Up and to the Right: Forrester Research Ranks CloudFlare as a “Leader” for DDoS Services Providers

alt

Forrester Research, Inc. has released The Forrester Wave™: DDoS Services Providers, Q3 2015 report which ranks CloudFlare as a leader. How do you get placed “up and to the right”? The leaders in this Wave, including CloudFlare, demonstrated effective portals, good client and revenue growth, and a focus on customer service. They also all have the ability to defend against the largest amplification attacks and the most pernicious application attacks.

Here’s some of the criteria CloudFlare received the highest possible scores for:

  • Attack types defended
  • Data/scrubbing center geographic presence
  • Detection tactics
  • SSL traffic inspection

The DDoS Services Providers Wave also notes that CloudFlare boasts fast mitigation times, and that our customers gave us high marks for service delivery. The report cited CloudFlare’s excellent capabilities to deliver hybrid DDoS solutions as well.

So how does the report evaluate vendors? It evaluates vendors based on three major categories, each with specific criteria:

  • Current offering: The strength of vendors’ current DDoS product offering is based on evaluation categories including: business description, amplification attack defense, attack types defended, customer portal features, customer references, data/scrubbing center geographic presence, SSL traffic inspection, and standard mitigation times.

  • Strategy: Vendors’ position on the horizontal axis of Continue reading

Sounds can knock drones out of the sky

Knocking a drone out of the sky is sometimes possible using an invisible weapon—sound.The vulnerability in some drones comes from a natural property of all objects—resonance. Take a wine glass: if a sound is created that matches the natural resonant frequency of the glass, the resulting effects could cause it to shatter.The same principle applies to components inside drones. Researchers at the Korea Advanced Institute of Science and Technology (KAIST) in Daejon, South Korea, analyzed the effects of resonance on a crucial component of a drone, its gyroscope. Their paper will be presented next week at the 24th USENIX Security Symposium in Washington, D.C.To read this article in full or to leave a comment, please click here

NetSol’s new con; renewing unwanted .xyz domains

My friend Michael Williams, a private investigator based in Santa Barbara, Calif., is really pissed off with Network Solutions. This is what made him mad: Mike Williams That’s from an email message he received from Network Solutions a couple of weeks ago and Mike’s problem is that he doesn’t own the domain mswssi.xyz. While Mike does own the domains mswssi.com, mswssi.net, and mswssi.org this was a domain he knew nothing about so the letter made no sense. Mike called Network Solutions customer service and discovered that he had been “given” the domain by the company but, to his knowledge, had never been told anything about it. To read this article in full or to leave a comment, please click here

Using Vagrant and Docker Machine Together

In this post, I’m going to show you a quick tip I used today to combine the power of Vagrant with that of Docker Machine to quickly and easily create Docker-enabled virtual machines (VMs) on your laptop. This could be useful in a variety of scenarios; I leave it as an exercise for the reader to determine the best way to leverage this functionality in his or her own environment.

In my case, I needed to be able to easily create/destroy/recreate a couple of Docker-enabled VMs for a project on which I’m working. The problem I faced was that the tools I would normally use for such a task—Vagrant and Docker Machine—each had problems when used on their own:

  • Vagrant has a Docker provisioner, but I could only get it to install the latest released version of Docker. In my case, I needed to run a test version (specifically, the RC2 build of Docker 1.8.0).
  • Docker Machine has various back-end drivers that can create VMs into which Docker is provisioned, but the VMware Fusion driver for Machine only works with Boot2Docker. In my case, I needed to run Ubuntu 14.04 in the VMs.

As it turns Continue reading

How to set up a local account in Windows 10 during or after installation

You can setup a local account in Windows 10 during a clean installation, as well as after installing Windows 10 using a Microsoft account. The process is a bit more straightforward than it was with Windows 8.If you wanted to create a local account in Windows 8.1, Microsoft made you jump through hoops and numerous screens before finally selecting "Sign in without a Microsoft account (not recommended)." Skip down to the second half if you want to know how to create a local account while installing Windows 10.To read this article in full or to leave a comment, please click here

How to setup a local account in Windows 10 during or after installation

You can setup a local account in Windows 10 during a clean installation and you can also setup a local account after installing Windows 10 using a Microsoft account. The process is a bit more straightforward than it was in Windows 8. If you wanted to create a local account in Windows 8.1, Microsoft made you jump through hoops and numerous screens before finally selecting “Sign in without a Microsoft account (not recommended).” Skip down to the second half if you want to know how to create a local account while installing Windows 10.To read this article in full or to leave a comment, please click here

Salesforce taps Instagram’s new API with tailored marketing tools

Users of Salesforce’s Marketing Cloud on Tuesday gained easier access to Instagram’s roughly 300 million users thanks to an integration made possible by a new API.Marketers can now use Salesforce’s cloud software to buy and manage Instagram advertising, publish content and offer customer service on the photo and video sharing site, among other capabilities.Making the new integration possible is Instagram’s Ad API, which was originally announced in June. At the time, the site said it would initially open up the application programming interface just to a select group of Facebook marketing partners and agencies.To read this article in full or to leave a comment, please click here

