And then there were two: Another dangerous Dell root certificate discovered

The plot thickens: After Dell confirmed that one of its support tools installed a dangerous self-signed root certificate and private key on computers, users discovered a similar certificate deployed by a different Dell tool. The second certificate is called DSDTestProvider and is installed by an application called Dell System Detect (DSD). Users are prompted to download and install this tool when they visit the Dell support website and click the “Detect Product” button. The first certificate, which was reported over the weekend, is called eDellRoot and is installed by the Dell Foundation Services (DFS), an application that implements several support functions.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Equinix extends AWS Direct Connect to London, Dallas

Equinix has, over the past several years, played the role of connector between a number of public cloud vendors and organizations' existing IT assets. It's a natural move for Equinix, which, as a global vendor of data center space, is an important utility provider, but obviously doesn't really play much up the value chain. Direct Connect helps them to change that, allowing companies to connect their privately owned and managed infrastructure to AWS. It also performs a similar role for other public cloud platforms, Microsoft Azure for example.The reasons for providing these connections are obvious - privacy, security, throughput, and application performance all benefit from these high-spec pipes. A recent study released by Equinix, titled Enterprise of the Future, found that by 2017, 84% of IT leaders will deploy IT infrastructure where interconnection – defined as direct, secure physical or virtual connections  – is at the core, compared to only 38% today. Don't let it be said that interconnection is not an important part of the modern enterprise IT organization.To read this article in full or to leave a comment, please click here

Aiming to be the Costco of tech research and consulting

I believe the first time I quoted Gary Rowe in a Network World article – a print one at that – was back in July of 1991, when he was an AT&T email services director and the focus was the very glamorous topic of X.500 directories. Fast forward to 2015, I’m still with Network World and Rowe has moved on to form a new consulting and analysis firm called TechVision Research, and sure enough, when we reconnected recently, we found ourselves talking once again about some of the same themes, including identity management and privacy.To read this article in full or to leave a comment, please click here

A Voyage of Discover-E

 

hpe-logo

I’m very happy to be attending the first edition of Hewlett-Packard Enterprise (HPE) Discover in London next week. I say the first edition because this is the first major event being held since the reaving of HP Inc from Hewlett-Packard Enterprise. I’m hopeful for some great things to come from this.

It’s The Network (This Time)

One of the most exciting things for me is seeing how HPE is working on their networking department. With the recent news about OpenSwitch, HPE is trying to shift the way of thinking about a switch operating system in a big way. To quote my friend Chris Young:

Vendors today spend a lot of effort re-writing 80% of their code and focus on innovating on the 20% that makes them different. Imagine how much further we’d be if that 80% required no effort at all?

OpenSwitch has some great ideas, like pulling everything from Open vSwitch as a central system database. I would love to see more companies use this model going forward. It makes a lot of sense and can provide significant benefits. Time will tell if other vendors recognize this and start using portions of OpenSwitch in their projects. But Continue reading

Sponsored Post: StatusPage.io, iStreamPlanet, Redis Labs, Jut.io, SignalFx, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • Senior Devops Engineer - StatusPage.io is looking for a senior devops engineer to help us in making the internet more transparent around downtime. Your mission: help us create a fast, scalable infrastructure that can be deployed to quickly and reliably.

  • As a Networking & Systems Software Engineer at iStreamPlanet you’ll be driving the design and implementation of a high-throughput video distribution system. Our cloud-based approach to video streaming requires terabytes of high-definition video routed throughout the world. You will work in a highly-collaborative, agile environment that thrives on success and eats big challenges for lunch. Please apply here.

  • As a Scalable Storage Software Engineer at iStreamPlanet you’ll be driving the design and implementation of numerous storage systems including software services, analytics and video archival. Our cloud-based approach to world-wide video streaming requires performant, scalable, and reliable storage and processing of data. You will work on small, collaborative teams to solve big problems, where you can see the impact of your work on the business. Please apply here.

  • At Scalyr, we're analyzing multi-gigabyte server logs in a fraction of a second. That requires serious innovation in every part of the technology stack, from frontend to backend. Continue reading

What you need to know about Dell’s root certificate security debacle

In an attempt to streamline remote support, Dell installed a self-signed root certificate and corresponding private key on its customers' computers, apparently without realizing that this exposes users' encrypted communications to potential spying.Even more surprising is that the company did this while being fully aware of a very similar security blunder by one of its competitors, Lenovo, that came to light in February.To read this article in full or to leave a comment, please click here

Frequent CCIE R&S V5 Questions!

