due to a lack of specified workflows, and this problem is widespread, especially in verticals where data isn’t the sole business driver.

One could make the argument that data is at the heart of any large-scale computing endeavor, but as workflows change, the habit of

Framing Questions for Optimized I/O Subsystems was written by Nicole Hemsoth at The Next Platform.

What is flow-based load balancing ?

Flow-based load balancing is used mostly in layer 2 networks, although in Layer 3 routing, packets can be load balanced per packets or per flow, flow-based load balancing is commonly used with the Local area network, datacenter and datacenter interconnect technologies. There are two important load balancing mechanisms in layer 2. Vlan-based load balancing and […]

The post What is flow-based load balancing ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Microsoft released 16 security bulletins for June, 5 rated critical

Microsoft released 16 security bulletins for June, five of which are rated critical for remote code execution vulnerabilities. Even the MSRC team doesn’t seem too excited over this month’s patches as the entire Patch Tuesday announcement is a mere three sentences.FYI: You should be keeping an eye out for the Adobe Flash Player patch as Adobe issued a security advisory, warning of a Flash exploit being used in the wild for targeted attacks. The fix for Flash is expected to be released on Thursday, June 16.To read this article in full or to leave a comment, please click here

Microsoft released 16 security bulletins for June, 5 rated critical

Microsoft released 16 security bulletins for June, five of which are rated critical for remote code execution vulnerabilities. Even the MSRC team doesn’t seem too excited over this month’s patches as the entire Patch Tuesday announcement is a mere three sentences.FYI: You should be keeping an eye out for the Adobe Flash Player patch as Adobe issued a security advisory, warning of a Flash exploit being used in the wild for targeted attacks. The fix for Flash is expected to be released on Thursday, June 16.To read this article in full or to leave a comment, please click here

Microsoft and LinkedIn: A match made in uncool heaven

Normally, I’m a huge skeptic of big-bucks tech mergers. But I’m 100 percent on board with Microsoft’s $26.2 billion surprise acquisition of LinkedIn, announced earlier this week.+ Also on Network World: Microsoft scoops up LinkedIn for $26.2B in cash +Why? Because as I see it, merger success isn’t usually based on technology fit or market positioning or trivia like that. Instead, most of the time it all hinges on the compatibility of corporate culture and values, and Microsoft and LinkedIn are eerily similar those regards—like twin sons from different mothers.To read this article in full or to leave a comment, please click here

No Capes, No Wands

As a keen observer of the network engineering world for the last twenty… okay, maybe longer, but I don’t want to sound like an old man telling stories quite yet… years, there’s one thing I’ve always found kind-of strange. We have a strong tendency towards hero worship.

I don’t really know why this might be, but I’ve seen it in Cisco TAC—the almost hushed tones around a senior engineer who “is brilliant.” I’ve seen it while sitting in a meeting in the middle of an argument over some technical point in a particular RFC. Someone says, “we should just ask the author…” Which is almost always followed by something like: “Really? You know them?”

To some degree, this is understandable—network engineering is difficult, and we should truly honor those in our world who have made a huge impact. In many other ways, it’s unhelpful, and even unhealthy. Why?

First, it tends to create an “us versus them,” atmosphere in our world. There are engineers who work on “normal” networks, and then there are those who work on, well, you know, special ones. Not everyone needs those “special skills,” so we end up creating a vast pool of people Continue reading

What does PE-CE mean in MPLS ?

What does PE-CE mean in the context of MPLS ? What is CE , P and PE device in MPLS and MPLS VPN ? These are foundational terms and definition in MPLS. MPLS is one of the most commonly used encapsulation mechanism in Service Provider networks and before studying more advanced mechanisms, this article is […]

The post What does PE-CE mean in MPLS ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Open Source at Docker, Part 3: The Tooling and Automation

The Docker open source project is among the most successful in recent history by every possible metric: number of contributors, GitHub stars, commit frequency, … Managing an open source project at that scale and preserving a healthy community doesn’t come without challenges.

This post is the last of a 3-part series on how we deal with those challenges on the Docker Engine project. Part 1 was all about the people behind the project, and part 2 focused on the processes. In Part 3, we will cover tooling and automation.

There are many areas for automation in a project such as Docker. We wanted to present and share some of our tooling with you: the CI, the utility bots, and the project dashboards.

