Meet Cisco’s go-to guy on commercial drones

Cisco’s Biren Gandhi hasn’t played around with drones as much as he’d like to, but it looks as though he’s going to have lots of chances to do so given the company’s growing interest in these high-flying Internet of Things devices.  Cisco increasingly has made its presence felt within the commercial drone/unmanned aerial vehicle (UAV)/unmanned aircraft system (UAS) community, with Gandhi and others speaking at and attending industry conferences such as InterDrone (see video below) and NASA events. The company is also working with startups, carriers and others making up the burgeoning commercial drone ecosystem, and of course has been pushing hard into the broader Internet of Everything, such as through its $1.4B purchase of Jasper Technologies. Gandhi, a distinguished engineer & strategist within Cisco’s Corporate Strategic Innovation Group who early in his career worked as an R&D engineer at the Indian Space Research Organization, has also blogged about Cisco’s beliefs about drones over the past year.To read this article in full or to leave a comment, please click here

Coolest drone projects at big enterprise IT companies

High flying ideas Drone-related projects by enterprise IT and networking vendors are all over the map, which isn’t surprising since unmanned aerial vehicles (UAV) are so useful for flying from here to there. Here’s a whirlwind tour of commercial drone-related projects discussed publicly by familiar enterprise IT and networking vendors.RELATED: Commercial drones gaining altitude with enterprise IT vendorsTo read this article in full or to leave a comment, please click here

4 IT companies allowed to use commercial drones

The Federal Aviation Administration has granted approval for more than 5,000 so-called Section 333 exemptions to operate commercial drones over the past year, and among those getting the go ahead are familiar names in the enterprise IT and networking market. Apple, Microsoft, Motorola Solutions and Qualcomm are among those tech vendors we found in the approved petitions database, with stated operations/missions for commercial drones -- also known as unmanned aircraft systems (UAS) or unmanned aerial vehicles (UAV) -- that include  photography/videography, aerial mapping/surveying, research and development, and security.To read this article in full or to leave a comment, please click here

Commercial drones gaining altitude with top IT vendors

Google, Verizon and others are partnering with NASA on an Unmanned Aircraft System (UAS) traffic management scheme. Microsoft has been working with universities on drone-enabled mosquito traps in an effort to stall infectious diseases from spreading. Cisco has shown off drones whose cameras feed into the company’s collaboration technologies. And AT&T, IBM and Intel have all demonstrated advanced drone-based research.All of this activity by enterprise IT vendors in the commercial drone field is a far cry from what was being done -- or at least being publicly discussed -- back in late 2014, when our efforts to get such vendors to share their ambitions largely went unheeded. To read this article in full or to leave a comment, please click here

Commercial drones gaining altitude with top IT vendors

Google, Verizon and others are partnering with NASA on an Unmanned Aircraft System (UAS) traffic management scheme. Microsoft has been working with universities on drone-enabled mosquito traps in an effort to stall infectious diseases from spreading. Cisco has shown off drones whose cameras feed into the company’s collaboration technologies. And AT&T, IBM and Intel have all demonstrated advanced drone-based research.All of this activity by enterprise IT vendors in the commercial drone field is a far cry from what was being done -- or at least being publicly discussed -- back in late 2014, when our efforts to get such vendors to share their ambitions largely went unheeded. To read this article in full or to leave a comment, please click here

SDN is an Iteration that will Lead Innovations

I have stumbled upon a recent post from Greg Ferro on Ethrealmind, the post is titled SDN is not an innovation, it’s an iteration. I actually wanted to share this post because it kind of puts things into prespective. The word innovate refers to creating something that is new and disruptive. Innovations needs to come …

The post SDN is an Iteration that will Lead Innovations appeared first on Networkers-online.com.

Vulns are sparse, code is dense

The question posed by Bruce Schneier is whether vulnerabilities are "sparse" or "dense". If they are sparse, then finding and fixing them will improve things. If they are "dense", then all this work put into finding/disclosing/fixing them is really doing nothing to improve things.

