Arista violated 3 Cisco patents: ITC

The International Trade Commission has made an initial determination that Arista Networks infringed on three Cisco patents in its switches, the latest development in a 13-month-old suit.The ITC said Arista violated patents associated with a central database for managing configuration data (SysDB) and private VLANs. As part of its 2014 suit alleging patent and copyright infringement, Cisco sought an injunction on Arista product from the ITC.To read this article in full or to leave a comment, please click here

Protecting IP or Market Share?

It's tough times on Tasman Drive.  Struggling to apply old technology to the new world of cloud computing, Cisco is potentially facing the largest loss of data center market share in its history.  We can understand why Cisco would take the battle from the marketplace to the courtroom.  What surprises us is the length that Cisco has gone to misrepresent our actions and the nature of the litigation in order to justify their assault.

Q&A: As prices fall, flash memory is eating the world

Western Digital in October announced plans to acquire SanDisk for some $19 billion in a deal that -- once finalized -- will marry leaders in the traditional hard drive and the emerging flash memory markets. Sumit Sadana, SanDisk's chief strategy officer and general manager of its Enterprise Solutions unit, spoke recently with IDG Chief Content Officer John Gallant to share insights on the merger and to explore the evolving role of flash in corporate data centers. What continues to hold enterprise back with flash? Just the price perception issue?Is the cloud a threat to your consumer device business? More and more, consumers use the cloud for photos or other things that they're saving. Is it such that the better the cloud opportunities get, the weaker the consumer opportunity gets?To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: Next frontier: Aquatic IoT

Underwater communications networks are excruciatingly slow, and that's hampering oil and gas exploration and scuba communications, among other businesses.The communications technology needs upgrading to more closely match high-speed, through-air radio networks, say experts.One answer may be to adapt software-defined radios and couple them with special underwater acoustic modems, according to electrical engineers at the University of Buffalo.Radio too slow Sound-waves—like those used by whales and dolphins—as opposed to radio-waves, are the best media for communicating underwater, the scientists say.Traditional radio methods don't work properly. The problem is that radio doesn't function well underwater. Commercial underwater modems are slow, and voice solutions are limited by distance and clarity, the scientists say.To read this article in full or to leave a comment, please click here

They are deadly serious about crypto backdoors

Julian Sanchez (@normative) has an article questioning whether the FBI is serious about pushing crypto backdoors, or whether this is all a ploy pressuring companies like Apple to give them access. I think they are serious -- deadly serious.

The reason they are only half-heartedly pushing backdoors at the moment is that they believe we, the opposition, aren't serious about the issue. After all, the 4rth Amendment says that a "warrant of probable cause" gives law enforcement unlimited power to invade our privacy. Since the constitution is on their side, only irrelevant hippies could ever disagree. There is no serious opposition to the proposition. It'll all work itself out in the FBI's favor eventually. Among the fascist class of politicians, like the Dianne Feinsteins and Lindsay Grahams of the world, belief in this principle is rock solid. They have absolutely no doubt.

But the opposition is deadly serious. By "deadly" I mean this is an issue we are willing to take up arms over. If congress were to pass a law outlawing strong crypto, I'd move to a non-extradition country, declare the revolution, and start working to bring down the government. You think the "Anonymous" hackers were bad, Continue reading

Is packet-sniffing illegal? (OmniCISA update)

In the news recently, Janet Napolitano (formerly head of DHS, now head of California's university system) had packet-sniffing software installed at the UC Berkeley campus to monitor all its traffic. This brings up the age old question: is such packet-sniffing legal, or a violation of wiretap laws.

Setting aside the legality question for the moment, I should first point out that's its perfectly normal. Almost all organizations use "packet-sniffers" to help manage their network. Almost all organizations have "intrusion detection systems" (IDS) that monitor network traffic looking for hacker attacks. Learning how to use packet-sniffers like "Wireshark" is part of every network engineer's training.

Indeed, while the news articles describes this as some special and nefarious plot by Napolitano, the reality is that it's probably just an upgrade of packet-sniffer systems that already exist.

Ironical, much packet-sniffing practice comes from UC Berkele. It's famous for having created "BPF", the eponymously named "Berkeley Packet Filter", a standard for packet-sniffing included in most computers. Whatever packet-sniffing system Berkeley purchased to eavesdrop on its networks is almost certainly including Berkeley's own BPF software.


Now for the legal question. Even if everyone is doing it, it doesn't necessarily mean it's legal. But the wiretap Continue reading

Worth Reading: Disaggregation at LinkedIn

Disaggregation has been on the top of my mind a good bit recently, partially because of our work at LinkedIn around this topic. Zaid has just posted a piece on the LinkedIn Engineering Blog about Project Falco, which is our internal disaggregation project for our data centers. Just a little taste to convince you to jump over there and read this one, because I think this sort of thing will have a major impact in the networking industry over the next three to five years.

