Time to Ditch the Definition of SDN

While at a stoplight looking at the random news feeds on Linkedin I ran across a post of a recent blog post by the ONF and the subsequent conversation where my friend Ivan Pepenlnjak commented in. So I threw in my two cents and quickly regretted it because Linkedin has an amazing ability to frustrate me as it updated the ... The post Time to Ditch the Definition of SDN appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Your Docker Agenda for LinuxCon

Docker and containers are making a big splash in Seattle next week! LinuxCon runs from Monday, August 17 through Wednesday, August 19 but there are plenty of co-located events during the week including ContainerCon, MesosCon and the Linux Plumbers Conference. … Continued

Disclaimer

No Warranties This website is provided “as is” without any representations or warranties, express or implied. The Owner makes no representations or warranties in relation to this website or the information and materials provided on this website. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this website's information is solely at reader's own risk. Limitations of Liability The Owner will not be liable to you (whether under the law of contact, the law of torts or otherwise) in relation to the contents of, or use of, or otherwise in connection with, this website:

Privacy Policy

This site is privately owned and operated and has no corporate or commercial interests. If you choose to post a comment on this site, any information you provide — most importantly your email address — remains private and is not shared with any third-party. All information you provide when posting a comment is used only for facilitating your interaction with the site or for displaying as part of your public comment on the site.

About

About the Site Hi! I'm Joel Knight and this is my personal home on the web. I use this site as a platform for expressing my ideas, knowledge, and tools related to Information Technology. The opinions and information expressed on this site — aside from the comments posted by others — are mine and not necessarily those of my employers, past or present. My current employer is Amazon Web Services, Canada.

AT&T a closer partner of NSA than previously known, Snowden docs show

A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency’s Internet spying activities than was previously known.AT&T has been by far the most critical telecom player in the NSA’s surveillance efforts and its willing participation in mass spying on both foreign and U.S. citizens has apparently been crucial in helping the U.S. agency take advantage of bulk record collection laws, according to a joint report in ProPublica and the New York Times.To read this article in full or to leave a comment, please click here

AT&T a closer partner of NSA than previously known, Snowden docs show

A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency’s Internet spying activities than was previously known.AT&T has been by far the most critical telecom player in the NSA’s surveillance efforts and its willing participation in mass spying on both foreign and U.S. citizens has apparently been crucial in helping the U.S. agency take advantage of bulk record collection laws, according to a joint report in ProPublica and the New York Times.To read this article in full or to leave a comment, please click here

Mozilla tests a true stealth mode for Firefox

Mozilla wants to make private browsing truly private.The company is testing enhancements to private browsing in Firefox designed to block website elements that could be used by third parties to track browsing behavior across sites. Most major browsers, Firefox included, have a “Do Not Track” option, though many companies do not honor it.Mozilla’s experimental tool is designed to block outside parties like ad networks or analytics companies from tracking users through cookies and browser fingerprinting.To read this article in full or to leave a comment, please click here

Dear Internet, Send Us Your Videos

alt

CloudFlare turns 5 years old this September. It's been an amazing ride since our launch. Before we launched at TechCrunch Disrupt on September 27, 2010, we'd signed up about 1,000 beta customers. It took us nine months to get those first customers. (By comparison, today we typically sign up 1,000 customers every 3 hours.)

Those first beta customers were instrumental. They put up with us when we were had only one data center (in Chicago). They put up with us as we brought traffic online in our next facilities in Ashburn, Virginia and San Jose, California — and had the routing challenges that came along with running a distributed network for the first time. They sent us bug reports, provided us feature requests, and were instrumental to building the foundation that grew into what is CloudFlare today.

Archival Footage

When we launched, we wanted to feature their stories and experience about CloudFlare so we had them submit their stories by video. Here's the video we included as part of our launch presentation.



I'm proud of the fact that more than 80% of those original 1,000 customers are still using CloudFlare five years later.

Send Us Your Stories

As we Continue reading

At what point do white hat hackers cross the ethical line?

In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

Whether this is true or not, it raises some valid concerns over the ethical implications of white hat hacking. In the case of Roberts, who, according to the affidavit, was able to steer the airplane off the intended course, the consequences could have been dire. It is not believed that Roberts had any intention of hurting either himself or any of the passengers, but if the affidavit is in fact true, the possibility was real.

To read this article in full or to leave a comment, please click here

FAA: Pilots report record number of unmanned aircraft encounters

The Federal Aviation Administration this week said that a record number of drone sightings reported by airline pilots and others has increased dramatically this year -- from a total of 238 sightings in all of 2014, to more than 650 by August 9.The FAA said pilots of a variety of different types of aircraft – including many large, commercial air carriers – reported spotting 16 unmanned aircraft in June of 2014, and 36 the following month. This year, 138 pilots reported seeing drones at altitudes of up to 10,000 feet during the month of June, and another 137 in July.+More on Network World: Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here

FAA: Pilots report record number of unmanned aircraft encounters

The Federal Aviation Administration this week said that a record number of drone sightings reported by airline pilots and others has increased dramatically this year -- from a total of 238 sightings in all of 2014, to more than 650 by August 9.The FAA said pilots of a variety of different types of aircraft – including many large, commercial air carriers – reported spotting 16 unmanned aircraft in June of 2014, and 36 the following month. This year, 138 pilots reported seeing drones at altitudes of up to 10,000 feet during the month of June, and another 137 in July.+More on Network World: Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here

Show 250 – How To Document A Network

A favorite topic among network engineers, documentation is a source of both wonder and horror. Network documentation is difficult to get right. How much detail is enough? How old is that diagram, really? Can't this be automated? Wait, the automated generator spit out *that*? In this show, the Packet Pushers along with former guest Dominik discuss their documentation experiences, good and bad. What have we gotten right? What have we gotten wrong? What's been worth the trouble? What was a waste of time? What did we wish we'd documented before we really needed it?

The post Show 250 – How To Document A Network appeared first on Packet Pushers.

The six pillars of Next Generation Endpoint Protection

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Advancements in attack evasion techniques are making new threats extremely difficult to detect. The recent Duqu 2.0 malware, which was used to hack the Iranian nuclear pact discussions, Kaspersky Lab, and an ICS/SCADA hardware vendor, is a prime example. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.To read this article in full or to leave a comment, please click here

The six pillars of Next Generation Endpoint Protection

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Advancements in attack evasion techniques are making new threats extremely difficult to detect. The recent Duqu 2.0 malware, which was used to hack the Iranian nuclear pact discussions, Kaspersky Lab, and an ICS/SCADA hardware vendor, is a prime example. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.

To read this article in full or to leave a comment, please click here