Moscow, Russia: CloudFlare’s 83rd data center

alt

Здравствуйте! ))) CloudFlare is excited to announce the newest addition to our network in the largest country in the world (by footprint), increasing both our data center and city count to 83. Moscow is not only the capital and largest city in Russia, it is also home to several Internet exchanges which CloudFlare now participates at: the Moscow Internet Exchange (MSK-IX), Data IX and Global IX (Eurasia Peering coming soon). This raises the number of exchanges that CloudFlare is a participant of to over 120, making us one of the top interconnected networks globally.

Здравствуйте! ))) Мы рады объявить о новом пополнении в нашей сети network в самой большой стране мира (по занимаемой площади), увеличивая как количество наших датацентров, так и количество городов на 83. Москва является не только столицей и самым крупным городом в России, но она также является домом для нескольких точек обмена интернет-трафиком. CloudFlare в настоящее время принимает участие в следующих: Moscow Internet Exchange (MSK-IX), Data IX и Global IX (Eurasia Peering на подходе). Это увеличивает количество точек обмена интернет-трафиком, в которых участвует CloudFlare до 120, тем самым продвигая нас на одну из лидирующих позиций наиболее взаимосвязаных сетей в мире.

Improving performance in Continue reading

Verizon blames ‘routing’ error for Baltimore 911 outage

Residents of Baltimore who dialed 911 were unable to reach emergency dispatchers for more than two hours Tuesday evening and Verizon is laying the blame on a call-routing error.From the Baltimore Sun: Officials at Verizon — the service provider for the city's 911 system — said the phone company received an automated alert at 7:48 p.m. reporting that 911 calls were failing. Verizon spokesman John O'Malley said the company eventually determined that emergency calls were mistakenly routed to an empty back-up call center in the city.To read this article in full or to leave a comment, please click here

Verizon blames ‘routing’ error for Baltimore 911 outage

Residents of Baltimore who dialed 911 were unable to reach emergency dispatchers for more than two hours Tuesday evening and Verizon is laying the blame on a call-routing error.From the Baltimore Sun: Officials at Verizon — the service provider for the city's 911 system — said the phone company received an automated alert at 7:48 p.m. reporting that 911 calls were failing. Verizon spokesman John O'Malley said the company eventually determined that emergency calls were mistakenly routed to an empty back-up call center in the city.To read this article in full or to leave a comment, please click here

26% off Patriot 128GB USB 3.0 Flash Drive With 150MB/Sec Speed – Deal Alert

This 128GB Supersonic Boost XT flash drive from Patriot is built to be fast and rugged.  It supports USB 3.0 and transfers data at speeds up of up to 150MG/Sec, making it ideal for large files. It's durable rubberized exterior helps protect against shock and provides water resistance, so it travels safely wherever you take it. The unit is plug and play, and supports most major operating systems, so you can count on ease of use as well. It currently averages 4.5 out of 5 stars on Amazon from over 700 people (73% rate it 5 stars: read reviews). With the current 26% discount, its regular list price of $44.40 has been reduced to $32.99. See the Supersonic Boost XT 128GB Flash drive on Amazon to learn more and review buying options.To read this article in full or to leave a comment, please click here

HPE shows off a computer intended to emulate the human brain

Intelligent computers that can make decisions like humans may someday​ be on Hewlett Packard Enterprise's product roadmap.The company has been showing off a prototype computer designed to emulate the way the brain makes calculations. It's based on a new architecture that could define how future computers work.The brain can be seen as an extremely power-efficient biological computer. Brains take in a lot of data related to sights, sounds and smell, which they have to process in parallel without lagging, in terms of computation speed.HPE's ultimate goal is to create computer chips that can compute quickly and make decisions based on probabilities and associations, much like how the brain operates. The chips will use learning models and algorithms to deliver approximate results that can be used in decision-making.To read this article in full or to leave a comment, please click here

DNS Cookies and DDoS Attacks

DDoS attacks, particularly for ransom—essentially, “give me some bitcoin, or we’ll attack your server(s) and bring you down,” seem to be on the rise. While ransom attacks rarely actually materialize, the threat of DDoS overall is very large, and very large scale. Financial institutions, content providers, and others regularly consume tens of gigabits of attack traffic in the normal course of operation. What can be done about stopping, or at least slowing down, these attacks?

