SDxCentral Weekly News Roundup — January 29, 2016

sdxcentral-news-roundup-january-29-2016 Phew! It was a busy week in the realm of software defined networking (SDN) and network functions virtualization (NFV).  Here’s a final roundup: Microsoft launched a technical preview of Azure Stack, software for running a private, on-premises cloud. This opens the possibility of running a hybrid cloud where the public and private halves both run on... Read more →

Welcome 2016 Cisco Champions!

With a good amount of surprise I’ve been nominated Cisco Champion for 2016: Because of your impactful and valuable contributions to the IT community, you have been chosen out of hundreds of nominees to be part of the 2016 Cisco Champion program. Congratulations! Cisco Champion resources Communities Twitter list

Encryption bills pose challenges for Congress

Breaking encryption technology used by terrorists and criminals poses a frustrating dilemma for intelligence agencies and, most recently, congressional lawmakers.Bipartisan legislation to create a commission to study U.S. encryption policies and practices is still weeks away from being introduced as discussions continue, congressional aides familiar with the plan told Computerworld.The commission approach, backed by Sen. Mark Warner (D-Va.) and House Homeland Security Committee Chairman Michael McCaul, (R-Texas) is intended to bring experts together to dive into the differing points of view, where tech companies want to protect privacy with encryption, while the FBI and other law enforcement agencies want to prevent acts of terrorism and crime by monitoring encrypted communications.To read this article in full or to leave a comment, please click here

25 Valentine’s Day gifts for your favorite geeks

Think differentImage by Steve SauerFlowers, jewelry, candy – we've found geeky versions of today's go-to Valentine's Day gifts for sweethearts who dig science, math and technology.MORE IDEAS: Check out our Valentine’s Day gift guides from 2015, 2014, 2013 and 2012To read this article in full or to leave a comment, please click here

PlexxiPulse—BOSNOG Event

This week, Plexxi co-founder Dave Husak hosted interactive discussion on the evolving role of network administrators, the future of cloud environments and bringing order to the chaos of software-defined networking, at a BOSNOG (Boston Network Operators Group) event. Dave and the team enjoyed connecting with other networking professionals in the area and listening to other viewpoints on the future of the network. Take a look at a few photos from the event below and keep an eye on the blog and Twitter for updates on future events.

Dave

dave2

Photo credit: Ethan Banks

Below please find a few of our top picks for our favorite news articles of the week.

ESG Global: Plexxi Draws Google’s Attention – and Money
By Steve Duplessie
Plexxi is one of those “intelligent infrastructure” companies I’ve been harping about as of late. And by intelligent, in this case I mean a network that can self-actualize and alter its very being based on real-time application and usage demands. It’s way cool. And because I love to tell you “I told you so”, which I did over a year ago, I now get to rub your noses in it. This stuff matters. Google Ventures just plopped some Continue reading

Presidential hopeful John Kasich: Work out encryption backdoors in backroom deals

Presidential candidate Gov. John Kasich thinks granting encryption backdoors is something that ought to be worked out in private by the president.During the Republican presidential debate last night the Ohio governor responded to a question about whether cryptographic experts were wrong when they say opening up secret messages to third-party decryption would cause more problems than it would solve.INSIDER: Techies back Democrats in Presidential race “Well, look the Joint Terrorism Task Force needs resources and tools,” he said, “and those are made up of the FBI, state and local law enforcement. And … it's best not to talk anymore about back doors and encryption, it will get solved, but it needs to be solved in the situation room of the White House with the technology folks.”To read this article in full or to leave a comment, please click here

Communication breakdown: US Secret Service needs a radio-system upgrade

The US Secret Service needs to upgrade its radio communications system before it creates difficulties in protecting the White House, the Vice President’s residence and foreign diplomatic embassies. That was the general conclusion of a report issued this week by The Department of Homeland Security Inspector General who stated: In the case of radio communications, a single missed transmission or delay could result in a national incident. Secret Service must ensure that its communications programs work effectively. +More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

Communication breakdown: US Secret Service needs a radio-system updgrade

The US Secret Service needs to upgrade its radio communications system before it creates difficulties in protecting the White House, the Vice President’s residence and foreign diplomatic embassies.That was the general conclusion of a report issued this week by The Department of Homeland Security Inspector General who stated: In the case of radio communications, a single missed transmission or delay could result in a national incident. Secret Service must ensure that its communications programs work effectively.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here

phpipam v1.2 released

Dear all, I am happy to announce new release of phpipam IP address management – version 1.2.

