Docker Experimental Networking – 1

Networking support in Docker was primitive till now. Single host connectivity was through Linux bridge and there was no native mechanism to connect Containers across hosts. With Pipework, we could do a hacky approach to connect Containers across hosts. Companies like Socketplane, Weave have been working to address this Networking gap. I have written multiple … Continue reading Docker Experimental Networking – 1

Boeing subsidiary wants to use drones to infect PCs with Hacking Team spyware

After attending IDEX 2015 (International Defense Exhibition), Boeing subsidiary Insitu become interested in using its surveillance drones to deliver Hacking Team malware for even more surveillance.In April, an Insitu mechanical engineer intern sent an email to the Hacking Team which stated: We see potential in integrating your Wi-Fi hacking capability into an airborne system and would be interested in starting a conversation with one of your engineers to go over, in more depth, the payload capabilities including the detailed size, weight, and power specs of your Galileo System.To read this article in full or to leave a comment, please click here

MikroTik CCR1072-1G-8S+ Review (Part 2) – BGP Performance *** Preview ***

Part 2 is on the way!

It has been a busy week and we have been working hard on CCR1072 testing. The full review for BGP Performance is still a few days away, but here is a sneak preview of some of the testing in the IP ArchiTechs Area 51 Lab.

We put just under 1.7 Million routes across 4 BGP peers into the CCR1072-1G-8S+ and it was fully converged in 2 Minutes and 42 seconds.

Here is a screen shot of the CCR1072-1G-8S+ after converging with 4 full feeds. 

CC1072-BGP-Peering-Preview

Self-Control

"

Even a person on a diet who sensibly avoids coming face-to-face with a piece of chocolate cake will find it hard to control himself if the chocolate cake somehow finds him. Every pastry chef in America understands this, and now neuroscience does, too. … We cannot think down the road when we are faced with the chocolate cake. … We have lost the ability to self-regulate, at all levels of the society.

" Michael Lewis/Boomerang —

LinkedInTwitterGoogle+FacebookPinterest

The post Self-Control appeared first on 'net work.

Google Capital likes CrowdStrike for endpoint protection

Next-gen endpoint protection vendor CrowdStrike has landed $100 million in new investments to beef up sales and engineering and continue its push to make anti-virus software obsolete.The company will hire at least another 70 people to boost its engineering staff as well as expand its operations outside North America. The company has about 210 employees now, says CEO George Kurtz.+ ALSO ON NETWORKWORLD: Hottest network and computing startups of 2015 +The new funding pushes total investment in the company to $156 million and makes it the first security company that Google Capital has invested in. Also participating in this C Round of funding is Rackspace, Accel Partners and Warburg Pincus.To read this article in full or to leave a comment, please click here

UCLA Health cyberattack involved sensitive data on 4.5 million people

A hack targeting UCLA Health’s computer network may have exposed personal and medical data on 4.5 million people.The attack tapped into parts of the system where sensitive details like names, birth dates and health plan identification numbers are kept, though there’s no evidence yet that the information was “actually accessed or acquired,” UCLA Health said Friday.UCLA Health, which operates four hospitals in the Los Angeles area, noticed strange activity on its network in October. UCLA Health and the FBI looked into the incident and initially believed attackers had not accessed network servers that stored personal data.To read this article in full or to leave a comment, please click here

PlexxiPulse—Switches for Next Generation Networks

The next era of IT is being forged by the evolution of virtualization, hyperconvergence, Big Data and scale-out applications. Here at Plexxi, we’re developing technology to ensure our customers are ready for that evolution. This week, we announced the launch of our new Switch 2 Series, which emphasizes applications over infrastructure. Switch 2 consolidates the network into a single tier, optimized for east/west application traffic, while eliminating the need for multiple switch types found in traditional leaf/spine architectures.

