Maturing End-to-End Wi-Fi Service Monitoring

Aruba Networks introduced Clarity Live and Clarity Synthetic during their Atmosphere 2016 conference in March. These solutions usher in the beginning of end-to-end Wi-Fi service monitoring by both the infrastructure and client agents to provide Wi-Fi administrators with greater network visibility, proactive monitoring, and synthetic testing in order to minimize Wi-Fi service disruptions. Knowing is half the battle, and quickly narrowing scope and diagnosing problems is one problem the industry has faced since inception. 

Read the entire blog post on the Aruba Airheads Technology Blog.

Ransomware authors use the bitcoin blockchain to deliver encryption keys

Ransomware authors are using the bitcoin blockchain, which serves as the cryptocurrency's public transaction ledger, to deliver decryption keys to victims.The technique, which removes the burden of maintaining a reliable website-based infrastructure for cybercriminals, was observed in a recent version of the CTB-Locker ransomware that targets Web servers.CTB-Locker has targeted Windows computers for a long time, but a PHP-based variant capable of infecting websites first appeared in February, marking an interesting evolution of this ransomware threat.The decryption routine in the original PHP-based CTB-Locker version involved a script called access.php that served as a gateway to the attackers' back-end server. This gateway script was hosted on multiple hacked websites and was necessary to obtain the decryption key after victims made a payment.To read this article in full or to leave a comment, please click here

Ransomware authors use the bitcoin blockchain to deliver encryption keys

Ransomware authors are using the bitcoin blockchain, which serves as the cryptocurrency's public transaction ledger, to deliver decryption keys to victims.The technique, which removes the burden of maintaining a reliable website-based infrastructure for cybercriminals, was observed in a recent version of the CTB-Locker ransomware that targets Web servers.CTB-Locker has targeted Windows computers for a long time, but a PHP-based variant capable of infecting websites first appeared in February, marking an interesting evolution of this ransomware threat.The decryption routine in the original PHP-based CTB-Locker version involved a script called access.php that served as a gateway to the attackers' back-end server. This gateway script was hosted on multiple hacked websites and was necessary to obtain the decryption key after victims made a payment.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Marines launch cyberspace warfare group

The U.S. Marine Corps intends to protect its networks and communications with a new cyberspace operations team. Notably, the organization said its new unit will have an “offensive” element.“The Marine Corps is seeing the need for defense of its networks and communications,” a press release on the Marines Corps’ website explained. That will include “what can we do to hinder an enemy,” said Sgt. Brian Mueller, a digital network exploitation analyst with the new Marine Corps Cyberspace Warfare Group (MCCYWG), in the release. He is referring to the “offensive” element.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Marines launch cyberspace warfare group

The U.S. Marine Corps intends to protect its networks and communications with a new cyberspace operations team. Notably, the organization said its new unit will have an “offensive” element.“The Marine Corps is seeing the need for defense of its networks and communications,” a press release on the Marines Corps’ website explained. That will include “what can we do to hinder an enemy,” said Sgt. Brian Mueller, a digital network exploitation analyst with the new Marine Corps Cyberspace Warfare Group (MCCYWG), in the release. He is referring to the “offensive” element.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Marines launch cyberspace warfare group

The U.S. Marine Corps intends to protect its networks and communications with a new cyberspace operations team. Notably, the organization said its new unit will have an “offensive” element.“The Marine Corps is seeing the need for defense of its networks and communications,” a press release on the Marines Corps’ website explained. That will include “what can we do to hinder an enemy,” said Sgt. Brian Mueller, a digital network exploitation analyst with the new Marine Corps Cyberspace Warfare Group (MCCYWG), in the release. He is referring to the “offensive” element.To read this article in full or to leave a comment, please click here

Lack of confidence proving to be real killer for women in technology

A pair of studies released this week shed light on challenges  -- including career advancement and equal pay -- facing women in technology.Tech learning site Pluralsight and the nonprofit Women Who Code joined forces on an online survey of 1,500 women working in tech and have shared the results here.The biggest challenges facing those women surveyed involve things that are lacking: opportunities for advancement, role models, mentors and work-life balance.To read this article in full or to leave a comment, please click here

Internet of pants? This ultrathin thread could make your clothes part of the IoT

Your clothes could one day monitor your fitness levels or boost your smartphone reception thanks to a new technique that uses ultrathin electronic thread to embroider circuits into fabric.Measuring just 0.1 mm in diameter, the thread comprises seven filaments made of copper and silver. Using it, researchers at Ohio State University have found a way to embroider circuits into fabric with enough precision to integrate electronic components such as sensors and memory devices into clothing. Ultimately, such "e-textiles" could be used to create shirts that act as antennas, bandages that tell your doctor how well a wound is healing, or even caps that sense activity in the brain.To read this article in full or to leave a comment, please click here

More than 43,000 sign petition against U.S. encryption-breaking bill

More than 43,000 people have signed a petition against proposed U.S. legislation that would require tech companies to break into their users' encrypted data when ordered to by a judge.The proposal, from Senators Richard Burr and Dianne Feinstein, would require smartphone OS developers and other tech vendors to assist law enforcement agencies by breaking their own security measures.CREDO Action, a progressive activist group, launched a petition opposing the Compliance with Court Orders Act on Tuesday, and more than 43,000 people had signed it by early Thursday afternoon.To read this article in full or to leave a comment, please click here

More than 43,000 sign petition against U.S. encryption-breaking bill

More than 43,000 people have signed a petition against proposed U.S. legislation that would require tech companies to break into their users' encrypted data when ordered to by a judge.The proposal, from Senators Richard Burr and Dianne Feinstein, would require smartphone OS developers and other tech vendors to assist law enforcement agencies by breaking their own security measures.CREDO Action, a progressive activist group, launched a petition opposing the Compliance with Court Orders Act on Tuesday, and more than 43,000 people had signed it by early Thursday afternoon.To read this article in full or to leave a comment, please click here

Oracle Steps With Moore’s Law To Rev Exadata Database Machines

Absorbing a collection of new processing, memory, storage, and networking technologies in a fast fashion on a complex system is no easy task for any system maker or end user creating their own infrastructure, and it takes time even for a big company like Oracle to get all the pieces together and weld them together seamlessly. But the time it takes is getting smaller, and Oracle has absorbed a slew of new tech in its latest Exadata X6-2 platforms.