Who goes there? CA will know with Xceedium buy

In a move to round out its portfolio of enterprise identity management software, CA Technologies is acquiring security software provider Xceedium.The purchase will allow CA to offer to enterprises more comprehensive coverage of who is allowed on their sensitive networks and systems, according to CA.Identity management is proving to be an increasingly vital component to securely managing the enterprise. It is the process of assigning each employee or contractor a systems account, and then limiting that user to only those systems that he or she has a legitimate reason to use.The recent breach at the U.S. Office of Personnel Management might have been thwarted, for instance, through tighter access controls.To read this article in full or to leave a comment, please click here

Docker

written by Brian Goff, Technical Alliances at Docker, Inc. Integration allows Oracle users to easily distribute applications built and deployed in Oracle Solaris Zones Over the last year, I’ve had the opportunity to work closely with Oracle on a few … Continued

EFF-led group wants to give do-not-track some bite

For years now, checking the “do-not-track” option on your browser has been little more than wishful thinking on the part of users who care about privacy online. But now a group led by the Electronic Frontier Foundation is looking to make that a more meaningful action.The EFF and others have published a standard policy it hopes advertisers, analytics companies and publishers will adopt in order to respect the wishes of users who don’t want to be tracked online. Getting the support needed to make a real difference will be an uphill battle, they acknowledge.To read this article in full or to leave a comment, please click here

EFF-led group wants to give do-not-track some bite

For years now, checking the “do-not-track” option on your browser has been little more than wishful thinking on the part of users who care about privacy online. But now a group led by the Electronic Frontier Foundation is looking to make that a more meaningful action.The EFF and others have published a standard policy it hopes advertisers, analytics companies and publishers will adopt in order to respect the wishes of users who don’t want to be tracked online. Getting the support needed to make a real difference will be an uphill battle, they acknowledge.To read this article in full or to leave a comment, please click here

CEO Rich Napolitano Named to the 2015 CRN Top 100 Executives List

We’re thrilled that CEO, Rich Napolitano has been named to CRN®’s Top 100 list of the IT industry’s foremost channel leaders. CRN’s annual list recognizes the efforts of agile decision-makers who play an integral role in evolving the way the channel does business. These 100 leaders, picked by the CRN editorial staff, represent the pre-eminent innovators, influencers, disrupters and channel sales leaders in the IT channel today.

Rich has been at the helm of Plexxi since November 2014. He brought with him a simple formula to success: bring high quality and disruptive products to market through partners that are looking to carve a new path in the market. With channel partners like CloudGov Technologies and Arrow Electronics, Plexxi is bringing this vision to the market and ushering in the next era of IT.

CRN also named Plexxi a 2015 Emerging Vendor, and reporter Michael Novinson recently spoke exclusively with Rich about our newly announced channel distribution agreement with Arrow Electronics and how this helps move the industry further faster.

“We are at a major transition point and opportunity in the IT landscape. This transformation will not only upend the networking industry as we know but will transform the Continue reading

Senate heads toward vote on CISA cyberthreat info sharing bill

The U.S. Senate could take a preliminary vote as soon as Wednesday on a controversial bill intended to encourage businesses to share cyberthreat information with each other and with government agencies, despite concerns that the legislation would allow the widespread sharing of personal customer data.Senate leaders are attempting to iron out compromise language to address privacy concerns in the Cybersecurity Information Sharing Act (CISA), but if no compromise is reached Senate Majority Leader Mitch McConnell will schedule a so-called cloture vote on Wednesday morning, said a spokesman for McConnell, a Kentucky Republican.A cloture vote would limit debate on the bill and move the Senate toward final passage, potentially before the Senate leaves for a four-week summer recess this weekend.To read this article in full or to leave a comment, please click here

First Look: AnsibleFest San Francisco 2015

Untitled_design

We are happy to announce that AnsibleFest will be returning to San Francisco this November. After a sell-out AnsibleFest in New York City, we have moved the West Coast event to an even larger location. 

If you are new to Ansible, AnsibleFest is a day-long conference bringing together hundreds of Ansible users, developers and industry partners to share best-practices, case studies and Ansible news. AnsibleFest is for anyone who is passionate (or becoming passionate) about Ansible.

Attendees include DevOps engineers, operations engineers, open source fans, systems engineers, system administrators, operations staff, release engineers, DBAs, network engineers and security professionals.

Again, we are offering Super Early Bird pricing for just $275 a ticket through August 31st. Don't miss out as we are only offering a limited number of Super Early Bird tickets at this time.

We are also accepting speaker applications here.

Here is a sample of what to expect at AnsibleFest San Francisco 2015.

See all of the presentations here.

Learn More About AnsibleFest San Francisco 2015

 

FAA has approved more than 1,000 drone exemptions

The Federal Aviation Administration today said it has issued 1,008 exemptions to businesses wanting to fly unmanned aircraft in the national airspace.The FAA said most of the exemptions allow aerial filming for uses such as motion picture production, precision agriculture and real estate photography. The agency also said it has issued grants for new and novel approaches to inspecting power distribution towers and wiring, railroad infrastructure and bridges.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2015 (so far!)+To read this article in full or to leave a comment, please click here