Apple vs. the FBI: The legal arguments in a nutshell

Apple has raised some interesting, and potentially winning, legal arguments in its motion to overturn a judge’s order requiring the company to help the FBI unlock the iPhone of a mass shooter.The FBI's request for Apple to write new software to defeat password protections on the phone violates the company’s free speech and due process rights, Apple argued Thursday in its motion to vacate Magistrate Judge Sheri Pym’s Feb.16 order.To read this article in full or to leave a comment, please click here

Cloud security is good, but here’s how to make it better

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

More than a third of businesses in the United States currently use the cloud, but by 2020 that number is expected to more than double to a whopping 80%. But even though the cloud is secure, it doesn’t guarantee immunity from data breaches. Now that the cloud is rapidly becoming a mainstream part of IT, businesses must think more critically about how to bolster their security beyond cloud providers’ default security infrastructure—which often proves to be inadequate for the changing face of business.

To read this article in full or to leave a comment, please click here

Oscar ad finds Carrie Fisher, IBM Watson and robots dealing with humans

Apparently IBM’s Watson isn’t all that popular amongst the robot community – at least that’s how it looks in a new IBM commercial "Coping with Humans": A Support Group for Bots.”In the commercial Carrie Fisher (or Princess Leia of Star Wars fame) tries to guide a raft of disgruntled robots in a therapy session that apparently has had problems in the past – saying “maybe this week we might try and listen more – and throw things less.”It’s pretty funny, take a look. +More on Network World: NASA touts real technologies highlighted in 'The Martian' flick+ To read this article in full or to leave a comment, please click here

Oscar ad finds Carrie Fisher, IBM Watson and robots dealing with humans

Apparently IBM’s Watson isn’t all that popular amongst the robot community – at least that’s how it looks in a new IBM commercial "Coping with Humans": A Support Group for Bots.”In the commercial Carrie Fisher (or Princess Leia of Star Wars fame) tries to guide a raft of disgruntled robots in a therapy session that apparently has had problems in the past – saying “maybe this week we might try and listen more – and throw things less.”It’s pretty funny, take a look. +More on Network World: NASA touts real technologies highlighted in 'The Martian' flick+ To read this article in full or to leave a comment, please click here

Fixing the Internet’s routing security is urgent and requires collaboration

The Internet is fragile. Many of its protocols were designed at a time when the goal was rapid network expansion based on trust among operators. Today, the Internet's open nature is what makes it so great for business, education and communication, but the absence of security mechanisms at its core is something that criminals are eager to exploit.In late January, traffic to many IP (Internet Protocol) addresses of the U.S. Marine Corps was temporarily diverted through an ISP in Venezuela. According to Doug Madory, director of Internet analysis at Dyn, such routing leaks occur almost on a daily basis and while many of them are accidents, some are clearly attempts to hijack Internet traffic.To read this article in full or to leave a comment, please click here

PlexxiPulse—Powering Networks On a Global Scale

This week, we announced that Perseus selected Plexxi to deploy a next-generation network system to expand its service operations into 11 new major Asian markets and offer new services between 29 sites across the globe. By using our solutions, Perseus is able to supply low latency point-to-point and multipoint Ethernet services as well as global market data distribution in all of the world’s key emerging markets and financial liquidity centers.

Perseus came to us looking for a vendor to help improve its network’s geographic scale, simplicity, agility and service offering capabilities. Through Plexxi’s technology, the company found ways to reduce its network’s operational overhead, intense manual labor and complexity, while at the same time increasing and improving service delivery options for its customers. We’re proud that we were able to help Perseus find a solution that accommodated their requirements of today as well as those of the future. Interested in learning more about how we’re working together? Take a look at this blog post from our CEO Rich Napolitano.

Below please find a few of our top picks for our favorite news articles of the week.

Light Reading: Perseus Builds 75,000-Mile Global SDN Network
By Mitch Wagner
Perseus is deploying Continue reading

The Unabomber’s brother has written a book that I can’t wait to read

David Kaczynski has lived the unimaginable: His brother Ted, the Unabomber, did more than merely kill and maim those who were victims of his attacks, he exacted a terrible toll on his own family, as is always the case with those who commit evil acts.Now David Kaczynski has written a book -- Every Last Tie – that aspires to makes some sense of an otherwise senseless situation. From a review in the New Republic:To read this article in full or to leave a comment, please click here

Implenting Idempotency using HPE IMC

 

Try saying that five times fast.

 

What if those VLANS already exist?

