Why I switched back to Firefox

Remember when you ditched Firefox for Chrome and pinkie-swore you’d never go back? Yeah, me too. But recently I needed to test a web-based app in Firefox, so, with some hesitance, I took the plunge and installed it.To read this article in full or to leave a comment, please click here(Insider Story)

BMW’s vision for a world of connected cars

As you’re brushing your teeth in the morning you monitor a digital display mirror that shows all your relevant information for the day: Schedule of appointments, weather and battery levels of all your devices, including your phone and BMW i3 electric car in the garage.As you walk into your kitchen and turn on your coffee machine, that’s the cue your car has been waiting for to turn itself on and begin to warm up. Time to go: With a swipe on your touch-enabled car key, the vehicle detaches from its charging unit, pulls out of the garage and up to your front door. It’s already calculated the best route to your first appointment, taking into account traffic and weather.To read this article in full or to leave a comment, please click here

The future of auto safety is seat belts, airbags and network technology

The 1950s saw the introduction of automobile seat belts; in the 70s, airbags began showing up in cars. Electronic Stability Controlled rolled out in the late 80s, and the last decade has seen the deployment of radar and camera-based backup assist and blind-spot warning systems.Auto safety experts say network technology could be the next major car safety innovation. “Decades from now, it's likely we'll look back at this time period as one in which the historical arc of transportation safety considerably changed for the better, similar to the introduction of standards for seat belts, airbags, and electronic stability control technology," said David Freedman, administrator for the National High Transportation Safety Agency (NHTSA) in 2014.To read this article in full or to leave a comment, please click here

10 cool connected car features

Cool featuresImage by ThinkstockCars used to be just for driving. Today they’re equipped with Wi-Fi hotspots, self-parking technology and road hazard detection systems. Check out some of the coolest connected car features available today.RELATED: BMW’s vision for a world of connected cars To read this article in full or to leave a comment, please click here

New products of the week 5.23.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Zuznow “Red Fox” versionKey features: A frontend-as-a-Service (FaaS) platform, the new Zuznow “Red Fox” version automatically creates and maintains web and native apps for smartphones, tablets, desktops and laptops. Enterprises can build and deploy premium mobile apps in minutes – without coding – through a simple, three-step configuration wizard. More info.To read this article in full or to leave a comment, please click here

New products of the week 5.23.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Zuznow “Red Fox” versionKey features: A frontend-as-a-Service (FaaS) platform, the new Zuznow “Red Fox” version automatically creates and maintains web and native apps for smartphones, tablets, desktops and laptops. Enterprises can build and deploy premium mobile apps in minutes – without coding – through a simple, three-step configuration wizard. More info.To read this article in full or to leave a comment, please click here

Thoughts on Luminus Networks

Late last week, Cyrus Durgin from Luminus Networks published an article on SDx Central titled “The (R)evolution of Network Operations.” You may notice that my name is mentioned at the bottom of the article as someone who provided feedback. In this post, I’d like to share some thoughts—high-level and conceptual in nature—on network operations and Luminus Networks.

I was first introduced to Luminus Networks when I met its CEO, Kelly Wanser, at the Open Networking User Group (ONUG) meeting in New York City last November. We met again in the Denver area in late December, and Kelly gave me a preview of what Luminus was building. I must confess that I was immediately intrigued by what Kelly was describing. One key thing really jumped out at me: we need to treat the network as a system, not as a bunch of individual elements.

When it comes to network monitoring/management/operations, so many of the tools are focused on the individual elements that comprise a network: provisioning a switch, pushing configuration changes to a router or group of routers, polling counters from interfaces on switches, etc. While there’s nothing wrong with any of these things, it seems to me that there’s Continue reading

Docker Networking: macvlan bridge

Docker takes a slightly different approach with its network drivers, confusing new users which are familiar with general terms used by other virtualization products. If you are looking for a way to bridge the container into a physical network, you have come to the right place. You can connect the container into a physical Layer 2 network by using macvlan driver. If you are looking for a different network connection, refer to my docker network drivers post.

Before I begin, you should check some basics on what macvlan is, why it is a better alternative to a linux bridge and how it compares with ipvlan.

Important: As of Docker 1.11 macvlan network driver is part of Docker’s experimental build and is not available in the production release. You can find more info on how to use the experimental build here. If you are looking for a production ready solution to connected your container into a physical Layer 2 network, you should stick to pipework for the time being.

Last but not least, macvlan driver requires Linux Kernel 3.9 or greater. You can check your kernel version with uname -r. If you’re running RHEL (CentoOS, Continue reading

OpenNSL

Open Network Switch Layer (OpenNSL) is a library of network switch APIs that is openly available for programming Broadcom network switch silicon based platforms. These open APIs enable development of networking application software based on Broadcom network switch architecture based platforms.

