Black hole detection

The Broadcom white paper, Black Hole Detection by BroadView™ Instrumentation Software, describes the challenge of detecting and isolating packet loss caused by inconsistent routing in leaf-spine fabrics. The diagram from the paper provides an example, packets from host H11 to H22 are being forwarded by ToR1 via Spine1 to ToR2 even though the route to H22 has been withdrawn from ToR2. Since ToR2 doesn't have a route to the host, it sends the packet back up to Spine 2, which will send the packet back to ToR2, causing the packet to bounce back and forth until the IP time to live (TTL) expires.

The white paper discusses how Broadcom ASICs can be programmed to detect blackholes based on packet paths, i.e. packets arriving at a ToR switch from a Spine switch should never be forwarded to another Spine switch.

This article will discuss how the industry standard sFlow instrumentation (also included in Broadcom based switches) can be used to provide fabric wide detection of black holes.

The diagram shows a simple test network built using Cumulus VX virtual machines to emulate a four switch leaf-spine fabric like the one described in the Broadcom white paper (this network is Continue reading

CyberChaff: HaLVM unikernels protecting corporate networks

Unikernel technologies, specifically the libraries, are applicable in many ways (e.g. the recent Docker for Mac and Windows products). However, unikernels themselves can enable new categories of products. One of the most prominent products is a network security tool called CyberChaff, based on open source HaLVM unikernels. Today Formaltech, a Galois subsidiary, revealed that Reed College is one of their happy CyberChaff users!

Defending a Network With CyberChaff

CyberChaff is designed to detect one of the early and critical steps in a security breach: the point when an attacker pivots from their initial entry point to the more juicy parts of the network. This step, the pivot, typically involves scanning the network for hosts that may be better positioned, appear to have more privileges, or are running critical services.

To impair this step of the attack, CyberChaff introduces hundreds (or thousands) of false, lightweight nodes on the network. These hosts are indistinguishable from real hosts when scanned by the attacker, and are each implemented as their own HaLVM unikernel. See the diagram below where green nodes are the real hosts and the orange nodes are HaLVM CyberChaff nodes. This means that an attacker is faced with a huge Continue reading

Publisher of LA Times and Chicago Tribune sends IT jobs overseas

Tribune Publishing Co., a major newspaper chain, is laying off as many as 200 IT employees as it shifts work overseas.The firm, which owns the Los Angeles Times, The Baltimore Sun, Chicago Tribune, Hartford Courant and many other media properties, told IT employees in early April that it's moving work to India-based Tata Consultancy Services.Interestingly, the Tribune IT employees were notified within weeks of a similar announcement involving IT employees at the McClatchy Company, another major newspaper chain.To read this article in full or to leave a comment, please click here

Microsoft and Amazon look to scoop up SAP workloads headed to the cloud

As SAP holds its annual Sapphire Now user conference in Orlando this week, two of the leading IaaS providers are making the case for running SAP apps on their public clouds.Microsoft CEO Satya Nadella joined SAP CEO Bill McDermott during the Sapphire keynotes on Tuesday to announce a broad partnership between the two companies that will optimize the Azure public cloud to run SAP workloads.Not to be outdone, early this morning before the keynote even kicked off Amazon Web Services issued a press release announcing a handful of customers – including General Electric, Brooks Brothers and Lionsgate are running SAP apps on its public cloud.To read this article in full or to leave a comment, please click here

John Deere is plowing IoT into its farm equipment

John Deere is taking the Internet of Things out into the field by developing new technologies and embracing existing ones to boost the efficiency of prepping, planting, feeding and harvesting with the goal of improving per-acre crop yields.+More on Network World: 10 Internet of Things companies to watch+ Ron ZinkTo read this article in full or to leave a comment, please click here

IDG Contributor Network: Paper to be an IoT-connected device

Regular paper, of the kind one writes and prints on, can be embedded with radio frequency tags, researchers say. That could ultimately allow internet connectivity.Not only could the internet paper be manufactured with tags added at the mill, but an end user could actually draw the tagged antennas on by hand using conductive ink in a school or the workplace.By responding to commands via gestures, the paper can be made to “do anything from controlling music using a paper baton to live polling in a classroom,” the University of Washington says in a press release.To read this article in full or to leave a comment, please click here

Microsoft is joining the tech cry for Britain to stay in the EU

Microsoft has come out against a proposal for the U.K. to leave the European Union, joining other tech giants that oppose the controversial measure.The so-called Brexit (Britain exit) referendum will ask U.K. voters on June 23 whether the country should leave the 28-state EU. Proponents say membership in the union has hurt Britain’s economy and opens the country up to too much immigration.Boris Johnson, London’s colorful former mayor, has compared the EU to Hitler. Polls suggest the vote may be tight.IBM, Cisco Systems, and Hewlett Packard Enterprise also oppose Brexit. As multinational companies, they often rely on flows of capital and employees across borders.To read this article in full or to leave a comment, please click here

