PlexxiPulse—Powering Networks On a Global Scale

This week, we announced that Perseus selected Plexxi to deploy a next-generation network system to expand its service operations into 11 new major Asian markets and offer new services between 29 sites across the globe. By using our solutions, Perseus is able to supply low latency point-to-point and multipoint Ethernet services as well as global market data distribution in all of the world’s key emerging markets and financial liquidity centers.

Perseus came to us looking for a vendor to help improve its network’s geographic scale, simplicity, agility and service offering capabilities. Through Plexxi’s technology, the company found ways to reduce its network’s operational overhead, intense manual labor and complexity, while at the same time increasing and improving service delivery options for its customers. We’re proud that we were able to help Perseus find a solution that accommodated their requirements of today as well as those of the future. Interested in learning more about how we’re working together? Take a look at this blog post from our CEO Rich Napolitano.

Below please find a few of our top picks for our favorite news articles of the week.

Light Reading: Perseus Builds 75,000-Mile Global SDN Network
By Mitch Wagner
Perseus is deploying Continue reading

The Unabomber’s brother has written a book that I can’t wait to read

David Kaczynski has lived the unimaginable: His brother Ted, the Unabomber, did more than merely kill and maim those who were victims of his attacks, he exacted a terrible toll on his own family, as is always the case with those who commit evil acts.Now David Kaczynski has written a book -- Every Last Tie – that aspires to makes some sense of an otherwise senseless situation. From a review in the New Republic:To read this article in full or to leave a comment, please click here

Implenting Idempotency using HPE IMC

 

Try saying that five times fast.

 

What if those VLANS already exist?

There’s a concept called idempotency which can be loosely explained as

Make sure it’s like this. If it’s not like this, make it like this. If it’s already like this. Don’t do anything

Essentially, it’s a way to declare the desired configuration state of whatever it is you’re trying to configure. If the configuration state of that server, or switch or router is already in that state, than just leave it alone.

It’s a way to ensure that configuration drift doesn’t happen.

So if there’s some rabbid network administrator with a console cable running around laughing maniacly as they randomly changes things… this will help you keep them in check.

jack photo

 

Idempotent VLANs

So we’re going to look at the last example here where we did the following:

  • grabbed the jinja template for vlans directly from a GIThub repository
  • grabbed the desired vlans file directly from a GIThub repository
  • renderd the Jinja template using the values from the vlan file to get our final config
  • used the pyhpeimc library to push the commands through the executecmd RESTful API
 

Import Libraries

You know the drill here, Continue reading

Nexusguard deploys game-changing SDN tech to mitigate large-scale DDoS attacks  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  It's easier than ever for a malicious actor to launch a DDoS attack against practically any target in the world. Groups like Lizard Squad sell DDoS-as-a-Service for only a few dollars per hour. Some attackers won’t end their attacks until a Bitcoin ransom is paid. Consequently, there are now more attacks on more organizations worldwide than ever before. Akamai recently reported a year-over-year increase of 180% in the number of attacks it saw through its network.Not only are attacks becoming more frequent, they are getting larger, too. Some recent attacks have exceeded 200 million packets per second (Mpps). An event of this size is sufficient to bring down a tier 1 router, the kind often used by Internet Service Providers (ISPs).To read this article in full or to leave a comment, please click here

NexusGuard deploys game-changing SDN tech to mitigate large-scale DDoS attacks  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  It's easier than ever for a malicious actor to launch a DDoS attack against practically any target in the world. Groups like Lizard Squad sell DDoS-as-a-Service for only a few dollars per hour. Some attackers won’t end their attacks until a Bitcoin ransom is paid. Consequently, there are now more attacks on more organizations worldwide than ever before. Akamai recently reported a year-over-year increase of 180% in the number of attacks it saw through its network.Not only are attacks becoming more frequent, they are getting larger, too. Some recent attacks have exceeded 200 million packets per second (Mpps). An event of this size is sufficient to bring down a tier 1 router, the kind often used by Internet Service Providers (ISPs).To read this article in full or to leave a comment, please click here