Plexxi_Switch_#2-06

Our technology allows enterprises and government agencies to move beyond the static networks of the past to create the industry’s first converged, agile and dynamic offering for third platform networks. Utilization of our switches lowers CapEx and OpEx, reduces network complexity, improves security and increases productivity, all critical characteristics of networks needed to support unprecedented amounts of data. Our own Director of Solutions Marketing, Bob Noel, blogged about the launch and its importance to the industry and how it relates to Plexxi’s vision earlier this week. Check out just some of the coverage of our announcement and its impact on the industry below.

Have a great weekend!

CRN: CRN Exclusive: Plexxi CEO Talks New ‘Next Era Converged Network’ Switch, Major Revenue Continue reading

Faced with power crisis, Africa looks to renewable energy technology

African countries, driven by the need to power base stations for mobile phone operators in the face of serious power shortages, are starting to scoop up renewable energy technology.Countries in different regions of the continent are experiencing an increasing number of power shortages, affecting the ability of businesses to run base stations, data centers, computers and other IT equipment.Energy and telecom experts have blamed African governments for not fully liberalizing the energy sector, the way the telecom sector has been liberalized, so as to encourage private investment and competition.The situation has become dire in a number of countries. Renewable energy technology is the only answer, according to Andrew Makanya, managing director at Internet Solutions Zambia.To read this article in full or to leave a comment, please click here

IBM Watson’s next trick: Helping you write better

IBM’s Watson has already proven its mettle in the kitchen and on game shows, but its latest skill set is one that could help us all: making sure our writing conveys what we want it to.Now in experimental mode, Watson Tone Analyzer is a new service that can analyze text for the attitude and tone that underlie it. The tool could help anyone refine an email, marketing message, presentation or blog post before releasing it into the world, IBM said.“To read a message and to judge the tone conveyed in the message comes naturally to humans,” explained Rama Akkiraju, a distinguished engineer and master inventor for IBM Watson User Technologies, in a Thursday blog post announcing the project. “But, at times, the tone may be overlooked, undesired or not conveyed well by the author.”To read this article in full or to leave a comment, please click here

T-Mobile to pay $17.5 million fine for 911 outages

T-Mobile USA will pay a US$17.5 million fine in a settlement with the U.S. Federal Communications Commission for two 911 emergency dialing outages on the company’s mobile network last year.The separate but related outages left T-Mobile customers without the ability to dial in to emergency response centers for about three hours. In the settlement, T-Mobile agreed to strengthen its 911 service procedures and adopt compliance measures ensuring it adheres to the FCC’s 911 service reliability and outage notification rules in the future, the agency said in a press release.The settlement represents the largest fine that the FCC has assessed against a carrier in connection with a 911 outage.To read this article in full or to leave a comment, please click here

Latest Flash Player version has improved exploit defenses

The Flash Player update released Tuesday not only fixed two vulnerabilities that were being targeted by attackers, but added additional protections that will make entire classes of security flaws much harder to exploit in the future.There were three low-level defenses added in Flash Player 18.0.0.209, two of which block a technique that has been used by many Flash exploits since 2013.The technique involves corrupting the length of an ActionScript Vector buffer object so that malicious code can be placed at predictable locations in memory and executed. ActionScript is the programming language in which Flash applications are written.This method was used by at least two of the Flash Player exploits found among the files leaked from Italian surveillance software maker Hacking Team, as well as in two other flash zero-day exploits used by cyberespionage groups this year, researchers from Google said in a blog post Thursday.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Friday, July 17

Google reports strong earnings, but slowing growthGoogle’s second quarter income of $3.93 billion reported Thursday was up 17 percent year-on-year, but its sales of $17.73 billion represented an 11 percent growth rate, the smallest revenue increase reported by the company since 2012. Google is struggling to grow its ad revenue on mobile devices: ads in mobile search results are smaller, and can yield fewer interactions from users, driving down their price.Apple, Samsung may join in launch of embedded SIM cardsTo read this article in full or to leave a comment, please click here