The Upload: Your tech news briefing for Friday, June 26

Self-driving cars face off when Google’s cuts off Delphi’sWith developers of autonomous vehicle technology releasing their projects into the wild, it was perhaps inevitable that two self-driving cars would eventually meet on the road. Google’s certainly seems to be programmed for assertive behavior: According to the director of Delphi Labs, one of Google’s self-driving Lexus RX test vehicles cut off Delphi’s test car on a street in Mountain View, California. Apparently the Delphi vehicle did as your parents advised and drove defensively, preventing a collision.To read this article in full or to leave a comment, please click here

IBM Power Systems GM: Big scale and big data demand OpenPower

IBM’s Power Systems division – which sells servers and systems based on the Power system architecture, as opposed to the Intel-based x86 architecture used in most personal computers – had been in free-fall for some time, posting year-on-year revenue declines of up to 37% per quarter over the past couple of years. According to the conventional wisdom, Power was another victim – along with SPARC and, to a lesser extent, ARM – of the inexorable march of the commodity x86 server.+ ALSO ON NETWORK WORLD: Red Hat makes its case to be THE container company + IBM, Box partner on cloud analytics technologies +To read this article in full or to leave a comment, please click here

Bad Network Design

Bad Network Design – Availability of  a system is mainly measured with two parameters. Mean time between failure (MTBF) and Mean time to repair (MTTR) MTBF is calculated as average time between failures of a system. MTTR is the average time required to repair a failed component (Link, node, device in networking terms) Operator mistakes […]

The post Bad Network Design appeared first on Network Design and Architecture.

Bi-Modal IT Bemusement – I Call It Project-Driven IT

I’ve been much amused byBi-Modal IT that Gartner coughed up a few months back. Bimodal IT refers to having two modes of IT, each designed to develop and deliver information- and technology-intensive services in its own way. Mode 1 is traditional, emphasizing scalability, efficiency, safety and accuracy. Mode 2 is nonsequential, emphasizing agility and speed. […]

The post Bi-Modal IT Bemusement – I Call It Project-Driven IT appeared first on EtherealMind.

Facebook like Google makes scant progress in hiring blacks, women

Facebook and other tech companies aren’t changing the racial mix or the percentage of women in their workforce fast enough, which has become a matter of concern to civil rights activists.Blacks, for example, accounted for 2 percent of Facebook’s U.S. workforce as of May 31 this year, according to diversity data released by the company on Thursday. The corresponding figure for June last year was again 2 percent.The figure for Hispanics also remained at 4 percent of the U.S. workforce, while people of two or more races accounted for 3 percent.A positive but minute change was that the percentage of female employees increased from 31 percent in June 2014 to 32 percent in May 2015. The figures for participation by women are calculated by the company on a worldwide basis.To read this article in full or to leave a comment, please click here

Software-Defined Hardware Forwarding Pipeline on HP Switches

Writing OpenFlow controllers that interact with physical hardware is harder than most people think. Apart from developing a distributed system (which is hard in itself), you have to deal with limitations of hardware forwarding pipelines, differences in forwarding hardware, imprecise abstractions (most vendors still support single OpenFlow table per switch), and resulting bloated flow tables.

Read more ...

Magento e-commerce platform targeted with sneaky code

Attackers are using a sneaky method to steal payment card data from websites using Magento, eBay’s widely used e-commerce platform.Researchers from Sucuri, a company that specializes in securing websites, said the attackers can collect any data submitted by a user to Magento but carefully filters out anything that doesn’t look like credit card data.The attackers are injecting their malicious code into Magento, but it’s still unclear how that process happens, wrote Peter Gramantik, a senior malware researcher with Sucuri.“It seems though that the attacker is exploiting a vulnerability in Magento core or some widely used module/extension,” he wrote.To read this article in full or to leave a comment, please click here

Cisco warns of default SSH keys shipped in three products

Cisco Systems said Thursday it released a patch for three products that shipped with default encryption keys, posing a risk that an attacker with the keys could decrypt data traffic.The products are Cisco’s Web Security Virtual Appliance, Email Security Virtual Appliance and Security Management Virtual Appliance, it said in an advisory. Versions downloaded before Thursday are vulnerable.Cisco said it “is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.”The three products all shipped with preinstalled encryption keys for SSH (Secure Shell), which is used to remotely log into machines. It’s considered a bad security practice to ship products that all have the same private keys.To read this article in full or to leave a comment, please click here

Cisco warns of default SSH keys shipped in three products

Cisco Systems said Thursday it released a patch for three products that shipped with default encryption keys, posing a risk that an attacker with the keys could decrypt data traffic.The products are Cisco’s Web Security Virtual Appliance, Email Security Virtual Appliance and Security Management Virtual Appliance, it said in an advisory. Versions downloaded before Thursday are vulnerable.NEW CISCO CEO: Meet the Real Chuck RobbinsTo read this article in full or to leave a comment, please click here

Scott McNealy on privacy: You still don’t have any

Scott McNealy is best known for his role as cofounder and long-serving CEO at Sun Microsystems, but some remember him even better for a few choice comments he made about privacy back in 1999.Consumer privacy issues are a “red herring,” McNealy told a group of reporters that year. “You have zero privacy anyway. Get over it.”The statement seemed shocking all those years ago, but its pertinence has only increased over time. Privacy is the hot-button issue in this era of social profiling and mass surveillance, and concern among consumers is growing—with good reason.To read this article in full or to leave a comment, please click here

