Get ipSpace.net Subscription while Attending the Rome SDN/NFV Event

Reiss Romoli, the fantastic organizers of my SDN/NFV event in Rome, Italy in late October are offering you a free personal ipSpace.net subscription – a saving of $299 or approximately EUR 270.

All you have to do to qualify is (A) download and fill in the registration form, (B) send it to Reiss Romoli and (C) pay before attending the webinar.

Yeah, I know the PDF form says “fax it back” – everyone has to use the tools that work best in their environment.

Hope we'll meet in warm and sunny Rome in a few weeks!

Right back at you tech vendors: OUR independent study of YOUR independent research

While not as useless as PR pitches about technology companies cracking some other publication's Top 10 list, "independent" research reports commissioned by vendors are right up there.  Why last week we even got a pitch about two vendors that "revealed the findings of a joint independent study." Reminded me of this line from Hermey the dentist/elf in the Rudolph the Red-Nosed Reindeer TV classic: I've lost count of how many times of late I've shot down pitches on such self-serving research, but in an attempt to try quantifying the scope of this issue I asked colleagues to forward me any such solicitations that they received last week, including for canned infographics. Some of my co-workers, unfortunately, had already jettisoned the pitches and emptied their trash before receiving my request, but the combined two dozen that they did send or that I received from publicity-hungry companies will at least give you a feel for this (I'm not including reports sent to us by research firms, not that I'm under any illusions of their work always being pure.)To read this article in full or to leave a comment, please click here

Digital Guardian buys Code Green to gain data-loss prevention tech

Endpoint security vendor Digital Guardian has bought Code Green Networks, which makes data loss prevention appliances for businesses.The purchase gives Digital Guardian a DLP offering that, rolled in with the company’s existing products, will provide endpoint, network and cloud data protection overseen by a single console, the company says. This will enable applying policies that will be enforced regardless of where the data is located and regardless of who accessed it and with what device.+ MORE MERGERS: 2015 Tech M&A Tracker +To read this article in full or to leave a comment, please click here

Cisco disrupts $60M ransomware biz

Cisco this week says it disabled a distributor of the Angler ransomware exploit kit, a program that holds victim machines hostage via encryption.The catch disrupted a global ransomware operation that netted $60 million annually for the perpetrators, Cisco states in a blog post.+MORE ON NETWORK WORLD: Jane Austen lets the boogie man in: Cisco report+To read this article in full or to leave a comment, please click here

GRE over IPSec Tunnel Between Cisco and VyOS

The previous tutorial shown GRE tunnel configuration between Cisco router and Linux Core. The big advantage of GRE protocol is that it encapsulates L3 and higher protocols inside the GRE tunnel so routing updates and other multicast traffic can be successfully transferred over the tunnel. The main drawback of GRE protocol is the lack of built-in security. Data are transferred in plain-text over the tunnel and peers are not authenticated (no confidentiality). Tunneled traffic can be changed by attacker (no integrity checking of  IP packets). For this reason GRE tunnel is very often used in conjunction with IPSec. Typically, GRE tunnel is encapsulated inside the IPSec tunnel and this model is called GRE over IPSec.

The tutorial shows configuration of OSPF routing protocol, GRE and IPSec tunnel on Cisco 7206 VXR router and appliance running VyOS network OS. Devices are running inside GNS3 lab an they are emulated by Dynamips (Cisco) and Qemu (VyOS).

Picture1-Topology

Picture 1 - Topology

Note: VyOS installation is described here. You can easily build your own VyOS Qemu appliance using the Expect and Bash script shared in the article.

1. R3 Configuration

R3(config)# interface gigabitEthernet 1/0
R3(config-if)# ip address 1.1.1.1 255.255.255.0
R3(config-if)# no shutdown

R3(config-if)# interface gigabitEthernet 0/0
R3(config-if)# ip Continue reading

Juniper NXTWork 2015

  Coming this November, Juniper has finally jumped into the Customer Summit bandwagon.  This is something that has been asked for for many years now, a way for Juniper customers and advocates to get together and talk Juniper.  This event will allow you to connect with your peers in the industry, meet current and potential […]

The post Juniper NXTWork 2015 appeared first on Fryguy's Blog.

Manchester, UK: CloudFlare’s 63rd data center

Our new point of presence in Manchester, UK brings the CloudFlare network to 63 points of presence across 33 countries. In other words, the sun never sets across the CloudFlare network. Our data center in Manchester also admits the United Kingdom into a small club of countries with more than one CloudFlare data center, including the US, China, Japan, Australia, Germany, and France.