Pigeon is a 3.2Tbps switching platform that can be used as a leaf or spine switch. Pigeon is our first foray into active switch software development. We are not venturing into developing our own switch because we aspire to become experts in the switching and routing space, but because we want control of our destiny. We continue to be supportive of our commercial vendors and work with them in a decoupling model.

LinkedInTwitterGoogle+FacebookPinterest

The post Worth Reading: Disaggregation at LinkedIn appeared first on 'net work.

Comcast targets first markets it will offer gigabit over copper cable service

Comcast announced today that Atlanta and Nashville would be its first two markets to offer DOCSIS 3.1 technology, in “early 2016,” and that Chicago, Detroit and Miami would join them in the second half of the year.DOCSIS 3.1 is a new wired cable Internet standard, which gives Comcast the ability to offer gigabit speeds over existing copper cable. The latest version of the standard uses smaller subcarrier channels that use considerably less bandwidth than those of DOCSIS 3.0, bonding those subchannels together for greater efficiency. The company said that it tested the technology last month in its home market of Philadelphia.+ALSO ON NETWORK WORLD: 'Big bets' cost Google parent Alphabet $3.6 billion in losses last year + Microsoft starts recommended update roll-out for Windows 10To read this article in full or to leave a comment, please click here

Sponsored Post: Netflix, Macmillan Learning, Aerospike, TrueSight Pulse, LaunchDarkly, Robinhood, StatusPage.io, Redis Labs, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • Manager - Site Reliability Engineering: Lead and grow the the front door SRE team in charge of keeping Netflix up and running. You are an expert of operational best practices and can work with stakeholders to positively move the needle on availability. Find details on the position here: https://jobs.netflix.com/jobs/398

  • Macmillan Learning, a premier e-learning institute, is looking for VP of DevOps to manage the DevOps teams based in New York and Austin. This is a very exciting team as the company is committed to fully transitioning to the Cloud, using a DevOps approach, with focus on CI/CD, and using technologies like Chef/Puppet/Docker, etc. Please apply here.

  • DevOps Engineer at Robinhood. We are looking for an Operations Engineer to take responsibility for our development and production environments deployed across multiple AWS regions. Top candidates will have several years experience as a Systems Administrator, Ops Engineer, or SRE at a massive scale. Please apply here.

  • Senior Service Reliability Engineer (SRE): Drive improvements to help reduce both time-to-detect and time-to-resolve while concurrently improving availability through service team engagement.  Ability to analyze and triage production issues on a web-scale system a plus. Find details on the position here: https://jobs. Continue reading

SDN shifts from configuration to analytics

Two SDN vendors have enhanced their offerings to improve visibility into virtual networks.Midokura this week unveiled an upgrade of its Midokura Enterprise MidoNet (MEM) network virtualization software to provide visibility into encapsulated traffic in OpenStack clouds. And Pluribus Networks rolled out software designed to provide an operational view of the data center network for insight into application performance and troubleshooting, and enhancing forensic analysis and security.To read this article in full or to leave a comment, please click here

Security flaws found in Fisher-Price smart teddy bear and kid’s GPS tracker watch

The Internet of Things increasingly includes “smart toys,” but no parent knowingly purchases a toy for their child that potentially risks the safety and privacy of their family. Those risks are caused by security flaws found in the Internet-connected toys. Unlike “dumb” toys, hackers could exploit “smart” toy vulnerabilities and potentially harvest a child’s name, birthdate, location and more.This time, Rapid7 revealed security flaws in Fisher-Price’s Smart Toy, an Internet-connected stuffed bear, and in the hereO GPS watch, a wearable location-tracking device.To read this article in full or to leave a comment, please click here

NASA’s big rocket will carry 13 cool tiny satellites

NASA today said the first voyage of its heavy-lift rocket will include 13 tiny satellites or cubesats that will conduct a variety of experiments from taking a closer look at the moon to evaluating space weather.NASA’s rocket – the Space Launch System (SLS) – along with an unmanned Orion spacecraft are expected to launch in 2018. The heart of the mission is to test the rockets but also to evaluate the Orion spacecraft which is the first spacecraft built for astronauts destined for deep space since NASA’s Apollo missions and ultimately is destined for deep space travel.More on Network World: Quick look: NASA Orion’s critical test missionTo read this article in full or to leave a comment, please click here

We Are Number Two!

Checklist

In my old IT life I once took a meeting with a networking company. They were trying to sell me on their hardware and get me to partner with them as a reseller. They were telling me how they were the number two switching vendor in the world by port count. I thought that was a pretty bold claim, especially when I didn’t remember seeing their switches at any of my deployments. When I challenged this assertion, I was told, “Well, we’re really big in Europe.” Before I could stop my mouth from working, I sarcastically replied, “So is David Hasselhoff.” Needless to say, we didn’t take this vendor on as a partner.

I tell this story often when I go to conferences and it gets laughs. As I think more and more about it the thought dawns on me that I have never really met the third best networking vendor in the market. We all know who number one is right now. Cisco has a huge market share and even though it has eroded somewhat in the past few years they still have a comfortable lead on their competitors. The step down into the next tier of Continue reading