Here’s how Facebook wants to make sharing links easier on mobile

Sharing links with friends in Facebook’s mobile app is a pain that requires—gasp—leaving Facebook and copying and pasting URLs. Now there’s a feature that simplifies the process.Facebook has added a new button in its iOS app that appears when you’re composing a status update. It appears as a link icon in the lower bar. Tap it, and you’ll be able to search for videos, articles and other links that have previously been shared on Facebook. The feature, called “add a link,” will let you view the articles and embed one in your status update with a single tap.It’s not clear how many links are in Facebook’s database, but they’re culled from the company’s index of roughly one trillion posts, wrote Facebook engineering manager Tom Whitnah.To read this article in full or to leave a comment, please click here

Yahoo spruces up mobile search with related content

Yahoo is updating its search service on mobile devices, taking a leaf out of Google’s book and highlighting content such as images, videos and reviews ahead of regular search results.The changes, announced Thursday, apply to Yahoo search on the mobile web in the U.S., in browsers such as Safari and Chrome. Yahoo’s mobile app and desktop site already provide some additional content within results.A search on the mobile web for Barack Obama, for instance, displays information about him from Wikipedia, such as his height and birth date, as well as links to news, images and YouTube videos. In one search Thursday, the videos included some curious choices, including “Barack Obama is Illuminati.”To read this article in full or to leave a comment, please click here

Satya Nadella’s new mission for Microsoft: help people ‘achieve more’

Microsoft CEO Satya Nadella laid out his new mission for the company in an email sent out Thursday to all employees.“Our mission is to empower every person and every organization on the planet to achieve more,” he wrote.It’s a much briefer mission statement than the one he unveiled when he took over the top job last year, and indicative of the changes Nadella has made since he took Microsoft’s helm. During his tenure, Microsoft has focused on broadening the reach of its services and applications across platforms and has pushed ahead with a new version of its Windows operating system.To read this article in full or to leave a comment, please click here

Enterprise disaggregation is inevitable

Back in March, the issue was raised whether disaggregation – decoupling network software from hardware for lower cost, choice and flexibility – could play in the enterprise as well as the service provider realm.The answer, judging by recent events, is that it can. But currently to a lesser extent than it does with service providers, who will still reap most of the benefits of initial enterprise deployments.Announcements by Pica8, Ciena and AT&T that they plan to offer bare metal and white box switches, and virtual network functions as customer premises equipment, do signal that enterprises are indeed a target for disaggregation. But penetration is currently limited to that – CPE supplied and managed by service providers for the purpose of connecting that enterprise to its service network.To read this article in full or to leave a comment, please click here

WAN optimization using real-time traffic analytics

TATA Consultancy Services white paper, Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA, demonstrates how real-time traffic analytics and SDN can be combined to perform real-time traffic engineering of large flows across a WAN infrastructure.
The architecture being demonstrated is shown in the diagram (this diagram has been corrected - the diagram in the white paper incorrectly states that sFlow-RT analytics software uses a REST API to poll the nodes in the topology. In fact, the nodes stream telemetry using the widely supported, industry standard, sFlow protocol, providing real-time visibility and scaleability that would be difficult to achieve using polling - see Push vs Pull).

The load balancing application receives real-time notifications of large flows from the sFlow-RT analytics software and programs the SDN Controller (in this case OpenDaylight) to push forwarding rules to the switches to direct the large flows across a specific path. Flow Aware Real-time SDN Analytics (FRSA) provides an overview of the basic ideas behind large flow traffic engineering that inspired this use case.

While OpenDaylight is used in this example, an interesting alternative for this use case would be the ONOS SDN controller running the Segment Routing application. ONOS Continue reading

OPM’s efforts to fix IT security are criticized by auditor

Efforts to fix cybersecurity problems at the U.S. Office of Personnel Management (OPM) may be doomed because the agency is moving too quickly and ignoring some best practices, an auditor said Thursday.Even before two recently disclosed breaches at OPM, agency director Katherine Archuleta pushed to improve cybersecurity at the agency, which still runs several mainframe systems.But a “massive” agency-wide effort to update decades-old systems is not following proper IT project management procedures, including a cost-benefit analysis, and the agency does not have a firm estimate on the cost of the project, said Patrick McFarland, OPM’s inspector general.To read this article in full or to leave a comment, please click here

Interning with Rocket Turtle at Cumulus Networks

Julien-Blog Image

My amazing California journey as a French undergrad software engineer.

Most days, the first thing I do in the morning is wake up and check my email. That’s normal, but on March 2014, I received a special email that would change my life forever. This email was from the Cumulus Networks VP of Engineering, Shrijeet Mukherjee, offering me an internship on the Cumulus Networks engineering team. I was so thrilled that I literally jumped out of bed and started the victory dance (which by the way is much stronger than a cup of coffee).

I could have ended up interning at a less “cool” random French consulting company, but I wasn’t really passionate about this option anymore now that I had the opportunity to join the hottest startup in the networking industry in Mountain View, California.

I’m so excited to share my experience!

My time at Cumulus Networks, May through September 2014, was the final internship of my bachelor program at EPITECH in Rennes, France, where I’ve been pursuing a 5-year Bachelor/Masters degree in Software Engineering. I had several internship offers in various parts of the world (Germany, Philippines, Estonia and of course, France) but I turned down all of them to Continue reading