What is the Wi-Fi password?

This is one of the most common questions heard in small and mid-sized businesses (SMBs) today. With the shift in technology and consumer expectations of connectivity, SMBs do more than just provide products and services to their customers—they provide Wi-Fi....

Malwarebytes still fixing flaws in antivirus software

Malwarebytes said it could take three of four weeks to fix flaws in its consumer product that were found by a Google security researcher.The company has fixed several server-side vulnerabilities but is still testing a new version of its Anti-Malware product to fix client-side problems, CEO Marcin Kleczynski said in a blog post.In the meantime, customers can implement a workaround: those using the premium version of Anti-Malware "should enable self-protection under settings to mitigate all of the reported vulnerabilities," he wrote.To read this article in full or to leave a comment, please click here

Arista violated 3 Cisco patents: ITC

The International Trade Commission has made an initial determination that Arista Networks infringed on three Cisco patents in its switches, the latest development in a 13-month-old suit.The ITC said Arista violated patents associated with a central database for managing configuration data (SysDB) and private VLANs. As part of its 2014 suit alleging patent and copyright infringement, Cisco sought an injunction on Arista product from the ITC.To read this article in full or to leave a comment, please click here

Protecting IP or Market Share?

It's tough times on Tasman Drive.  Struggling to apply old technology to the new world of cloud computing, Cisco is potentially facing the largest loss of data center market share in its history.  We can understand why Cisco would take the battle from the marketplace to the courtroom.  What surprises us is the length that Cisco has gone to misrepresent our actions and the nature of the litigation in order to justify their assault.

Q&A: As prices fall, flash memory is eating the world

Western Digital in October announced plans to acquire SanDisk for some $19 billion in a deal that -- once finalized -- will marry leaders in the traditional hard drive and the emerging flash memory markets. Sumit Sadana, SanDisk's chief strategy officer and general manager of its Enterprise Solutions unit, spoke recently with IDG Chief Content Officer John Gallant to share insights on the merger and to explore the evolving role of flash in corporate data centers. What continues to hold enterprise back with flash? Just the price perception issue?Is the cloud a threat to your consumer device business? More and more, consumers use the cloud for photos or other things that they're saving. Is it such that the better the cloud opportunities get, the weaker the consumer opportunity gets?To read this article in full or to leave a comment, please click here(Insider Story)

IDG Contributor Network: Next frontier: Aquatic IoT

Underwater communications networks are excruciatingly slow, and that's hampering oil and gas exploration and scuba communications, among other businesses.The communications technology needs upgrading to more closely match high-speed, through-air radio networks, say experts.One answer may be to adapt software-defined radios and couple them with special underwater acoustic modems, according to electrical engineers at the University of Buffalo.Radio too slow Sound-waves—like those used by whales and dolphins—as opposed to radio-waves, are the best media for communicating underwater, the scientists say.Traditional radio methods don't work properly. The problem is that radio doesn't function well underwater. Commercial underwater modems are slow, and voice solutions are limited by distance and clarity, the scientists say.To read this article in full or to leave a comment, please click here

They are deadly serious about crypto backdoors

Julian Sanchez (@normative) has an article questioning whether the FBI is serious about pushing crypto backdoors, or whether this is all a ploy pressuring companies like Apple to give them access. I think they are serious -- deadly serious.

The reason they are only half-heartedly pushing backdoors at the moment is that they believe we, the opposition, aren't serious about the issue. After all, the 4rth Amendment says that a "warrant of probable cause" gives law enforcement unlimited power to invade our privacy. Since the constitution is on their side, only irrelevant hippies could ever disagree. There is no serious opposition to the proposition. It'll all work itself out in the FBI's favor eventually. Among the fascist class of politicians, like the Dianne Feinsteins and Lindsay Grahams of the world, belief in this principle is rock solid. They have absolutely no doubt.

But the opposition is deadly serious. By "deadly" I mean this is an issue we are willing to take up arms over. If congress were to pass a law outlawing strong crypto, I'd move to a non-extradition country, declare the revolution, and start working to bring down the government. You think the "Anonymous" hackers were bad, Continue reading

Is packet-sniffing illegal? (OmniCISA update)

In the news recently, Janet Napolitano (formerly head of DHS, now head of California's university system) had packet-sniffing software installed at the UC Berkeley campus to monitor all its traffic. This brings up the age old question: is such packet-sniffing legal, or a violation of wiretap laws.

Setting aside the legality question for the moment, I should first point out that's its perfectly normal. Almost all organizations use "packet-sniffers" to help manage their network. Almost all organizations have "intrusion detection systems" (IDS) that monitor network traffic looking for hacker attacks. Learning how to use packet-sniffers like "Wireshark" is part of every network engineer's training.