For this release backend code was completely rewritten, for database connections now pdo has replaced mysqli, so make sure you php supports pdo and pdo_mysql before upgrading. It also fixes lots of bugs, parametized SQL queries and brings lots of new features, most important are:

  • Multiple simultaneous authentication methods
  • PowerDNS integration
  • REST API
  • Mark subnet as full
  • L2 domains
  • ICMP check enhancements (fping support)
  • Firewall zones and nameservers

And much more. You can find full changelog below, please read it.

If you find phpIPAM useful for your company donations would be highly appreciated :)

You can demo it here: http://demo.phpipam.net/
You can download it on sourceforge site: phpipam-1.2 or on github.

 

Before upgrading make sure you first backup current database, you can follow upgrade guide on our site.

 

Some screenshots:

Screen Shot 2016-01-29 at 20.12.45 Screen Shot 2016-01-29 at 20.12.39 Screen Shot 2016-01-29 at 20.12.32 Screen Shot 2016-01-29 at 20.12.19 Screen Shot 2016-01-29 at 20.13.39 Screen Shot 2016-01-29 at 20.15.53

Special thanks to all the people submitting bug reports, translators and feature testers!


Full changelog for this release is:

== 1.20

	New features:
	------------
	+ Added multiple simultaneous authentication methods (Apache, AD, LDAP, Radius, NetIQ);
	+ Added fping scanning support;
	+ Added selectable scanning type (ping/pear/fping);
	+ Added L2  Continue reading

Docker Online Meetup #31: Unikernels

On Wednesday, we hosted a Docker Online Meetup that was all about Unikernels! Amir Chaudhry, Richard Mortier and Martin Lucina joined us and presented an overview on Unikernels including a demo of Unikernels and Docker. The recorded video and slides from … Continued

No agreement as deadline to replace Safe Harbor nears

Two days from their deadline, U.S. and European Union negotiators still have no replacement for the transatlantic data-transfer agreement overturned last year by the EU's top court.The original Safe Harbor agreement enabled companies to store and process EU citizens' personal information in the U.S. in compliance with strict European data protection laws, and its invalidation by the Court of Justice of the European Union last October in a case relating to Facebook's activities has called into question the operations of companies large and small.To read this article in full or to leave a comment, please click here

Identity theft victim? This site helps you reclaim your life

The Federal Trade Commission yesterday unveiled a revamped online hub where victims of identity theft can file complaints and receive a personalized recovery plan to regain control of their personal and financial information and accounts.[ Related: Identity theft hit 7% of U.S. population last year ]At IdentityTheft.gov, consumers can navigate through a series of questions about how their information was compromised (e.g. data breach, lost wallet, etc.) that will then produce a list of steps to take to mitigate the damage from the identity theft.To read this article in full or to leave a comment, please click here

Cisco patches authentication, denial-of-service, NTP flaws in many products

Cisco Systems has released a new batch of security patches this week for flaws affecting a wide range of products, including for a critical vulnerability in its RV220W wireless network security firewalls.The RV220W vulnerability stems from insufficient input validation of HTTP requests sent to the firewall's Web-based management interface. This could allow remote unauthenticated attackers to send HTTP requests with SQL code in their headers that would bypass the authentication on the targeted devices and give attackers administrative privileges.Cisco has patched this vulnerability in the 1.0.7.2 firmware version for RV220W devices. Manual workarounds include disabling the remote management functionality or restricting it to specific IP addresses.To read this article in full or to leave a comment, please click here