I propose a third option: vulns are sparse, but code is dense.

In other words, we can secure specific things, like OpenSSL and Chrome, by researching the heck out of them, finding vulns, and patching them. The vulns in those projects are sparse.

But, the amount of code out there is enormous, considering all software in the world. And it changes fast -- adding new vulns faster than our feeble efforts at disclosing/fixing them.

So measured across all software, no, the secure community hasn't found any significant amount of bugs. But when looking at critical software, like OpenSSL and Chrome, I think we've made great strides forward.

More importantly, let's ignore the actual benefits/costs of fixing bugs for the moment. What all this effort has done is teach us about the nature of vulns. Critical software is written to day in a vastly more secure manner than it was in the 1980s, 1990s, or even the Continue reading

Software-Defined Security and VMware NSX Events

I’m presenting at two Data Center Interest Group Switzerland events organized by Gabi Gerber in Zurich in early June:

  • In the morning of June 7th we’ll talk about software-defined security, data center automation and open networking;
  • In the afternoon of the same day (so you can easily attend both events) we’ll talk about VMware NSX microsegmentation and real-life implementations.

I hope to see you in Zurich in a bit more than a month!

Sharepoint is going mobile this year with a new app

SharePoint is going mobile in a big way. Microsoft announced a new app for its content management and collaboration platform on Tuesday, which will give workers a way to access content from their smartphones and tablets on the go. The app, called SharePoint Mobile, will be coming to iOS by the end of June, and is one of dozens of new features for the platform that Microsoft announced alongside the general availability of SharePoint Server 2016. Other capabilities include redesigned team sites that make it easier to see relevant files that people are working on and a hybrid search functionality that works across cloud and on-premises versions of SharePoint.  To read this article in full or to leave a comment, please click here

Building a VMware-Formatted Cumulus VX Vagrant Box

In this post, I’m going to walk you through the process I used to build a Vagrant box for Cumulus VX that will work with VMware desktop hypervisors (like VMware Fusion or VMware Workstation). Although Cumulus Networks offers several different versions of Cumulus VX to download, they do not (strangely enough) offer a Vagrant box that will work with VMware’s desktop hypervisors.

If you’re not familiar with Cumulus VX, it’s a virtual appliance version of Cumulus Linux. This allows you to test Cumulus Linux without needing compatible network hardware. This is really handy for testing configuration management tools against Cumulus Linux, for testing complex topologies before you implement them in production, or just for getting a feel for how Cumulus Linux works.

Naturally, this sounds like a perfect fit to use with Vagrant, so if you’re interested—as I am/was—in running Cumulus VX with Vagrant using a VMware desktop hypervisor, then the process described below should get you all fixed up.

First, you’ll want to get a hold of the VMware version of Cumulus VX. Navigate over to the Cumulus VX download page (a free registration is required), and download the VMware version. This will download an OVA file. Don’t Continue reading

Microsoft’s Solair acquisition could expand its IoT services

Microsoft dove deeper into Internet of Things technology on Tuesday with the acquisition of Solair, an Italian company that operates a cloud-based IoT platform. According to a Microsoft blog post, Solair's technology will be used to upgrade the company's Azure IoT Suite, a collection of cloud services meant to help companies use the Internet of Things. Microsoft and Solair didn't disclose the financial terms of their deal. Solair's technology, which already uses Microsoft's Azure cloud services, offers IoT services focused on a variety of markets, including home automation, smart metering, remote maintenance and inventory management. To read this article in full or to leave a comment, please click here

