Glue Networks wants to be the orchestration platform for the networked world

Glue Networks used the Cisco Live conference in Las Vegas this week to announce what CEO Jeff Gray describes as the “first multi-vendor software defined network orchestration platform focused on end-to-end automation, all the way from the data center across the WAN as well as the LAN.”While Software Defined Networking promised to simplify the management of network devices by centralizing control, Gray argues the SDN tools are still vendor specific: “Juniper has their controller, Cisco has theirs, Brocade, you name it.  It’s hard enough to automate and build orchestration for a single vendor, but now customers have these different vendor islands and they need a consistent layer of automation across them to plug into their existing workflow systems, monitoring tools, ITSM workflows, IP addressing systems, etc.  That’s the gap in the network world we’re solving.”To read this article in full or to leave a comment, please click here

Glue Networks wants to be the orchestration platform for the networked world

Glue Networks used the Cisco Live conference in Las Vegas this week to announce what CEO Jeff Gray describes as the “first multi-vendor software defined network orchestration platform focused on end-to-end automation, all the way from the data center across the WAN as well as the LAN.”While Software Defined Networking promised to simplify the management of network devices by centralizing control, Gray argues the SDN tools are still vendor specific: “Juniper has their controller, Cisco has theirs, Brocade, you name it.  It’s hard enough to automate and build orchestration for a single vendor, but now customers have these different vendor islands and they need a consistent layer of automation across them to plug into their existing workflow systems, monitoring tools, ITSM workflows, IP addressing systems, etc.  That’s the gap in the network world we’re solving.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: Indegy lands Series A for industrial system security

News today from Indegy that it has closed a $12 million Series A funding round led by Vertex Ventures Israel with participation from Silicon Valley-based Aspect Ventures, SBI Holdings of Japan, as well as previous investors Shlomo Kramer and Magma Venture Partners. This round takes total funding for this little-known company to some $18 million.Indegy is in the business of protecting industrial control systems (ICS). ICS may not sound sexy, but before the Internet of Things (IoT), huge industrial processes and infrastructures were controlled, monitored and maintained by large ICS networks. Unlike IoT, which tends to work on the public internet, ICS generally runs on private networks and is hence less visible to the general public. And while everyone fixates on the latest iPhone or hot dating app, they remain blissfully aware of what controls their power systems, water and sewerage systems, and large HVAC installs.To read this article in full or to leave a comment, please click here

Vicious new ransomware takes your money and still deletes your files

There’s a new form of ransomware—apparently built by amateurs—that takes your money but deletes your personal files anyway. Security research firm Talos recently published a blog post about a new form of malware dubbed Ranscam.This ransomware follows the basic premise of previous variants. It claims your files have been encrypted, and thus inaccessible to you, then threatens to delete all your files if you don’t pay up. Ransomware's scary premise prompts many people to fork over the dough in order to save their photos and other content.To read this article in full or to leave a comment, please click here

Vicious new ransomware takes your money and still deletes your files

There’s a new form of ransomware—apparently built by amateurs—that takes your money but deletes your personal files anyway. Security research firm Talos recently published a blog post about a new form of malware dubbed Ranscam.This ransomware follows the basic premise of previous variants. It claims your files have been encrypted, and thus inaccessible to you, then threatens to delete all your files if you don’t pay up. Ransomware's scary premise prompts many people to fork over the dough in order to save their photos and other content.To read this article in full or to leave a comment, please click here

Omni Hotels’ new CIO shores up cybersecurity amid data breach

New Omni Hotels & Resorts CIO Ken Barnes is mulling how to shore up corporate defense in the wake of a cybersecurity attack that impacted 48 of its 60 hotels in North America. Barnes, who started in May, of course says he plans to improve the protection for Omni's payment processing systems. New defenses could include analytics that detect anomalous behavior suggesting that a hacker has entered or is trying to enter Omni's computer network. Omni Hotels & Resorts CIO Ken Barnes.To read this article in full or to leave a comment, please click here

Drilling Into The CCIX Coherence Standard

The past decade or so has seen some really phenomenal capacity growth and similarly remarkable software technology in support of distributed-memory systems.  When work can be spread out across a lot of processors and/or a lot of disjointed memory, life has been good.

