Nvidia chief downplays challenge from Google’s AI chip

Nvidia has staked a big chunk of its future on supplying powerful graphics chips used for artificial intelligence, so it wasn't a great day for the company when Google announced two weeks ago that it had built its own AI chip for use in its data centers.Google's Tensor Processing Unit, or TPU, was built specifically for deep learning, a branch of AI through which software trains itself to get better at deciphering the world around it, so it can recognize objects or understand spoken language, for example.To read this article in full or to leave a comment, please click here

Flaw in popular WordPress plug-in Jetpack puts over a million websites at risk

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks.Jetpack is a popular plug-in that offers free website optimization, management and security features. It was developed by Automattic, the company behind WordPress.com and the WordPress open-source project, and has over 1 million active installations.Researchers from Web security firm Sucuri have found a stored cross-site scripting (XSS) vulnerability that affects all Jetpack releases since 2012, starting with version 2.0.The issue is located in the Shortcode Embeds Jetpack module which allows users to embed external videos, images, documents, tweets and other resources into their content. It can be easily exploited to inject malicious JavaScript code into comments.To read this article in full or to leave a comment, please click here

Flaw in popular WordPress plug-in Jetpack puts over a million websites at risk

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks.Jetpack is a popular plug-in that offers free website optimization, management and security features. It was developed by Automattic, the company behind WordPress.com and the WordPress open-source project, and has over 1 million active installations.Researchers from Web security firm Sucuri have found a stored cross-site scripting (XSS) vulnerability that affects all Jetpack releases since 2012, starting with version 2.0.The issue is located in the Shortcode Embeds Jetpack module which allows users to embed external videos, images, documents, tweets and other resources into their content. It can be easily exploited to inject malicious JavaScript code into comments.To read this article in full or to leave a comment, please click here

New products of the week 5.30.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Actiance Platform for the healthcare and pharmaceutical industriesKey features: The Actiance Platform addresses communications challenges for healthcare and pharmaceutical organizations in the midst of changing regulations by ensuring companies meet industry-specific data retention and security requirements. With the Actiance Platform for the healthcare and pharmaceutical industries, organizations can embrace new communications channels while protecting data and ensuring compliance. More info.To read this article in full or to leave a comment, please click here

New products of the week 5.30.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Actiance Platform for the healthcare and pharmaceutical industriesKey features: The Actiance Platform addresses communications challenges for healthcare and pharmaceutical organizations in the midst of changing regulations by ensuring companies meet industry-specific data retention and security requirements. With the Actiance Platform for the healthcare and pharmaceutical industries, organizations can embrace new communications channels while protecting data and ensuring compliance. More info.To read this article in full or to leave a comment, please click here

Strain relief

I’ve got a problem with sagging cables, and I’ve got a simple solution. Examine the side-by-side images below which show the same fiber connection between a switch and a firewall. The image on the left shows a sagging cable which crosses in front of the switch in the rack unit just below it.
As you may know, this cabling install is a violation of the 167th rule of networking:

Thou shalt contain your cables to your own rack unit and shalt not, under any circumstances, impede access to other rack units or blades.


SnipImageThe image on the right ticks the box for me. There’s no room for a dedicated 1RU horizontal cable manager, but there is room for a zero-RU strain relief bar (as seen below). The result is a relatively neat cabling job. It’s no work of art, but it’s functional.
strain relief barA strain-relief bar is a cheap metal bar that you can bolt on when you rack-mount your switch. It allows you to velcro your fiber patches to the bar, taking the strain to help prevent breaks and preventing the dreaded cable droop. You should, of course, take care to ensure you don’t block access to any field-replaceable units, cards or ports on your network device.
The strain-relief bar Continue reading

Building a L2 Fabric on top of VXLAN: Arista or Cisco?

One of my readers working as an enterprise data center architect sent me this question:

I've just finished a one-week POC with Arista. For fabric provisioning and automation, we were introduced to CloudVision. My impression is that there are still a lot of manual processes when using CloudVision.

Arista initially focused on DIY people and those people loved the tools Arista EOS gave them: Linux on the box, programmability, APIs… However

Read more ...

Iran orders messaging apps to store data of local users in the country

Iran has ordered foreign messaging apps to transfer data and activity records of Iranian users to local servers within a year, a move that will give the country a greater ability to monitor and censor the online activity of its people.The country’s Supreme Council of Cyberspace has issued instructions to foreign messaging companies active in the country, requiring them “to transfer all data and activity linked to Iranian citizens into the country in order to ensure their continued activity," news reports said quoting state-run media.Social media platforms such as Twitter and Facebook are already blocked in the country whose government holds a tight control over Internet access by its people.To read this article in full or to leave a comment, please click here

Iran orders messaging apps to store data of local users in the country

Iran has ordered foreign messaging apps to transfer data and activity records of Iranian users to local servers within a year, a move that will give the country a greater ability to monitor and censor the online activity of its people.The country’s Supreme Council of Cyberspace has issued instructions to foreign messaging companies active in the country, requiring them “to transfer all data and activity linked to Iranian citizens into the country in order to ensure their continued activity," news reports said quoting state-run media.Social media platforms such as Twitter and Facebook are already blocked in the country whose government holds a tight control over Internet access by its people.To read this article in full or to leave a comment, please click here

Doing a ‘full scan’ of the Internet right now

So I'm doing a "full" scan of the Internet, all TCP ports 0-65535 on all addresses. This explains the odd stuff you see from 209.126.230.7x.


