Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations have been infected with a backdoor in unpatched versions of JBoss that could be used at any moment to install ransomware such as Samsam. That's according to Cisco's Talos threat-intelligence organization, which on Friday announced that roughly 3.2 million machines worldwide are at risk. Many of those already infected run Follett's Destiny library-management software, which is used by K-12 schools worldwide.To read this article in full or to leave a comment, please click here

Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations have been infected with a backdoor in unpatched versions of JBoss that could be used at any moment to install ransomware such as Samsam. That's according to Cisco's Talos threat-intelligence organization, which on Friday announced that roughly 3.2 million machines worldwide are at risk. Many of those already infected run Follett's Destiny library-management software, which is used by K-12 schools worldwide.To read this article in full or to leave a comment, please click here

That man who ‘deleted his entire company’ with a line of code? It was a hoax

The owner of a Web hosting company who claimed to have erased his entire business from the Internet with a single script command appears to have made the whole thing up.Marco Marsala of Italy posted a cry for help on the popular Server Fault forum earlier this week, claiming he’d accidentally erased all the data on his servers including backups.“I run a small hosting provider with more or less 1,535 customers and I use Ansible to automate some operations to be run on all servers,” Marsala wrote. “Last night I accidentally ran, on all servers, a Bash script with a rm -rf {foo}/{bar} with those variables undefined due to a bug in the code above this line.To read this article in full or to leave a comment, please click here

Thanks, Obama: TV will never be the same, and consumers will love it

It’s fitting that President Obama launched a new initiative to open up TV set-top boxes to competition 20 years after the Telecommunications Act of 1996 because consumers are in for as radical a makeover of television today as they experienced with the transformation of telephone communications back then. This isn’t Kansas anymore!In the next few years, consumers’ expectations for TV will be radically different, and in a decade, today’s TV will look as antiquated as cordless phones and answering machines look today.Opening up the set-top box means much more than market competition to lower the price and break the stranglehold that cable companies have over equipment leases that tie consumers to their TV. It means set-top boxes can include other features, such as Google Cast (renamed from Chromecast) AppleTV, Amazon Prime or Roku.To read this article in full or to leave a comment, please click here

A new approach to detecting compromised credentials in real-time  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Last year the Federal Financial Institutions Examination Council (FFIEC) issued a statement to notify financial institutions about the growing trend of cyber attacks designed to steal online credentials. While this is certainly a big issue for banks and credit unions, concern about stolen credentials extends far beyond the financial services industry. Basically any organization with valuable data is at risk of an attack initiated with seemingly legitimate credentials.To read this article in full or to leave a comment, please click here

A new approach to detecting compromised credentials in real-time  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   Last year the Federal Financial Institutions Examination Council (FFIEC) issued a statement to notify financial institutions about the growing trend of cyber attacks designed to steal online credentials. While this is certainly a big issue for banks and credit unions, concern about stolen credentials extends far beyond the financial services industry. Basically any organization with valuable data is at risk of an attack initiated with seemingly legitimate credentials.To read this article in full or to leave a comment, please click here

MIT’s new bug finder uncovers flaws in Web apps in 64 seconds

Finding bugs in Web applications is an ongoing challenge, but a new tool from MIT exploits some of the idiosyncrasies in the Ruby on Rails programming framework to quickly uncover new ones.In tests on 50 popular Web applications written using Ruby on Rails, the system found 23 previously undiagnosed security flaws, and it took no more than 64 seconds to analyze any given program.Ruby on Rails is distinguished from other frameworks because it defines even its most basic operations in libraries. MIT's researchers took advantage of that fact by rewriting those libraries so that the operations defined in them describe their own behavior in a logical language.To read this article in full or to leave a comment, please click here

MIT’s new bug finder uncovers flaws in Web apps in 64 seconds

Finding bugs in Web applications is an ongoing challenge, but a new tool from MIT exploits some of the idiosyncrasies in the Ruby on Rails programming framework to quickly uncover new ones.In tests on 50 popular Web applications written using Ruby on Rails, the system found 23 previously undiagnosed security flaws, and it took no more than 64 seconds to analyze any given program.Ruby on Rails is distinguished from other frameworks because it defines even its most basic operations in libraries. MIT's researchers took advantage of that fact by rewriting those libraries so that the operations defined in them describe their own behavior in a logical language.To read this article in full or to leave a comment, please click here