Pity, though, that poor application needing access to a lot of shared memory or which could use the specialized and so faster resources of local accelerators. For such, distributed memory just does not cut it and having to send work out to an IO-attached accelerator chews into much of what would otherwise be an accelerator’s advantages. With

Drilling Into The CCIX Coherence Standard was written by Timothy Prickett Morgan at The Next Platform.

Malware infections drop in first half of 2016

Malware infections in the United States dropped by 47 percent in the first half of 2016 when compared to the same period last year, according to a new report by cybersecurity software provider Enigma Software. Enigma analyzed 30 million infected computers and found that while malware and ransomware infections still remained at an all-time high relative to prior years, the overall rate of infections had dropped 47.3 percent compared to the first half of 2015. + Also on Network World: 8 ways to fend off spyware, malware and ransomware +To read this article in full or to leave a comment, please click here

Facebook’s OpenCellular base stations to connect more mobile users

Facebook’s Aquila Unmanned Aircraft research project, which uses solar-powered drones to fill the internet access void in unconnected regions of the world, could be overtaken by the company’s latest development.  Facebook announced today that it will apply its open source influence and expertise to a new open-source, mobile, voice and data cellular base station called OpenCellular—a cellular base station in a box. The first implementations are expected to be available this summer.Facebook’s move represents breathtaking potential. Another company, Range Networks, has proven the feasibility of the model. Now, with Facebook’s extensive resources, this feasibility could become a reality, connecting the 4 billion not-yet-internet-connected people and the 10 percent of the world’s population who lack simple cellular voice and SMS connections.To read this article in full or to leave a comment, please click here

Digital Ocean adds block storage to cloud servers

Digital Ocean, an intriguing cloud infrastructure vendor that many may not have heard of, is taking a big step forward today with the introduction of block storage to its platform.Block storage allows users to add extra disk space to virtual machines that can be scaled up and down independently from the state of the VM. DO’s SSD-based Block Storage is priced at $.10 per GB per month, the same price as Amazon EBS, the Elastic Block Storage Service from Amazon Web Services. Digital Ocean Digital Ocean unveiled a new logo, new CTO and new Block Storage service today To read this article in full or to leave a comment, please click here

Why Amazon Retail Went to a Service Oriented Architecture

When Lee Atchison arrived at Amazon, Amazon was in the process of moving from a large monolithic application to a Service Oriented Architecture.

Lee talks about this evolution in an interesting interview on Software Engineering Daily: Scalable Architecture with Lee Atchison, about Lee's new book: Architecting for Scale: High Availability for Your Growing Applications.

This is a topic Adrian Cockcroft has talked a lot about in relation to his work at Netflix, but it's a powerful experience to hear Lee talk about how Amazon made the transition with us having the understanding of what Amazon would later become. 

Amazon was running into the problems of success. Not so much from a scaling to handle the requests perspective, but they were suffering from the problem of scaling the number of engineers working in the same code base.

At the time their philosophy was based on the Two Pizza team. A small group owns a particular piece of functionality. The problem is it doesn’t work to have hundreds of pizza teams working on the same code base. It became very difficult to innovate and add new features. It even became hard to build the application, pass the test suites, and Continue reading

FBI leaves infamous “DB Cooper” crime mystery to the ages

I suppose it was inevitable after 45 years of intensive but mostly futile investigating the FBI this week said it pulled the plug on the Dan “DB” Cooper hijacking/ransom case. You may recall that in November 1971, between Seattle and Reno, Cooper parachuted out of the back of an airliner he'd hijacked with a bag filled with $200,000 in stolen cash. He's never been found, though some of the stolen money was recovered. +More on Network World: FBI wants fresh set of eyes on DB Cooper mystery: Yours+ According to the FBI, the agency learned of the crime in-flight and opened an extensive investigation that lasted 45. Calling it NORJAK, for Northwest hijacking, the FBI interviewed hundreds of people, tracked leads across the nation, and scoured the aircraft for evidence. By the five-year anniversary of the hijacking, the agency had considered more than 800 suspects and eliminated all but two dozen from consideration. Over years the case has mostly grown cold.To read this article in full or to leave a comment, please click here