As of yesterday, traffic from the majority of Internet users in Northern England is now mere milliseconds away. More importantly, our Manchester and London data centers allow for redundancy and content localization within the UK for all of our customers.

In homage

The city of Manchester has made more than its fair share of technical contributions over the years. It is the city where Rolls met Royce (their first car drove off the line of their Manchester factory in 1904), and is also home to the first modern computer. The computer, nicknamed "Baby", was built at The University of Manchester using technology developed for WWII communications equipment, and ran the world's first stored program at 11am on Monday 21st June, 1948.

It is fitting, then, that in the last three years there has been a concerted effort Continue reading

Arista launches new security feature to cover growing East-to-West data center traffic

Five years ago, almost all of the traffic in a data center moved in a North-South direction. Traffic moved from one server through the different tiers of a network, passed through the core, and then up to another server. Enabling security and application optimization services with this model was fairly simple. Put a big, honking firewall or ADC in the core of the network and all traffic would pass through these devices.However, the past few years have seen an explosion in East-West traffic, primarily driven by servers and virtual machines (VMs) talking to each other and to database systems, storage systems, and other applications in the data center. Typically, East-West traffic never passes through the core of the network, where it can have the benefit of security inspection. Also, the volume of East-West traffic is rapidly becoming a much higher percentage relative to North-South. This makes it easier for a piece of malware that may have breached an unpatched server to spread laterally. To read this article in full or to leave a comment, please click here

Gartner: Top 10 strategic predictions that could shake up IT

ORLANDO-- The robots decidedly have it. They will help run businesses, make decisions for you and maybe even be your boss. Those were just some of the predictions put forth by Gartner vice president Daryl Plummer at the consultancy’s always interesting prediction of future IT technology directions. +More on Network World: Gartner: IT should simplify security to fight inescapable hackers+ “Robots are beginning to rise – don’t think Terminator robots – but smart robots that will have the ability to learn things better, faster,” PlummerTo read this article in full or to leave a comment, please click here

When it comes to security, trust but verify

ORLANDO -- It's time to rethink a bunch of security truisms, Gartner analysts said at the company's annual Symposium/IT Expo here this week.The security rules companies have relied on for decades are ready for retirement. These include: Prevention is better than cure, humans are the weakest link, and access should be limited to just an employee needs to do his or her job. These old saws have been "exploded" by today's tech trends, said Tom Scholtz, Gartner research vice president.[ Get the latest tech news with Computerworld's daily newsletters ] For one thing, employees are now mobile, digitally literate, embrace new tools without fear and expect access to whatever they need from wherever they're working.To read this article in full or to leave a comment, please click here

Machines will learn just like a child, says IBM CEO

ORLANDO – Technology is shifting to intelligent machines with a capability to reason, said IBM Chairman and CEO Virginia Rometty. These machines won't replace humans, but will augment them. It is a technology that will transform business, she said.This technology is the basis of IBM's work on Watson, its cognitive or thinking system.Rometty, interviewed Tuesday by Gartner analysts at the research firm's Symposium ITxpo, said cognitive systems understand not only data, but unstructured data, which includes images, songs, video, and then goes a step further: "They reason and they learn."To read this article in full or to leave a comment, please click here

Snowden talks about secret smartphone spying Smurfs, coming home to go to prison

During the BBC’s Panorama series “Edward Snowden: Spies and the Law,” which is not viewable per say from the US, Snowden discussed how intelligence agencies “want to own your phone instead of you.” The topic of hacking smartphones for surveillance starts about nine minutes into the interview as Snowden revealed the GCHQ’s “Smurf Suite.”“Dreamy Smurf is the power management tool,” explained Snowden, “which means turning your phone on or off without you knowing.” Yes, it can control the power even if your phone is off.“Nosey Smurf is the hot-miccing tool. So, for example, if it’s in your pocket they can turn the microphone on and listen to everything that’s going on around you.” Yes, “even if your phone is switched off because they’ve got the other tools for turning it on.”To read this article in full or to leave a comment, please click here

U.S. Critical Infrastructure Continue to Make Risky IT Bets

When the term “critical infrastructure” is mentioned in conversation, thoughts immediately turn to things like electrical power plants, oil and gas pipelines, food, water, etc. You know, the foundational services of modern life that we all take for granted. These are the same industries that former Defense Secretary, Leon Panetta, was referring to when he warned of the possibility of a “cyber-Pearl Harbor” back in 2012.  Panetta stated:’An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical (railroad) switches…they could derail passenger trains or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities or shut down the power grid across large parts of the country.”  To read this article in full or to leave a comment, please click here