The updated machines are available only weeks after Intel launched its new “Broadwell” Xeon E5 v4 processors, which have been shipping

Oracle Steps With Moore’s Law To Rev Exadata Database Machines was written by Timothy Prickett Morgan at The Next Platform.

Cumulus, Dell, Red Hat Demo Linux as Full Stack SDDC

Cumulus Networks

Cumulus Networks announced today that in conjunction with Dell and Red Hat, it has created a 300+ node OpenStack pod using standard open source DevOps tools to manage the deployment from top to bottom (i.e. from the spine switch down to the compute node). I thought that was interesting enough to justify a quick post.

All Linux, All The Time

I visited with Cumulus Linux as part of Networking Field Day 9 and learned two very important things:

  1. Cumulus co-founder, CEO (at the time), and now CTO, JR Rivers makes a mean cup of espresso;
  2. The culture at Cumulus is all about standards. It was expressed repeatedly that Cumulus want to ensure that their linux is absolutely standard, so the file system hierarchy should be the standard, configuration files should be where they normally are, and so forth. A system that doesn’t follow those guidelines becomes a special snowflake that can’t be supported by regular tools and, as you’ll see, this attitude has paid dividends in this solution.

The idea of this software stack demo is to take linux-based switches (Dell brite-box Cumulus-certified hardware running the Cumulus Linux OS) and connect in linux-based compute resources (Dell PowerEdge servers running Continue reading

Cyberattack could knock out huge swath of US electric grid, lawmakers say

The U.S. government is not prepared for a cyberattack on the electrical grid that takes out power over a large area for weeks, or even months.A widespread, long-lasting power outage caused by a cyberattack may be unlikely, but the U.S. government needs to better plan for the possibility, Representative Lou Barletta, a Pennsylvania Republican, said Thursday.With some experts worried that a coordinated cyberattack could lead to widespread power outages lasting for several months, the federal government should offer more help to state and local governments planning to deal with the aftermath, Barletta said during a hearing before a subcommittee of the House of Representatives Transformation and Infrastructure Committee.To read this article in full or to leave a comment, please click here

Cyberattack could knock out huge swath of US electric grid, lawmakers say

The U.S. government is not prepared for a cyberattack on the electrical grid that takes out power over a large area for weeks, or even months.A widespread, long-lasting power outage caused by a cyberattack may be unlikely, but the U.S. government needs to better plan for the possibility, Representative Lou Barletta, a Pennsylvania Republican, said Thursday.With some experts worried that a coordinated cyberattack could lead to widespread power outages lasting for several months, the federal government should offer more help to state and local governments planning to deal with the aftermath, Barletta said during a hearing before a subcommittee of the House of Representatives Transformation and Infrastructure Committee.To read this article in full or to leave a comment, please click here

The complexity required for robustness, often goes against robustness

In the past few months we have seen major outages from United Airlines, the NYSE, and the Wall Street Journal. With almost 5,000 flights grounded, and NYSE halting trading the cost of failure is high. When bad things happen IT personal everywhere look at increasing fault tolerance by adding redundancy mechanisms or protocols to increase robustness. Unfortunately the complexity that comes with these additional layers often comes with compromise.

The last thing your boss wants to hear is, “The network is down!”. Obviously it’s your job to prevent that from happening, but at what cost? Many of us enjoy twisting those nerd knobs, but that tends to only harbor an environment with unique problems. I too fear the current trend of adding layer after layer of network duct tape to add robustness, or worse, to try and fix shortcomings in applications. NAT, PBR, GRE, VXLAN, OTV, LISP, SDN… where does it end!?

The greater the complexity of failover, the greater the risk of failure. We often forget the lessons of our mentors, but keeping the network as simple as possible has always been best practice. As Dijkstra said, “Simplicity is a great virtue but it requires hard work Continue reading

Brave Software’s browser is illegal, newspapers claim

The number of websites barring access to users of Adblock Plus has been growing as of late. The latest that I found is Listverse, an interesting site full of top 10 lists similar to Cracked.com but without the snark. It’s become the latest site I frequent that no longer displays its content if you have an ad blocker enabled. But at least it’s safer than Forbes.Still, denying you content is one thing, but threatening legal action is another. The Financial Times reports 17 members of the Newspaper Association of America (NAA) have sent a cease and desist letter to Brave Software and its founder, former Mozilla CEO Brendan Eich, over the company’s self-titled ad-blocking browser.To read this article in full or to leave a comment, please click here

Women in Computing group taps Princeton routing, SDN researcher as Athena Lecturer

Jennifer Rexford, a professor of engineering and Computer Science Department chair at Princeton University, has been named the 2016-17 Athena Lecturer by the Association for Computing Machinery’s Council on Women in Computing in honor of her contributions to computer science.The Princeton and University of Michigan grad was recognized for her work in improving Border Gateway Protocol (BGP) and for contributions that have paved the way for software-defined networks (SDNs). Before joining Princeton’s faculty, Rexford worked for AT&T Labs on Internet measurements and traffic engineering.To read this article in full or to leave a comment, please click here