Mitel’s acquisition of Polycom has game-changing potential in UC market

After months of speculation, Mitel finally pulled the trigger on acquiring Polycom for $1.96 billion.Competing in the unified communications (UC) market means having to butt heads with not just one, but two 800-pound gorillas named Cisco and Microsoft. The combined “MiPolycom” will be a much bigger, stronger, $2.5 billion revenue company—much more capable of competing with the big boys.Mitel’s acquisition of Polycom is a bit of an unusual situation. Polycom is bigger than Mitel in both revenue and market cap, but Mitel was able to secure a $1.05 billion loan from Bank of America and Merrill Lynch to complete the deal. Under the terms of the agreement, Polycom will continue to run as a separate business unit under Mitel and will retain its brand. Rich McBee, Mitel’s CEO, will be the CEO of the combined organization, which will be headquartered in Ottawa, Canada.To read this article in full or to leave a comment, please click here

Enterprise tablet wars: Galaxy TabPro S vs. Surface Pro 4

It was no surprise when Samsung unveiled its first tablet hybrid, the Galaxy TabPro S. However, the surprise came when Samsung announced it opted to equip the device with Windows 10 instead of Android. It was a smart move by Samsung, firmly placing the Galaxy TabPro S alongside the Microsoft Surface Pro 4. The Surface 4 is the most popular Windows 10 hybrid today, but that could change with Samsung's latest flagship device. But which device is the better enterprise option when you pit them head-to-head? Microsoft Microsoft’s Surface Pro 4 is the kind of device leading the trend toward detachable tablets, also called 2-in-1s. Many Windows 10 detachables are expected to be launched in 2016.To read this article in full or to leave a comment, please click here

House passes bill to limit FCC authority on net neutrality

The U.S. House of Representatives has approved a bill that would prohibit the Federal Communications Commission from regulating broadband pricing under its net neutrality rules.The No Rate Regulation of Broadband Internet Access Act would limit the FCC's authority over prices after the agency reclassified broadband as a regulated telecom service when it passed net neutrality rules in February 2015. The bill passed 241-173 Friday, with only five Democrats voting for it.To read this article in full or to leave a comment, please click here

House passes bill to limit FCC authority on net neutrality

The U.S. House of Representatives has approved a bill that would prohibit the Federal Communications Commission from regulating broadband pricing under its net neutrality rules.The No Rate Regulation of Broadband Internet Access Act would limit the FCC's authority over prices after the agency reclassified broadband as a regulated telecom service when it passed net neutrality rules in February 2015. The bill passed 241-173 Friday, with only five Democrats voting for it.To read this article in full or to leave a comment, please click here

Review; Algorithms in a Nutshell

algorithms-in-a-nutshellAlgorithms in a Nutshell
George T. Heineman, Gary Pollice, Stanley Selkow
O’Reilly Media

In the midst of the SDN craze (or haze, depending on your point of view), we often forget that all networks are, in the final analysis, driven by software. Every control plane ever developed or deployed is a software application running on top of a physical device. And every control plane, every queuing mechanism, every forwarding mechanism, and everything we work on in the networking field is based on some sort of algorithm. But what is an algorithm, really? What sorts of algorithms are there, and what are they used for? These are the questions this book specifically takes aim at answering.

The authors begin with a chapter discussing the concepts of algorithms; this chapter contains a really helpful section on the difference between the classes of algorithms available, such as greedy and Chapter 2 focuses on the math of algorithm performance, providing information on the difference between O(1), O(n), O(n log n), and many other expressions describing the feed at which algorithms operate. This is one of the most helpful and clearly explained sections in the book. The third chapter explains the building blocks of algorithms, specifically focusing on the conventions used in the book, and some challenges around measuring the performance and accuracy of any given algorithm.

Chapter 4 considers sorting algorithms, and chapter 5 search. These three kinds of algorithms probably cover 80-90% of all algorithm usage in real code. These three classes of algorithms actually provide the building blocks for many other kinds of algorithms. For instance, Shortest Path First (SPF) requires a sorted heap or list of nodes, edges, and reachable destinations in the network—but we have to sort a list to have a sorted list to use in SPF.

