Entropy, vacuums, and visibility…

In the vacuum of two network engineers arguing, there are non-existent ideal situations where networks are built, grow or shrink congruently, and never have bugs.  In perpetuity.  Forever and ever.  Amen. The Forces of Evil From the moment we conceive of a network and through the end of it’s life, there are numerous competing forces […]

The post Entropy, vacuums, and visibility… appeared first on Packet Pushers.

Feds find $2.8B in data center consolidation savings – watchdog says could do better

The massive federal data center consolidation effort has seen $2.8 billion in cost savings and a shuttering or merging of some 3,125 sites but issues remain, according to a report from the watchdogs at the Government Accountability Office.According to the GAO, the 24 agencies participating in the Federal Data Center Consolidation Initiative have collectively made progress on their data center closures efforts. As of November 2015, agencies identified a total of 10,584 data centers, of which they reported closing 3,125 through fiscal year 2015.+More on Network World: In the face of relenting network attacks and it seems that the government’s chief weapon for combatting the assault lacks some teeth+To read this article in full or to leave a comment, please click here

Feds find $2.8B in data center consolidation savings – watchdog says could do better

The massive federal data center consolidation effort has seen $2.8 billion in cost savings and a shuttering or merging of some 3,125 sites but issues remain, according to a report from the watchdogs at the Government Accountability Office.According to the GAO, the 24 agencies participating in the Federal Data Center Consolidation Initiative have collectively made progress on their data center closures efforts. As of November 2015, agencies identified a total of 10,584 data centers, of which they reported closing 3,125 through fiscal year 2015.+More on Network World: In the face of relenting network attacks and it seems that the government’s chief weapon for combatting the assault lacks some teeth+To read this article in full or to leave a comment, please click here

Hacking back will only get you in more trouble

The online theft of U.S. intellectual property (IP) by other nation states continues to be a big problem, a panel of experts agreed this week at the RSA conference in a session titled, “Responses to state-sponsored economic espionage.” That much is obvious – awareness of economic cyber espionage has reached the mainstream, with CBS-TV’s newsmagazine “60 Minutes” even doing a segment on it last month, labeling it, “the great brain robbery of America.” What to do about it is also a big problem. The panel agreed that the most tempting and instinctive response of “active defense” – more commonly known as “hacking back” – is not a good one.To read this article in full or to leave a comment, please click here

VMware CEO Gelsinger talks exec changes, Dell deal and his big security focus

At this week’s RSA Conference, VMware CEO Pat Gelsinger is positioning the company’s NSX network virtualization product as a tool for encrypting data in flight and at rest, in the public cloud or on premises.It’s an attempt to showcase NSX – one of the two major network virtualization platforms on the market along with Cisco’s Application Centric Infrastructure (ACI) – as not just enabling software-defined networking (SDN), but being a serious security tool as well.+MORE AT NETWORK WORLD: Why Martin Casado is leaving VMware | VIDEO: What you didn’t know about private cloud +To read this article in full or to leave a comment, please click here

Putting to rest 3 persistent SDN myths

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.What if your network was more than just a collection of hardware and cables strung together over the years to solve specific problems?  What if your network was agile enough to empower your business today and offer deep insight into the flow of information throughout your data center? What if this network could adapt to your changing business needs at the drop of a dime and help ensure no opportunity slips through the cracks?Sounds like a dream, but in fact its very much possible today.To read this article in full or to leave a comment, please click here

Putting to rest 3 persistent SDN myths

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

What if your network was more than just a collection of hardware and cables strung together over the years to solve specific problems?  What if your network was agile enough to empower your business today and offer deep insight into the flow of information throughout your data center? What if this network could adapt to your changing business needs at the drop of a dime and help ensure no opportunity slips through the cracks?

Sounds like a dream, but in fact its very much possible today.

To read this article in full or to leave a comment, please click here

US says cyber battle against ISIS will ‘black these guys out’

The U.S. is aggressively targeting ISIS in cyberspace, attempting to halt the group's ability to communicate electronically, Secretary of Defense Ash Carter said Thursday. His comments build on those from earlier this week when, for the first time, the Department of Defense admitted to an active offensive cyberspace mission. "There is no reason why these guys ought to be able to command and control their forces," Carter said Thursday morning at a Microsoft-sponsored event in Seattle. Drawing a parallel with the use of more conventional tools of warfare like missiles, Carter said the attacks are intended to hit the heart of ISIS operations.To read this article in full or to leave a comment, please click here

US defense secretary talks offensive cyber-weapons and bug-bounty

US Secretary of Defense Ashton Carter spoke last at the RSA conference after NSA Director Rogers and Attorney General Lynch because he was prepared for a more substantive dialog with the RSA Conference audience. He had real news to deliver, his opinion to share about encryption that is central to the FBI and Apple iPhone encryption dispute and innovation programs to pitch.Carter is a different sort of Washington bureaucrat. A PhD in medieval history and particle physics from Yale with a second PhD from Oxford who was a Harvard professor of world affairs and held high level Department of Defense (DoD) roles during the Clinton and Obama administrations.To read this article in full or to leave a comment, please click here

CCDE – Carrier Supporting Carrier

Introduction

In the previous post I showed some of the options two interconnect two AS so that a customer can buy a VPN in two different locations from two different SPs. There is another technology called Carrier Supporting Carrier or Carrier of Carriers. This technology is used when a customer buys a circuit from an SP, Internet service or L3 VPN and that SP uses another SP to carry their traffic between the locations. The SP connecting the customer is then the customer carrier and the SP providing the backbone is the backbone carrier. It is also possible to combine CSC with the Inter-AS options in the previous post, I will show an example of this being used in a real life network in the research world.

Carrier Supporting Carrier

CSC is a technology used to expand the reach of a SP by using another SP as transport. The concept is shown in the following diagram.

CSC-Overview
CSC-Overview

The customer carrier is providing a service to the customer. It can be an Internet service, MPLS switched or not or an MPLS L3 VPN. The CSC VPN service provides MPLS transport for the customer carrier. It is also sometimes referred to as Continue reading

RSA: Verizon details data breaches from pirates to pwned water district

In one case pirates – actual pirates – boarded cargo ships armed with a list of which shipping containers contained jewelry and went straight to them, stole the gems and left.In another, attackers took control of the mainframe at a water district, mixed sewage with the drinking water, boosted the chlorine to dangerous levels and stole customer information.These are two of 18 representative case studies in Verizon’s new Data Breach Digest, a compendium of anonymized customer investigations performed by the company’s Research, Investigations, Solutions and Knowledge (RISK) Team and released at RSA Conference 2016.+ NOT AT THE SHOW? Follow all the news from RSA 2016 +To read this article in full or to leave a comment, please click here

Asyncio Tarantool Queue, get in the queue

 

In this article, I’m going to pay specific attention to information processing via Tarantool queues. My colleagues have recently published several articles in Russian on the benefits of queues (Queue processing infrastructure on My World social network and Push messages in REST API by the example of Target Mail.Ru system). Today I’d like to add some info on queues describing the way we solved our tasks and telling more about our work with Tarantool Queue in Python and asyncio.

The task of notifying the entire user base