FBI, keep out! How to encrypt everything

The FBI’s inability to crack a terrorist’s iPhone 5c shows the strong protection you can get for your private information on a mobile device. That same encryption is also available on your computer, at least in some cases.Given the increasing access to personal and corporate data sought by the U.S. government, as well as by other politicians, unscrupulous businesses, and criminal hackers, people should up their game on what they protect. Fortunately, it's not hard to do. (But be sure to back up your data before you encrypt your devices, in case a power failure occurs during the encryption process and makes your data unavailable.)To read this article in full or to leave a comment, please click here

ISIS group threatens Facebook and Twitter CEOs

Frustrated by social networks' efforts to keep them at bay, the terrorist group ISIS has made direct threats against the CEOs of Facebook and Twitter.In a 25-minute video dubbed "Flames of the Supporters" and posted on the Russian-based instant messaging service Telegram, the Sons Caliphate Army displayed photos of Facebook co-founder and CEO Mark Zuckerberg and Twitter CEO Jack Dorsey with digitally added bullet holes. Sons Caliphate Army is a purported hacking division of the Islamic State.To read this article in full or to leave a comment, please click here

The 5 biggest reveals from Apple’s motion to dismiss the FBI’s court order

On Thursday, Apple filed a motion to vacate the court order compelling the iPhone-maker to create a hackable version of iOS that the FBI can use to break into the iPhone of San Bernardino shooter Syed Farook.In the filing, Apple’s main argument is that its software is protected speech, and that the government asking the company to fabricate software that goes against its beliefs is a violation of its First and Fifth Amendment rights.+ Check out everyone's opinion on what Apple should do +To read this article in full or to leave a comment, please click here

Business leaders struggle with cloud, big data and IoT security

Call it the security conundrum.Business leaders are racing to adopt new IT systems like cloud computing, big data and Internet of things (IoT), and yet at the same time express mounting concerns about the security of sensitive information in those environments.A new survey of more than 1,000 enterprise leaders conducted by 451 Research on behalf of the security vendor Vormetric helps quantify the situation.[ Related: Cybersecurity much more than a compliance exercise ]To read this article in full or to leave a comment, please click here

Show 277: Riverbed’s Role In Wireshark, Security & More (Sponsored)Drew Conry-Murray

On today's podcast we learn about Riverbed's open source efforts, including its corporate sponsorship of packet analyzer Wireshark, its open APIs that automate performance analysis processes enabled by Wireshark and other solutions, and how security teams can use Wireshark.

The post Show 277: Riverbed’s Role In Wireshark, Security & More (Sponsored)Drew Conry-Murray appeared first on Packet Pushers.

Show 277: Riverbed’s Role In Wireshark, Security & More (Sponsored)

On today's podcast we learn about Riverbed's open source efforts, including its corporate sponsorship of packet analyzer Wireshark, its open APIs that automate performance analysis processes enabled by Wireshark and other solutions, and how security teams can use Wireshark.

The post Show 277: Riverbed’s Role In Wireshark, Security & More (Sponsored) appeared first on Packet Pushers.

Tim Cook defends Apple’s refusal to help the FBI in new interview

Apple CEO Tim Cook this week appeared on ABC News where he laid out in precise detail exactly why Apple is refusing to comply with a court order that would have the company help the FBI hack into an iPhone used by one of the San Bernardino shooters.The crux of Apple's position, as relayed by Cook, is that helping the FBI in this particular instance would only open the door to even more government requests. With such a precedent in place, Cook believes that the software tool the FBI wants Apple to develop will inevitably be used for nefarious purposes.“Once created, the technique could be used over and over again, on any number of devices," Cook explained in an open letter published last week.To read this article in full or to leave a comment, please click here