To answer, this question, we need to start with some better idea of some of the common mechanisms used to build a DDoS attack. It’s often not effective to simply take over a bunch of computers and send traffic from them at full speed; the users, and the user’s providers, will often notice machine sending large amounts of traffic in this way. Instead, what the attacker needs is some sort of public server that can (and will) act as an amplifier. Sending this intermediate server should cause the server to send an order of a magnitude more traffic towards the attack target. Ideally, the server, or set of servers, will have almost unlimited bandwidth, and bandwidth utilization characteristics that will make the attack appear Continue reading

Why help desk jobs are going unfilled

Help desk jobs have long been seen as a stepping stone to other roles, but that perception is out of date. Today’s help desk professionals are taking on more complex work and they’re in high demand.To read this article in full or to leave a comment, please click here(Insider Story)

Microsoft starts clock ticking on Office 2016’s first upgrade

Microsoft this week released the second upgrade for Office 365 commercial subscribers on the slow train, and warned those still running the original Office 2016 applications that they have four more months before they will be required to update.Alongside a large number of Windows security updates issued Tuesday, Microsoft also released build 1602 of the Office apps to corporate Office 365 subscribers who hew to the "Deferred Channel" track.Deferred Channel is the slower of the two main release tracks Microsoft established for Office 365. (Until February, it was called "Current Branch for Business" to match the name of a slow release track for Windows 10.) Unlike the faster "Current Channel" (CC), which boasts monthly updates to the Office 2016 applications -- Word, Outlook, Excel and the like -- Deferred Channel (DC) only provides updates every four months.To read this article in full or to leave a comment, please click here

EVPN – Single-active redundancy

In the previous 2 posts I looked at the basics of EVPN including the new BGP based control-plane, later I looked at the integration between the layer-2 and layer-3 worlds within EVPN. However – all the previous examples were shown with basic single site networks with no link or device redundancy, this this post I’m going to look at the first and simplest EVPN redundancy mode.

First – consider the new lab topology:

Capture4

The topology and configuration remains pretty much the same, except that MX-1 and MX-2 each connect back to EX4200-1, for VLAN 100 and VLAN 101, with the same IRB interfaces present on each MX router, essentially a very basic site with 2 PEs for redundancy.

Let’s recap the EVPN configuration on each MX1, I’ve got the exact same configuration loaded on MX-2 and MX-3, the only differences being the interface numbers and a unique RD for each site.

MX-1: 

  1. tim@MX5-1> show configuration routing-instances
  2. EVPN-100 {
  3.     instance-type virtual-switch;
  4.     route-distinguisher 1.1.1.1:100;
  5.     vrf-target target:100:100;
  6.     protocols {
  7.         evpn {
  8.             extended-vlan-list 100-101;
  9.             default-gateway do-not-advertise;

IDG Contributor Network: Smartphones not productive, managers say

Despite the hype of business chat messaging and a perception of smartphones introducing a connected work-everywhere lifestyle, a surprisingly large number of bosses are not at all happy with the proliferation of the devices.The honchos say mobile devices are killing productivity, according to employment firm CareerBuilder research. The problem appears to stem from the fact that employees are indeed using smartphones at work—just not for work.That the majority of workers with smartphones (65 percent) don’t have work email setup on the devices is one issue, the CareerBuilder study found.To read this article in full or to leave a comment, please click here

Google revs its AI engines with a new European research group

Google has made no secret of its AI ambitions, and on Thursday it announced the next step in its bold plans to realize them: a brand-new research group in Europe focused squarely on machine learning.Based in Google Research offices in Zurich, Switzerland, the new group will focus on three key areas of artificial intelligence: machine intelligence, machine perception, and natural language processing and understanding, according to a blog post by Emmanuel Mogenet, head of Google Research for Europe.To read this article in full or to leave a comment, please click here

Flaws expose Cisco small-business routers, firewalls to hacking

Three models of Cisco wireless VPN firewalls and routers from the small business RV series contain a critical unpatched vulnerability that attackers can exploit remotely to take control of devices. The vulnerability is located in the Web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router. It can be easily exploited if the affected devices are configured for remote management since attackers only need to send an unauthenticated HTTP request with custom user data. This will result in remote code execution as root, the highest privileged account on the system, and can lead to a complete compromise.To read this article in full or to leave a comment, please click here

Flaws expose Cisco small-business routers, firewalls to hacking

Three models of Cisco wireless VPN firewalls and routers from the small business RV series contain a critical unpatched vulnerability that attackers can exploit remotely to take control of devices. The vulnerability is located in the Web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router. It can be easily exploited if the affected devices are configured for remote management since attackers only need to send an unauthenticated HTTP request with custom user data. This will result in remote code execution as root, the highest privileged account on the system, and can lead to a complete compromise.To read this article in full or to leave a comment, please click here

Flaws expose Cisco small-business routers, firewalls to hacking

Three models of Cisco wireless VPN firewalls and routers from the small business RV series contain a critical unpatched vulnerability that attackers can exploit remotely to take control of devices. The vulnerability is located in the Web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router and RV215W Wireless-N VPN Router. It can be easily exploited if the affected devices are configured for remote management since attackers only need to send an unauthenticated HTTP request with custom user data. This will result in remote code execution as root, the highest privileged account on the system, and can lead to a complete compromise.To read this article in full or to leave a comment, please click here