I'm scanning at only 125kpps from 4 source IP addresses, or roughly 30kpps from each source address. This is so that I'll get below many thresholds for IDSs, which trigger when they see fast scans from a single address. The issue isn't to avoid detection, but to avoid generating work for people who get unnecessarily paranoid about the noise they see in their IDS logs.

This scan won't finish at this speed, of course, it won't get even close. Technically, it'd take 50 years to complete at this rate.

The point isn't create a comprehensive scan, but to do sampling scan. I'll let it run a week like this, which will get 0.1% of the Internet, and then stop the scan.

What am I looking for? I don't know. I'm just doing something weird in order to see what happens. With that said, I am testing any port I connect to with Heartbleed. This should give us an estimation of how many Internet-of-Things devices are still vulnerable to that bug. I'm Continue reading

Microsoft CEO Satya Nadella follows Apple’s Tim Cook to India

Microsoft’s CEO Satya Nadella is visiting India, reflecting the growing importance of the country as a market for multinational technology companies. Nadella’s visit follows the first trip to India by Apple CEO Tim Cook, who visited the country this month to drum up support for the company’s plans to offer refurbished iPhones in the price-sensitive market as well as to get permission to set up its wholly-owned stores in the country. Both deals appear to have been blocked by regulators, according to reports. While Apple was largely seen as lacking focus on India until recently, when its China revenue fell 11 percent, while iPhone sales in India grew 56 percent year-on-year in the last quarter, Microsoft has been a long-time player in the Indian market.To read this article in full or to leave a comment, please click here

31 – Multiple approaches interconnecting VXLAN Fabrics

As discussed in previous articles, VXLAN data plane encapsulation in conjunction with its control plane MP-BGP AF EVPN is becoming the foremost technology to support the modern network Fabric.

It is therefore interesting to clarify how to interconnect multiple VXLAN/EVPN fabrics geographically dispersed across different locations.

Three approaches can be considered:

 The 1st option is the extension of multiple sites as one large single stretched VXLAN Fabric. There is no network overlay boundary per se, nor VLAN hand-off at the interconnection, which simplifies operations. This option is also known as geographically dispersed VXLAN Multiple PoD. However we should not consider this solution as a DCI solution as there is no demarcation, nor separation between locations. Nonetheless this one is very interesting for its simplicity and flexibility. Consequently we have deeply tested and validated this design.

  • The second option to consider is multiple VXLAN/EVPN-based Fabrics interconnected using a DCI Layer 2 and layer 3 extension. Each greenfield DC located on different site is deployed as an independent fabric, increasing autonomy of each site and enforce global resiliency. This is often called Multisite. A Data Center Interconnect technology (OTV, VPLS, PBB-EVPN, or even VXLAN/EVPN) is therefore used to extend Layer 2 and Layer Continue reading

Experimental Docker with Docker machine

Docker Experimental channel is used to release experimental Docker features so that Docker users can try the new features and provide feedback.  It is nice to use the experimental Docker in a test environment rather than upgrading Docker in the main development machine. The preferred approach is to use docker-machine and create a VM with experimental Docker. … Continue reading Experimental Docker with Docker machine

FBI raids home of researcher who reported unsecured patient data on a public server

What does a security researcher get for responsibly disclosing a dental database vulnerability that is exposing the sensitive information of tens of thousands of patients? Not a bug bounty monetary reward. Not even a “thank you” from the company. He gets raided by a least a dozen armed FBI agents and may be charged under Computer Fraud and Abuse Act (CFAA).Justin Shafer, who is described as a 36-year-old security researcher and dental computer technician, reported a vulnerability in Eaglesoft practice management software to the manufacturer Patterson Dental back in February.To read this article in full or to leave a comment, please click here

FBI raids home of researcher who reported unsecured patient data on a public server

What does a security researcher get for responsibly disclosing a dental database vulnerability that is exposing the sensitive information of tens of thousands of patients? Not a bug bounty monetary reward. Not even a “thank you” from the company. He gets raided by a least a dozen armed FBI agents and may be charged under Computer Fraud and Abuse Act (CFAA).Justin Shafer, who is described as a 36-year-old security researcher and dental computer technician, reported a vulnerability in Eaglesoft practice management software to the manufacturer Patterson Dental back in February.To read this article in full or to leave a comment, please click here