Acer’s Windows 10 Switch hybrids priced to battle Chromebooks

Windows 10 PC prices have been slowly creeping up, but some new back-to-school Switch tablet/laptop hybrid devices from Acer may be attractive to those on a shoestring budget. The US$199 Switch One 10 is one of a few touchscreen hybrids priced under $200. Acer also announced the Switch V 10, which starts at $249 with additional features including a USB-Type C port, a fingerprint reader, 802.11ac Wi-Fi and a Gorilla Glass screen. The hybrids, also known as 2-in-1 devices, are 10-inch tablets that can be latched on to a keyboard dock to become a laptop. The new Switch devices are inexpensive Windows alternatives to Chromebooks, which are laptops with Google's Chrome OS. Acer sells Chromebooks starting at $179.99.To read this article in full or to leave a comment, please click here

EP06: Tech Lesson – Understanding Basic Network Traffic

In this episode of Rockstar SE Jacob Hess and Terry Kim discuss basic network traffic concepts. They break down topics such as collision domains and broadcast domains and how those concepts relate to network traffic and the world of network engineering. Join them in this Tech Lesson to learn more and don’t forget to download your free PDF!

Tech Lesson PDF: Understanding Basic Network Traffic

Continue reading

Docker Networking: macvlans with VLANs

If you have read my introduction to macvlans and tried the basic macvlan bridge mode network configuration you are aware that a single Docker host network interface can serve as a parent interface to one macvlan or ipvlan network only.

One macvlan, one Layer 2 domain and one subnet per physical interface, however, is a rather serious limitation in a modern virtualization solution. Fortunately, a Docker host sub-interface can serve as a parent interface for the macvlan network. This aligns perfectly with the Linux implementation of VLANs, where each VLAN on a 802.1Q trunk connection is terminated on a sub-interface of the physical interface. You can map each Docker host interface to a macvlan network, thus extending the Layer 2 domain from the VLAN into the macvlan network.

Multiple macvlans with VLANs configuration

Docker Macvlan Bridge on VLAN 802.1Q trunk

You have a Docker host with a single eth0 interface connected to a router. Connection between the router and the Docker host is configured as 802.1Q trunk on the router with VLAN 10 and VLAN 20.

Configure VLAN 10 and VLAN 20 on your router. Add the following IP addresses to the Layer 3 interface: 10.0.10.1/24 and 2001:db8:babe:10::1/64 for VLAN 10, 10. Continue reading

DARPA wants to find the vital limitations of machine learning

What are the fundamental limitations inherent in machine learning systems?That’s the central question of a potential new DARPA program known as the Fundamental Limits of Learning (Fun LoL) which according to the researchers will address how the quest for the ultimate learning machine can be measured and tracked in a systematic and principled way.+More on Network World: Not dead yet: 7 of the oldest federal IT systems still wheezing away+To read this article in full or to leave a comment, please click here

DARPA wants to find the vital limitations of machine learning

What are the fundamental limitations inherent in machine learning systems?That’s the central question of a potential new DARPA program known as the Fundamental Limits of Learning (Fun LoL) which according to the researchers will address how the quest for the ultimate learning machine can be measured and tracked in a systematic and principled way.+More on Network World: Not dead yet: 7 of the oldest federal IT systems still wheezing away+To read this article in full or to leave a comment, please click here

DARPA wants to find the vital limitations of machine learning

What are the fundamental limitations inherent in machine learning systems?That’s the central question of a potential new DARPA program known as the Fundamental Limits of Learning (Fun LoL) which according to the researchers will address how the quest for the ultimate learning machine can be measured and tracked in a systematic and principled way.+More on Network World: Not dead yet: 7 of the oldest federal IT systems still wheezing away+To read this article in full or to leave a comment, please click here

DELL OS10 – FIB Optimisation

Dell OS10 is an open network operating system ounces its open network operating system(NOS) called OS10. Here are my thoughts and reactions. Operating System OS10 is a open source linux for networking devices. The base operating system has limited features in the same way that Windows or Linux on x86 has limited features. You can purchase […]

The post DELL OS10 – FIB Optimisation appeared first on EtherealMind.