The CCIE Routing And Switching Written Exam Needs To Be Fixed

CCIERouting_and_Switching_UseLogoWR

I’m having a great time at Cisco Live this year talking to networking professionals about the state of things. Most are optimistic about where their jobs are going to fit in with networking and software and the new way of doing things. But there is an undercurrent of dissatisfaction with one of the most fundamental pieces of network training in the world. The discontent is palpable. From what I’ve heard around Las Vegas this week, it’s time to fix the CCIE Written Exam.

Whadda Ya Know?!?

The CCIE written is the bellwether of network training. It’s a chance for network engineers that use Cisco gear to prove they have what it takes to complete a difficult regimen of training to connect networks of impressive size. It’s also a rite of passage to show others that you know how to study, prep, and complete a difficult practical examination without losing your cool. But all that hard work starts with a written test.

The CCIE written has always been a tough test. It’s the only barrier to entry to the CCIE lab. Because the CCIE has never had prerequisites and likely never will due to long standing tradition, the only thing standing Continue reading

Microsoft launches new Skype for Linux and Chrome

Linux and Chromebook users now have new versions of Skype to play with.Microsoft launched an alpha version of a new client for Linux on Wednesday, in a push to get users of the open-source operating system to make video calls and send messages with Skype.There was a Linux client available for the service previously, but this launch is a move by the company to get users of the operating system on the latest version of Skype. Users will get a new interface, emoticons, and a file-sharing interface.Chrome users will be able to use web.skype.com to make calls from Google's web browser and desktop operating system starting Wednesday, too. Like the Linux client, the new Chrome client is still in alpha, so there are likely to be bugs, along with missing features.  To read this article in full or to leave a comment, please click here

Docker Datacenter @ DockerCon 2016: Image security, Engine 1.12 and Burning Man…

Interested in learning more about our plans for Docker in the Enterprise and getting involved in an upcoming Docker Datacenter beta? Let’s take a deeper look. On the second day of DockerCon, the keynote used different situations to discuss enterprise use of Docker. Our CEO Ben Golub broke down several fallacies in IT, CTO Keith Fulton of ADP painted a delicious picture of microservices as chicken nuggets, and Lily and I… well, we averted a massive security disaster and got our costumes ready for Burning Man.

Aside from shiny sequined jackets (not my normal wardrobe, I promise) and Ben’s enthusiastic “business guy” cameo, we presented a prototype of the next version of Docker Datacenter, our commercial solution for running containers-as-a-service (CaaS) in an on-premises or public cloud enterprise environment. Docker Datacenter is an integrated CaaS platform to securely ship, orchestrate and manage Dockerized apps and system resources. The sneak peek during the keynote shows a prototype UI and features. Some of the things you saw may change as we get to launch but what’s important are the capabilities we are bringing to the enterprise platform.

In the keynote presentation we demonstrated these enterprise use cases:

Microsoft launches ‘Surface as a Service’ lease program

Microsoft has announced a new enterprise program called "Surface as a Service," which is a nifty way of saying businesses can lease Surface devices that come with subscriptions to Office 365, Dynamics Azure and Windows 10.The company said this will allow customers to keep their hardware more current and up to date, since enterprises are not known for being bleeding edge when it comes to new hardware adoption.+ Also on Network World: Surface Books get major driver updates +Microsoft also expanded its list of Surface partners to include two IT heavyweights: IBM and Booz Allen Hamilton. Both firms sign on as Surface solution integrators. Microsoft already had secured HP and Dell, two companies it effectively competes with by selling Surface, as resellers last fall.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here