While teaching a CCIE R&S Bootcamp the other day, I realized that I get a lot of the same questions pertaining to the CCIE R&S V5 Lab pretty frequently, so I decided to put together a video series that addresses these questions. I’ve mapped out 4 videos – each of which cover the 3 section in the lab, and an introduction to the general lab concepts and theory. Enjoy, and if there’s anything I can help you with please feel free to email me at [email protected].

JP Cedeno, CCIE R&S V5 (CCIE #47408)
iPexpert’s Sr. CCIE R&S Instructor

Explosions Leave Crimea in the Dark

11988406_541157619375726_6452207849448768237_n

11988406_541157619375726_6452207849448768237_n
Above photo credit: http://varlamov.ru/

Just after midnight local time on 22 November, saboteurs, presumably allied with Ukrainian nationalists, set off explosives knocking out power lines to the Crimean peninsula.  At 21:29 UTC on 21 November (00:29am on 22-Nov, local time) , we observed numerous Internet outages affecting providers in Crimea and causing significant degradation in Internet connectivity in the disputed region.

With Crimean Tatar activists and Ukrainian nationalists currently blocking repair crews from restoring power, Crimea may be looking at as much as a month without electricity as the Ukrainian winter sets in.  Perhaps more importantly, the incident could serve as a flash point spurring greater conflict between Ukraine and Russia.  ua_map

Impacts

The impacts can be seen in the MRTG traffic volume plot from the Crimea Internet Exchange — the drop-offs are noted with red arrows and followed by intermittent periods of partial connectivity.

cr-ix2
Dyn’s latency measurements into Miranda-Media, the Crimean local agent of Russian state operator Rostelecom, show that some parts of the network remain reachable despite the power loss.  However, while backup generators may be keeping the networking infrastructure online, it won’t be of much good for the people of Crimea Continue reading

Reaction: Personal Integrity

There is, on a daily basis, a choice you must make as a geek, as someone who is involved in technology — particularly in the world of computer networking. The choice we always face, every one of us, is whether to champion a particular product or service, or to champion solving the problem at hand. Between doing what’s best for a vendor — or even harder, what’s best for our career — or doing what’s best for our customer (whoever that customer might be). In other words, what to do with our personal integrity.

I know it’s hard, when you’re working for a vendor, not to just throw yourself into a product to the point of seeing it as the hammer that solves every problem, whether a nail or not. I know it’s hard, when you work for a smaller company, or in what feels like a “side alley” of our little industry (what Ethan calls a “mud puddle”) not to try to throw yourself at being famous, or warping the direction of the company so you can learn something new. I once worked on an account where I’d been asking to come in and help them switch from EIGRP Continue reading

How Lockheed Martin, Cisco and PWC manage cybersecurity

Cybersecurity remains a top priority for companies in all industries. The reason is clear. Criminals and other parties have access to inexpensive tools and training to attack companies and governments. The New York Times reported on the rise of ransomware earlier in 2015. This type of malicious software encrypts a user’s data and demands a payment to release it (or the data will be destroyed).Many companies are deploying greater resources to turn the tide of hackers: Google has a team of 10 full time hackers working to eliminate flaws. Given these threats, executives and technology leaders are asking for best practices and technologies. Developing security awareness in staff, growing security professionals and equipping CIOs to monitor security remain vital components to a successful security management strategy.To read this article in full or to leave a comment, please click here

Using Light-O-Rama to create holiday light shows

If you want to have a holiday light show that will back up traffic and make people of all ages smile (except Grinches and Scrooges), then you might be interested in Light-O-Rama. It’s been used by contestants in the Great Light Fight and was running behind the scenes of the first viral video of Christmas lights to Wizards in Winter. Incidentally, it took the electrical engineer who set up that light show about two months and 16,000 lights; for each minute of the song, it took him about one hour to sequence 88 Light-O-Rama channels. One LOR hardware controller generally has 16 channels.To read this article in full or to leave a comment, please click here

Dell admits installing security hole on laptops, apologizes, offers fix

Dell acknowledges a root certificate it installed on its laptops was a bad idea and is pushing a patch to permanently remove it.In a blog post company spokesperson Laura Thomas says eDellRoot was installed as a support tool to make it faster and easier for customers to service the devices. But some of those customers discovered the certificate and recognized it as a serious security threat.To read this article in full or to leave a comment, please click here