Indeed, while the news articles describes this as some special and nefarious plot by Napolitano, the reality is that it's probably just an upgrade of packet-sniffer systems that already exist.

Ironical, much packet-sniffing practice comes from UC Berkele. It's famous for having created "BPF", the eponymously named "Berkeley Packet Filter", a standard for packet-sniffing included in most computers. Whatever packet-sniffing system Berkeley purchased to eavesdrop on its networks is almost certainly including Berkeley's own BPF software.


Now for the legal question. Even if everyone is doing it, it doesn't necessarily mean it's legal. But the wiretap Continue reading

Worth Reading: Disaggregation at LinkedIn

Disaggregation has been on the top of my mind a good bit recently, partially because of our work at LinkedIn around this topic. Zaid has just posted a piece on the LinkedIn Engineering Blog about Project Falco, which is our internal disaggregation project for our data centers. Just a little taste to convince you to jump over there and read this one, because I think this sort of thing will have a major impact in the networking industry over the next three to five years.

Pigeon is a 3.2Tbps switching platform that can be used as a leaf or spine switch. Pigeon is our first foray into active switch software development. We are not venturing into developing our own switch because we aspire to become experts in the switching and routing space, but because we want control of our destiny. We continue to be supportive of our commercial vendors and work with them in a decoupling model.

LinkedInTwitterGoogle+FacebookPinterest

The post Worth Reading: Disaggregation at LinkedIn appeared first on 'net work.

Comcast targets first markets it will offer gigabit over copper cable service

Comcast announced today that Atlanta and Nashville would be its first two markets to offer DOCSIS 3.1 technology, in “early 2016,” and that Chicago, Detroit and Miami would join them in the second half of the year.DOCSIS 3.1 is a new wired cable Internet standard, which gives Comcast the ability to offer gigabit speeds over existing copper cable. The latest version of the standard uses smaller subcarrier channels that use considerably less bandwidth than those of DOCSIS 3.0, bonding those subchannels together for greater efficiency. The company said that it tested the technology last month in its home market of Philadelphia.+ALSO ON NETWORK WORLD: 'Big bets' cost Google parent Alphabet $3.6 billion in losses last year + Microsoft starts recommended update roll-out for Windows 10To read this article in full or to leave a comment, please click here

Sponsored Post: Netflix, Macmillan Learning, Aerospike, TrueSight Pulse, LaunchDarkly, Robinhood, StatusPage.io, Redis Labs, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • Manager - Site Reliability Engineering: Lead and grow the the front door SRE team in charge of keeping Netflix up and running. You are an expert of operational best practices and can work with stakeholders to positively move the needle on availability. Find details on the position here: https://jobs.netflix.com/jobs/398

  • Macmillan Learning, a premier e-learning institute, is looking for VP of DevOps to manage the DevOps teams based in New York and Austin. This is a very exciting team as the company is committed to fully transitioning to the Cloud, using a DevOps approach, with focus on CI/CD, and using technologies like Chef/Puppet/Docker, etc. Please apply here.

  • DevOps Engineer at Robinhood. We are looking for an Operations Engineer to take responsibility for our development and production environments deployed across multiple AWS regions. Top candidates will have several years experience as a Systems Administrator, Ops Engineer, or SRE at a massive scale. Please apply here.

  • Senior Service Reliability Engineer (SRE): Drive improvements to help reduce both time-to-detect and time-to-resolve while concurrently improving availability through service team engagement.  Ability to analyze and triage production issues on a web-scale system a plus. Find details on the position here: https://jobs. Continue reading

SDN shifts from configuration to analytics

Two SDN vendors have enhanced their offerings to improve visibility into virtual networks.Midokura this week unveiled an upgrade of its Midokura Enterprise MidoNet (MEM) network virtualization software to provide visibility into encapsulated traffic in OpenStack clouds. And Pluribus Networks rolled out software designed to provide an operational view of the data center network for insight into application performance and troubleshooting, and enhancing forensic analysis and security.To read this article in full or to leave a comment, please click here

Security flaws found in Fisher-Price smart teddy bear and kid’s GPS tracker watch

The Internet of Things increasingly includes “smart toys,” but no parent knowingly purchases a toy for their child that potentially risks the safety and privacy of their family. Those risks are caused by security flaws found in the Internet-connected toys. Unlike “dumb” toys, hackers could exploit “smart” toy vulnerabilities and potentially harvest a child’s name, birthdate, location and more.This time, Rapid7 revealed security flaws in Fisher-Price’s Smart Toy, an Internet-connected stuffed bear, and in the hereO GPS watch, a wearable location-tracking device.To read this article in full or to leave a comment, please click here