New F5 software addresses the needs of an increasingly digital world

Digital has become the way. Look through any business publication or trade magazine, and you’ll see a plethora of articles about digital transformation. A digital business is highly dependent on the underlying infrastructure to enable new services that can give it a competitive advantage. The underlying technology not only needs to seamlessly deliver the services, but also provide the highest levels of security, orchestration capabilities and many other requirements unique to this era of business. + Also on Network World: Why 2015 was the year of the cloud, and 2016 will be too +To read this article in full or to leave a comment, please click here

SAP seeks to simplify IT with a beefier new version of Hana

SAP has updated its flagship Hana in-memory computing platform with a raft of new features designed to make IT simpler while giving organizations a better handle on their data.The updates, announced Tuesday at the company's annual Sapphire Now conference in Florida, include a new hybrid data management service in the cloud and a new version of the company's Hana Edge edition for SMBs."We’ve taken an already rock solid platform and further hardened security, enhanced availability, unified the development and administration experience, and expanded advanced analytic capabilities," Michael Eacrett, vice president of product management for SAP, wrote in a blog post detailing the new release.To read this article in full or to leave a comment, please click here

Thinking about side channel attacks

When Cyrus wanted to capture Babylon, he attacked the river that flows through the city, drying it out and then sending his army under the walls through the river entrance and exit points. In a similar way, the ventilator is a movie favorite, used in both Lord of the Rings and Star Wars, probably along with a thousand other movies and stories throughout time. What do rivers and ventilators have to do with network security?

Side channel attacks. Now I don’t know if the attacks described in these papers, or Cyrus’ attack through the Euphrates, are considered side channel, or just lateral, but either way: the most vulnerable point in your network is just where you assume you can’t be attacked, or that point where you haven’t thought through security. Two things I read this week reminded me of the importance of system level thinking when it comes to security.

security-netThe first explores the Network Time Protocol (NTP), beginning with the general security of the protocol. Security in a time protocol is particularly difficult, as the entire point of encryption is to use algorithms that take a lot of time for an attacker to calculate—and there’s probably some relationship between Continue reading

IBM Throws Weight Behind Phase Change Memory

There is no question that the memory hierarchy in systems is being busted wide open and that new persistent memory technology that can be byte addressable like DRAM or block addressable like storage are going to radically change the architecture of machines and the software that runs on them. Picking what memory might go mainstream is another story.

It has been decades since IBM made its own DRAM, but the company still has a keen interest in doing research and development on core processing and storage technologies and in integrating new devices with its Power-based systems.

To that end, IBM

IBM Throws Weight Behind Phase Change Memory was written by Timothy Prickett Morgan at The Next Platform.

FCC’s ‘relentless regulatory assault’ threatens cable industry

BOSTON -- The head of the leading cable trade group feels like the federal government is trying to pick winners and losers.Michael Powell, president and CEO of NCTA, the organization representing firms like Comcast and Cox in Washington, argues that federal regulators have been pursuing policies that would create a two-tier regulatory regime that favors Internet firms over the telecom providers that deliver broadband and cable access services."What I believe is most troubling is an emerging government view that the communication market is bifurcated and should be regulated differently -- Internet companies are nurtured and allowed to run free, but network providers are disparagingly labeled 'gatekeepers' that should be shackled," Powell said in a keynote address at NCTA's annual Internet and TV conference. "The implications of this world view go far beyond how it affects one industry."To read this article in full or to leave a comment, please click here

FCC’s ‘relentless regulatory assault’ threatens cable industry

BOSTON -- The head of the leading cable trade group feels like the federal government is trying to pick winners and losers.Michael Powell, president and CEO of NCTA, the organization representing firms like Comcast and Cox in Washington, argues that federal regulators have been pursuing policies that would create a two-tier regulatory regime that favors Internet firms over the telecom providers that deliver broadband and cable access services."What I believe is most troubling is an emerging government view that the communication market is bifurcated and should be regulated differently -- Internet companies are nurtured and allowed to run free, but network providers are disparagingly labeled 'gatekeepers' that should be shackled," Powell said in a keynote address at NCTA's annual Internet and TV conference. "The implications of this world view go far beyond how it affects one industry."To read this article in full or to leave a comment, please click here

iPhone 7 said to be ‘more complex’ than previous models

In a general sense, it appears that Apple's effort to double down on product secrecy is paying off. The fact is, it's already mid-May, and we truthfully don't know all that much about the iPhone 7. Sure, we've seen a few reports pass through the rumor mill, but many of those reports seemingly contradict one another, a situation that inevitably brings us back to square one.While it's widely assumed that the iPhone 7 will sport the same form factor as the iPhone 6s and won't be a blockbuster device, a new report out of Taiwan via CNBC intimates that Apple's next-gen iPhone may be more interesting than most people anticipate.To read this article in full or to leave a comment, please click here