Why automation is the key to the future of cyber security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. In 2015 there were 781 publicized cyber security breaches which resulted in more than 169 million personal records being exposed – a number that’s steadily on the rise year over year. And with notable names like BlueCross, Harvard and Target being tossed into the mix, it’s obvious that no company is safe. Yet, only 38% of organizations across the globe can confidently say they are prepared to handle a sophisticated cyber-attack. The numbers don’t lie. Cyber criminals are becoming savvier and their attacks are increasing faster than companies can keep up. Furthermore, it’s becoming increasingly evident that traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe. To address this glaring need, many forward-thinking IT executives are fortifying their cyber security strategy using automation as a tool for greater defense.To read this article in full or to leave a comment, please click here

Why automation is the key to the future of cyber security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. In 2015 there were 781 publicized cyber security breaches which resulted in more than 169 million personal records being exposed – a number that’s steadily on the rise year over year. And with notable names like BlueCross, Harvard and Target being tossed into the mix, it’s obvious that no company is safe. Yet, only 38% of organizations across the globe can confidently say they are prepared to handle a sophisticated cyber-attack. The numbers don’t lie. Cyber criminals are becoming savvier and their attacks are increasing faster than companies can keep up. Furthermore, it’s becoming increasingly evident that traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe. To address this glaring need, many forward-thinking IT executives are fortifying their cyber security strategy using automation as a tool for greater defense.To read this article in full or to leave a comment, please click here

Why automation is the key to the future of cyber security

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

In 2015 there were 781 publicized cyber security breaches which resulted in more than 169 million personal records being exposed – a number that’s steadily on the rise year over year. And with notable names like BlueCross, Harvard and Target being tossed into the mix, it’s obvious that no company is safe. Yet, only 38% of organizations across the globe can confidently say they are prepared to handle a sophisticated cyber-attack.

The numbers don’t lie. Cyber criminals are becoming savvier and their attacks are increasing faster than companies can keep up. Furthermore, it’s becoming increasingly evident that traditional methods, like anti-malware software, are no longer sufficient to keep sensitive data safe. To address this glaring need, many forward-thinking IT executives are fortifying their cyber security strategy using automation as a tool for greater defense.

To read this article in full or to leave a comment, please click here

The importance of situational awareness for network engineers

 

frustrated engineer

 

In another life, not too long ago, I spent a number of years in civilian and military law enforcement. When going through just about any kind of tactical training, one of the recurring themes they hammer into you is “situational awareness or SA.”

Wikipedia defines SA as:

Situational awareness or situation awareness (SA) is the perception of environmental elements with respect to time or space, the comprehension of their meaning, and the projection of their status after some variable has changed, such as time, or some other variable, such as a predetermined event. It is also a field of study concerned with understanding of the environment critical to decision-makers in complex, dynamic areas from aviation, air traffic control, ship navigation, power plant operations, military command and control, and emergency services such as fire fighting and policing; to more ordinary but nevertheless complex tasks such as driving an automobile or riding a bicycle.

Defining the need for SA in network engineering

It’s interesting to notice that critical infrastructure such as power plants and air traffic control are listed as disciplines that train in SA, however, I’ve never seen it taught in Continue reading

The importance of situational awareness for network engineers

 

frustrated engineer

 

In another life, not too long ago, I spent a number of years in civilian and military law enforcement. When going through just about any kind of tactical training, one of the recurring themes they hammer into you is “situational awareness or SA.”

Wikipedia defines SA as:

Situational awareness or situation awareness (SA) is the perception of environmental elements with respect to time or space, the comprehension of their meaning, and the projection of their status after some variable has changed, such as time, or some other variable, such as a predetermined event. It is also a field of study concerned with understanding of the environment critical to decision-makers in complex, dynamic areas from aviation, air traffic control, ship navigation, power plant operations, military command and control, and emergency services such as fire fighting and policing; to more ordinary but nevertheless complex tasks such as driving an automobile or riding a bicycle.

Defining the need for SA in network engineering

It’s interesting to notice that critical infrastructure such as power plants and air traffic control are listed as disciplines that train in SA, however, I’ve never seen it taught in Continue reading