The recent inclusion of the APIs needed to enable sFlow instrumentation in Broadcom hardware allows open source network operating systems such as OpenSwitch and Open Network Linux to implement the sFlow telemetry standard.

Kansas Heart Hospital hit with ransomware; attackers demand two ransoms

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday, and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital President Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant. He said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files—at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Kansas Heart Hospital hit with ransomware; attackers demand two ransoms

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday, and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital President Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant. He said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files—at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Kansas Heart Hospital hit with ransomware, paid, but attackers demanded 2nd ransom

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital president Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant; he said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files – at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Kansas Heart Hospital hit with ransomware, paid, but attackers demanded 2nd ransom

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital president Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant; he said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files – at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Boston BSides needs more space to grow

 The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.The conference this weekend at Microsoft’s New England Research and Development (NERD) Center in Cambridge, Mass., was full to capacity with about 400 people attending – the NERD limit, says Daniel Reich, one of the show’s organizers.He says the organizers had to turn away about 100 others who wanted to attend, and after reading surveys by attendees and comments on Twitter, they may be looking for a larger venue for next year.To read this article in full or to leave a comment, please click here

Boston BSides needs more space to grow

 The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.The conference this weekend at Microsoft’s New England Research and Development (NERD) Center in Cambridge, Mass., was full to capacity with about 400 people attending – the NERD limit, says Daniel Reich, one of the show’s organizers.He says the organizers had to turn away about 100 others who wanted to attend, and after reading surveys by attendees and comments on Twitter, they may be looking for a larger venue for next year.To read this article in full or to leave a comment, please click here

There’s finally reason to hope in the war against ransomware

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do.These options include both hardware and software approaches IT pros can take to defeat the malware, a group at this weekend’s Security BSides Boston conference was told.By looking at how several variants of ransomware work - CryptoLocker, CryptoWall, Locky, SamSam - researcher Weston Hecker found characteristics of their behavior that could be turned against them.One method goes after the droppers that first infect target machines in preparation for downloading the main malware payloads. Their purpose is to examine the machines for indications that it might be an inhospitable host and to eliminate the roadblocks if possible.To read this article in full or to leave a comment, please click here

There’s finally reason to hope in the war against ransomware

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do.These options include both hardware and software approaches IT pros can take to defeat the malware, a group at this weekend’s Security BSides Boston conference was told.By looking at how several variants of ransomware work - CryptoLocker, CryptoWall, Locky, SamSam - researcher Weston Hecker found characteristics of their behavior that could be turned against them.One method goes after the droppers that first infect target machines in preparation for downloading the main malware payloads. Their purpose is to examine the machines for indications that it might be an inhospitable host and to eliminate the roadblocks if possible.To read this article in full or to leave a comment, please click here

Mininet dashboard

Mininet Dashboard has been released on GitHub, https://github.com/sflow-rt/mininet-dashboard. Follow the steps in Mininet flow analytics to install sFlow-RT and configure sFlow instrumentation in Mininet.

The following steps install the dashboard and start sFlow-RT:
cd sflow-rt
./get-app.sh sflow-rt mininet-dashboard
./start.sh
The dashboard web interface shown in the screen shot should now be accessible. Run a test to see data in the dashboard. The following test created the results shown:
sudo mn --custom extras/sflow.py --link tc,bw=10 --topo tree,depth=2,fanout=2 --test iperf
The dashboard has three time series charts that update every second and show five minutes worth of data. From top to bottom, the charts are:
  1. Top Flows - Click on a peak in the chart to see the flows that were active at that time.
  2. Top Ports - Click on a peak in the chart to see the ingress ports that were active at that time.
  3. Topology Diameter - The diameter of the topology.
The dashboard application is easily modified to add additional metrics, generate events, or implement controls. For example, adding the following code to the end of the sflow-rt/app/mininet-dashboard/scripts/metrics.js file implements equivalent functionality to the large flow detection Python script described in Mininet flow analytics Continue reading

Stressed? Low energy? The answer is Thync

Stressed? Of course you are. Do you find it hard to chill without a drink or three in the evening? Yep, that’s pretty common when you’re dealing with the kind of pressures IT professionals are often under. And then what about when you get up in the morning? Are you low on energy? How about when it’s 2pm and you’re flagging and there’s the prospect of having to pull an all-nighter to roll out the new whatever-it-is you’re wrestling with? Do you turn to endless cups of coffee or, the gods forfend, do you down endless energy drinks until you have a caffeine high that makes you vibrate like a tuning fork? To read this article in full or to leave a comment, please click here