Continue reading

BeagleBone board gets long-overdue Wi-Fi and Bluetooth capabilities

Before Raspberry Pi rocked the world of makers, boards from BeagleBoard.org were the computers of choice among developers who were looking to create cool gadgets.One of its boards, BeagleBone, isn't as popular as it used to be, but it still has a loyal following. Seeed Studios has taken a version of the open-source board and given it a much-needed wireless upgrade, adding Wi-Fi and Bluetooth support.The BeagleBone Green Wireless is a significant improvement over predecessors: among other things it now allows makers to add wireless capabilities to smart home devices, wearables, health monitors and other gadgets. The upgrade also brings BeagleBone into the Internet of Things era, in which wirelessly interconnected devices are constantly exchanging data.To read this article in full or to leave a comment, please click here

U.S. appeals court upholds net neutrality rules, but fight is not over

Rejecting challenges by ISPs and broadband trade groups, an appeals court has upheld the U.S. Federal Communications Commission's controversial net neutrality rules, passed in 2015.  The legal wrangling will likely continue for years, however, and may go all the way to the U.S. Supreme Court. Meanwhile, the U.S. Court of Appeals for the District of Columbia Circuit, in an opinion issued Tuesday, ruled that the FCC had the authority to reclassify broadband as a common-carrier telecom service to provide a foundation for net neutrality rules that prohibit broadband providers from selectively blocking or slowing Internet traffic. Past court rulings have given agencies the authority to change their minds, like the FCC did when it re-regulated broadband, Judges David Tatel and Sri Srinivasan wrote in an 184-page opinion.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Scality launches single-server open source software for S3-compliant storage

News this morning from storage vendor Scality that the company is announcing the general availability of its S3 Server Software. The offering is an open source version of Scality's S3 API and allows developers to code to Amazon Web Services' S3 storage API on a local machine.Packaged as a Docker container (what else!) the idea is that developers can local build applications that thereafter can be deployed on premises, on AWS or some combination of the above.RING storage capabilities Scality has grown to scale (pun intended) by offering storage solutions that now store some 800 billion objects. Scality's RING storage supports any file and object application, sited on any hardware and with no capacity constraints. Given its standard API approaches, RING enables storage to be completed across public or private services and can be deployed on any standard x86 hardware, without the need to re-architect as infrastructure changes occur.To read this article in full or to leave a comment, please click here

Sponsored Post: Gusto, Awake Networks, Spotify, Telenor Digital, Kinsta, Aerospike, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

  • Awake Networks is an early stage network security and analytics startup that processes, analyzes, and stores billions of events at network speed. We help security teams respond to intrusions with super-human  efficiency and provide macroscopic and microscopic insight into the networks they defend. We're looking for folks that are excited about applying modern bleeding edge techniques to build systems that handle scale in a constrained environment. We have many open-ended problems to solve around stream-processing, distributed systems, machine learning, query processing, data modeling, and much more! Please check out our jobs page to learn more.

  • Site Reliability Engineer Manager. We at Spotify are looking for an engineering leader (Chapter Continue reading

Merchant silicon based routing, flow analytics, and telemetry

Drivers for growth describes how switches built on merchant silicon from Broadcom ASICs dominate the current generation of data center switches, reduce hardware costs, and support an open ecosystem of switch operating systems (Cumulus Linux, OpenSwitch, Dell OS10, Broadcom FASTPATH, Pica8 PicOS, Open Network Linux, etc.).

The router market is poised to be similarly disrupted with the introduction of devices based on Broadcom's Jericho ASIC, which has the capacity to handle over 1 million routes in hardware (the full Internet routing table is currently around 600,000 routes).
An edge router is a very pricey box indeed, often costing anywhere from $100,000 to $200,000 per 100 Gb/sec port, depending on features in the router and not including optical cables that are also terribly expensive. Moreover, these routers might only be able to cram 80 ports into a half rack or full rack of space. The 7500R universal spine and 7280R universal leaf switches cost on the order of $3,000 per 100 Gb/sec port, and they are considerably denser and less expensive. - Leaving Fixed Function Switches Behind For Universal Leafs
Broadcom Jericho ASICs are currently available in Arista 7500R/7280R routers and in Cisco NCS 5000 series routers. Expect further disruption Continue reading