Juniper’s new access switches add to its cloud-focused lineup

Juniper Networks’ Unite architecture is living up to its name, bringing more enterprise network gear into its system for simplified management and scaling.The latest additions to the lineup are entry-level and midrange access switches that also include other features for ease of use.Unite, introduced last year for the EX9200 core switches and other Juniper and third-party components, is designed to help enterprises turn their own infrastructure into private clouds and link those to public clouds in a hybrid architecture. It’s built around Junos Fusion Enterprise software, which collapses multiple network layers into one for simpler management. That gives administrators a single point of management.To read this article in full or to leave a comment, please click here

Juniper’s new access switches add to its cloud-focused lineup

Juniper Networks’ Unite architecture is living up to its name, bringing more enterprise network gear into its system for simplified management and scaling.The latest additions to the lineup are entry-level and midrange access switches that also include other features for ease of use.Unite, introduced last year for the EX9200 core switches and other Juniper and third-party components, is designed to help enterprises turn their own infrastructure into private clouds and link those to public clouds in a hybrid architecture. It’s built around Junos Fusion Enterprise software, which collapses multiple network layers into one for simpler management. That gives administrators a single point of management.To read this article in full or to leave a comment, please click here

20% off iDevices iGrill2 Bluetooth Grill Thermometer – Deal Alert

The iGrill2, a Bluetooth Smart meat thermometer, aims to make grilling and smoking easier, more convenient, and smarter. The unit comes packaged with two probes, and can support up to four, making it possible to measure multiple areas at once with a min and max temp setting of -22 to 572-degrees fahrenheit. With a 150-foot range, the iGrill2 gives you the freedom to walk away and entertain your guests or watch the game while your grill or smoker cooks to perfection. It's compatible with iOS devices and most Bluetooth Smart Ready Android devices. The iDevices Connected app, powered by Bluetooth Smart technology, is the central hub for managing your iGrill. Monitor your temperature progression and get a more detailed view for each probe with customizable views that can be exported (because why not). The iGrill2 averages 4 out of 5 stars from over 550 customers (see reviews), and with this 20% off deal it's list price of $99.95 has been reduced to $79.96, just in time for Father's Day. See the discounted iGrill2 from iDevices on Amazon.To read this article in full or to leave a comment, please click here

Up to a dozen banks are reportedly investigating potential SWIFT breaches

More banks have reportedly launched investigations into potential security breaches on their networks after hackers stole US$81 million from the Bangladesh central bank earlier this year through rogue SWIFT transfers.Security firm FireEye, which was hired to investigate the Bangladesh bank attack, was also called in to look for possible compromises at up to 12 additional banks, Bloomberg reported Thursday, citing an unnamed source familiar with the investigations.Most of the banks are from Southeast Asia but include banks in the Philippines and New Zealand, Bloomberg reported.To read this article in full or to leave a comment, please click here

Euro agencies on encryption backdoors: Create ‘decryption without weakening’

The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to secure systems because of the collateral damage it would do to privacy and the security of communications.“While this would give investigators lawful access in the event of serious crimes or terrorist threats, it would also increase the attack surface for malicious abuse, which, consequently, would have much wider implications for society,” says a joint statement by European Police Office (Europol) and European Network and Information Security Agency (ENISA), which focuses on cyber security.To read this article in full or to leave a comment, please click here

Euro agencies on encryption backdoors: Create ‘decryption without weakening’

The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to secure systems because of the collateral damage it would do to privacy and the security of communications.“While this would give investigators lawful access in the event of serious crimes or terrorist threats, it would also increase the attack surface for malicious abuse, which, consequently, would have much wider implications for society,” says a joint statement by European Police Office (Europol) and European Network and Information Security Agency (ENISA), which focuses on cyber security.To read this article in full or to leave a comment, please click here