Chapter 6 jumps into material directly applicable to network engineering; here is where Dijkstra’s SPF algorithm is covered. This chapter will be extremely useful to network engineers to read and understand, even though the terminology is often different. Chapters 7, 9, and 11, on path finding in AI, computational geometry, and emerging algorithm categories, are interesting, but not all that useful for the average (or above average) network engineer.

Chapter 8 discusses network flow diagrams, which are a superset of many of the traffic engineering, service chaining, and queuing theory problems engineers face in real networks. Chapter 10 should be familiar to engineers who’ve looked at the m-way trees and treis used in packet switching.

Overall, this is really useful book for network engineers who want to dig deeper into the software roots of how network protocols and switching work. There are a few chapters that don’t directly apply to the common sets of problems network engineering involves, but readers won’t miss a lot skipping those sections if the overall length of the book seems like it’s too much.

The reading difficulty is moderate, and the time to read is pretty long (partially because of the many code examples and the depth of the concepts covered).

LinkedInTwitterGoogle+FacebookPinterest

The post Review; Algorithms in a Nutshell appeared first on 'net work.

INE & VIRL Webinar – Using INE, VIRL, & the Cloud for Large Scale CCIE Preparation

This coming Tuesday, April 19th 2016, at 09:00 PDT (17:00 UTC) I will be joining the VIRL team for a discussion and demo of using cloud hosted servers, VIRL, and INE material for CCIE preparation, with a focus on large topologies (30+ devices). The Webex signup link is here. The session will also be simulcast on live.ine.com.

Specifically in this session I will be covering:

  • How to deploy VIRL on cloud servers
  • Loading INE topology files into the VIRL cloud instance through GIT
  • Launching and managing multiple large topologies

Attendees will also have an opportunity to submit questions to me as well as the VIRL team.

Hope to see you there!

New Ninja desktops roar with Intel’s 72-core supercomputing chip

Colfax's new Ninja desktops are anything but invisible; these workstations can roar with the unprecedented computing power of Intel's latest 72-core supercomputing chips.The workstations have the upcoming Xeon Phi chip code-named Knights Landing, which Intel has claimed is its most powerful chip to date. Intel last year said a limited number of workstations with the chip would become available in 2016. Knights Landing wasn't designed with desktops in mind, but for some of the fastest supercomputers in the world. The 72-core chip can be used as a primary CPU, or as a coprocessor to rev up intense computing tasks, much like GPUs.To read this article in full or to leave a comment, please click here

Nvidia Lead Details Future Convergence of Supercomputing, Deep Learning

Deep learning could not have developed at the rapid pace it has over the last few years without companion work that has happened on the hardware side in high performance computing. While the applications and requirements for supercomputers versus neural network training are quite different (scalability, programming, etc.) without the rich base of GPU computing, high performance interconnect development, memory, storage, and other benefits from the HPC set, the boom around deep learning would be far quieter.

In the midst of this convergence, Marc Hamilton has watched advancements on the HPC side over the years, beginning in the mid-1990s

Nvidia Lead Details Future Convergence of Supercomputing, Deep Learning was written by Nicole Hemsoth at The Next Platform.

Stuff The Internet Says On Scalability For April 15th, 2016

Hey, it's HighScalability time:


What happens when Beyoncé meets eCommerce? Ring the alarm.

 

If you like this sort of Stuff then please consider offering your support on Patreon.
  • $14 billion: one day of purchases on Alibaba; 47 megawatts: Microsoft's new data center space for its MegaCloud; 50%: do not speak English on Facebook; 70-80%: of all Intel servers shipped will be deployed in large scale datacenters by 2025; 1024 TB: of storage for 3D imagery currently in Google Earth; $7: WeChat average revenue per user; 1 trillion: new trees; 

  • Quotable Quotes:
    • @PicardTips: Picard management tip: Know your audience. Display strength to Klingons, logic to Vulcans, and opportunity to Ferengi.
    • Mark Burgess: Microservices cannot be a panacea. What we see clearly from cities is that they can be semantically valuable, but they can be economically expensive, scaling with superlinear cost. 
    • ethanpil: I'm crying. Remember when messaging was built on open platforms and standards like XMPP and IRC? The golden year(s?) when Google Talk worked with AIM and anyone could choose whatever client they preferred?
    • @acmurthy: @raghurwi from @Microsoft talking about scaling Hadoop YARN to 100K+ clusters. Yes, 100,000 
    • @ryanbigg: Took Continue reading