There’s a concept called idempotency which can be loosely explained as

Make sure it’s like this. If it’s not like this, make it like this. If it’s already like this. Don’t do anything

Essentially, it’s a way to declare the desired configuration state of whatever it is you’re trying to configure. If the configuration state of that server, or switch or router is already in that state, than just leave it alone.

It’s a way to ensure that configuration drift doesn’t happen.

So if there’s some rabbid network administrator with a console cable running around laughing maniacly as they randomly changes things… this will help you keep them in check.

jack photo

 

Idempotent VLANs

So we’re going to look at the last example here where we did the following:

  • grabbed the jinja template for vlans directly from a GIThub repository
  • grabbed the desired vlans file directly from a GIThub repository
  • renderd the Jinja template using the values from the vlan file to get our final config
  • used the pyhpeimc library to push the commands through the executecmd RESTful API
 

Import Libraries

You know the drill here, Continue reading

Nexusguard deploys game-changing SDN tech to mitigate large-scale DDoS attacks  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  It's easier than ever for a malicious actor to launch a DDoS attack against practically any target in the world. Groups like Lizard Squad sell DDoS-as-a-Service for only a few dollars per hour. Some attackers won’t end their attacks until a Bitcoin ransom is paid. Consequently, there are now more attacks on more organizations worldwide than ever before. Akamai recently reported a year-over-year increase of 180% in the number of attacks it saw through its network.Not only are attacks becoming more frequent, they are getting larger, too. Some recent attacks have exceeded 200 million packets per second (Mpps). An event of this size is sufficient to bring down a tier 1 router, the kind often used by Internet Service Providers (ISPs).To read this article in full or to leave a comment, please click here

NexusGuard deploys game-changing SDN tech to mitigate large-scale DDoS attacks  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  It's easier than ever for a malicious actor to launch a DDoS attack against practically any target in the world. Groups like Lizard Squad sell DDoS-as-a-Service for only a few dollars per hour. Some attackers won’t end their attacks until a Bitcoin ransom is paid. Consequently, there are now more attacks on more organizations worldwide than ever before. Akamai recently reported a year-over-year increase of 180% in the number of attacks it saw through its network.Not only are attacks becoming more frequent, they are getting larger, too. Some recent attacks have exceeded 200 million packets per second (Mpps). An event of this size is sufficient to bring down a tier 1 router, the kind often used by Internet Service Providers (ISPs).To read this article in full or to leave a comment, please click here

FBI, keep out! How to encrypt everything

The FBI’s inability to crack a terrorist’s iPhone 5c shows the strong protection you can get for your private information on a mobile device. That same encryption is also available on your computer, at least in some cases.Given the increasing access to personal and corporate data sought by the U.S. government, as well as by other politicians, unscrupulous businesses, and criminal hackers, people should up their game on what they protect. Fortunately, it's not hard to do. (But be sure to back up your data before you encrypt your devices, in case a power failure occurs during the encryption process and makes your data unavailable.)To read this article in full or to leave a comment, please click here

ISIS group threatens Facebook and Twitter CEOs

Frustrated by social networks' efforts to keep them at bay, the terrorist group ISIS has made direct threats against the CEOs of Facebook and Twitter.In a 25-minute video dubbed "Flames of the Supporters" and posted on the Russian-based instant messaging service Telegram, the Sons Caliphate Army displayed photos of Facebook co-founder and CEO Mark Zuckerberg and Twitter CEO Jack Dorsey with digitally added bullet holes. Sons Caliphate Army is a purported hacking division of the Islamic State.To read this article in full or to leave a comment, please click here

The 5 biggest reveals from Apple’s motion to dismiss the FBI’s court order

On Thursday, Apple filed a motion to vacate the court order compelling the iPhone-maker to create a hackable version of iOS that the FBI can use to break into the iPhone of San Bernardino shooter Syed Farook.In the filing, Apple’s main argument is that its software is protected speech, and that the government asking the company to fabricate software that goes against its beliefs is a violation of its First and Fifth Amendment rights.+ Check out everyone's opinion on what Apple should do +To read this article in full or to leave a comment, please click here

Business leaders struggle with cloud, big data and IoT security

Call it the security conundrum.Business leaders are racing to adopt new IT systems like cloud computing, big data and Internet of things (IoT), and yet at the same time express mounting concerns about the security of sensitive information in those environments.A new survey of more than 1,000 enterprise leaders conducted by 451 Research on behalf of the security vendor Vormetric helps quantify the situation.[ Related: Cybersecurity much more than a compliance exercise ]To read this article in full or to leave a comment, please click here