The Future of Networking – Demonstrated at the AFCEA Defensive Cyber Operations Symposium

Plexxi is excited to be participating at the AFCEA Defensive Cyber Operations Symposium June 16 – 18 at the Baltimore Convention Center with our partners CloudGov and PSSC Labs in booth# 7071!

For anyone attending the AFCEA show, be sure to stop by to see the Defense Information Systems Agency (DISA) where they will be doing an SDN Use Case Proof of Concept (POC) demonstration. Plexxi is honored to be a featured technology in this POC.

Some of the key points and functionality highlighted in the SDN Use Case Proof of Concept Presentations video below are:

  • Automated provisioning
  • Improved end-to-end management and services delivery
  • Dynamic bandwidth reallocation and scheduling
  • Less time connected in the “box”/VM
  • Reduction in requirement for direct equipment access by personnel and management systems
  • Control plane separation from data plane

See DISA’s full SDN POC video:

The demonstration pod featured at the AFCEA show (a subset demonstration of the full video shown above) highlights how a data center network, integrated with VMware, can increase agility, decrease costs and improve security. Through workflow integration, the data center network is configured through the simple process of creating virtual machines (VMs) in vSphere. Seamless mobility is supported across the entire Continue reading

Xirrus takes aim at headaches of ‘guest’ Wi-Fi networks

It’s enough to keep you on your phone’s data connection – the annoying guest wireless network. Maybe it’s got a clunky, slow-loading web portal to navigate. Maybe the password is hard to find. Or maybe it’s entirely open, but you noticed that a seedy-looking guy over there has Wireshark open on his laptop.Wireless hardware vendor Xirrus, however, is rolling out what it’s hoping is a way to simplify Wi-Fi management and make the experience less annoying – the company this week has announced an mobile data management (MDM) suite called EasyPass.+ ALSO ON NETWORK WORLD: Office 365 vs. Google for Work: A cloud comparison for small businesses + The LastPass security breach: What you need to know, do, and watch out for +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Speedier 5.4-Gigabit Wi-Fi routers coming this year

It seems like I was only just writing about the new, up-to-3.2 Gbps Wi-Fi routers, such as the drone look-alike D-Link DIR-890L.In fact, it was all of six-months ago, in my post, "Is it time to move to beamforming 802.11ac?"Well, that generation of wireless networking gear using beamforming and combining multiple bands, is about to be superseded. Microprocessor-maker Broadcom has launched new 5.4 Gbps-capable chips that will appear in routers later this year.To read this article in full or to leave a comment, please click here

Multi-datacenter Firewall Policy Automation

secdevops

Back in that world where I reinvent the commercially available wheel, I’ve been wondering for a while about how to automate the creation of firewall policies in a multi-datacenter environment. This week I started tinkering with possible ways to achieve this, and knocked up some proof of concept code in my favorite untrendy, archaic language, Perl. Don’t say it.

The key issue is that given a firewall request (source IP, destination IP, port) it’s necessary to identify the firewalls and zones to which those rules apply, in order that rules can be automatically built in the right place(s). An additional twist I’ve seen is firewalls that have multiple routing instances, each of which maintains its own set of zones, effectively isolated from each other, even though they’re all on the same firewall.

Graphing Firewalls

I spent a while thinking about ways to model the firewall architecture, and kept on getting caught up on the firewalls with multiple routing instances. Because of the routing isolation, they behave like two separate firewalls, which makes it a little tricky to figure out the correct paths. I also wanted a solution that might also tell me which specific firewall zones were involved in the path; Continue reading

Response: The Wetware Crisis: the Dead Sea effect Or Where Have All the Good Staff Gone

Nodding my head so hard my chin is hitting my chest. "What tends to remain behind is the ‘residue’ — the least talented and effective IT engineers. They tend to be grateful they have a job and make fewer demands on management; even if they find the workplace unpleasant, they are the least likely to be able to find a job elsewhere. "

The post Response: The Wetware Crisis: the Dead Sea effect Or Where Have All the Good Staff Gone appeared first on EtherealMind.

Review: The best password managers for PCs, Macs, and mobile devices

Thanks to a continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager. It's one of the easiest too.A password manager won't shield you against Heartbleed or the NSA, but it's an excellent first step in securing your identity, helping you increase the strength of the passwords that protect your online accounts because it will remember those passwords for you. A password manager will even randomly generate strong passwords, without requiring you to memorize or write down these random strings of characters. These strong passwords help shield against traditional password attacks such as dictionary, rainbow tables, or brute-force attacks.To read this article in full or to leave a comment, please click here

Review: Building Microservices

bulding microservicesBuilding Microservices
Sam Newman
ISBN: 978-1-491-95035-7

Scale out where you can, scale up where you must.

Someone, somewhere, should probably start a collection of “where you can, where must” sayings, as these rules of thumb (thumbs were used by carpenters instead of a ruler to measure an inch, apparently) are important to remember, even if they’re imprecise. Route where you can, switch where you must — really refers to using layer 3 versus layer 2 networking as much as possible — for instance. Scaling out, from the perspective of network engineering, is all about repeatable modules, spine and leaf fabrics, and distribution of the control plane (didn’t think of that last one, did you?).

But what does scaling out mean in the application development world? It means splitting services into modular pieces which interact over the network. The ultimate goal of splitting services is to get to the microservice.

But what is a microservice?

To answer this question, you need to turn to the first chapter of Scaling Microservices, which says, “Microservices are small, autonomous services that work together.” Sam Newman, in the rest of the first chapter, explains the concept well, from a number of different angles, Continue reading

The Upload: Your tech news briefing for Wednesday, June 17

Say it ain’t so: FBI probes alleged Cardinals-Astros hackEven America’s pastime isn’t safe from cybercrime: the FBI is investigating allegations that the St. Louis Cardinals hacked into computer systems belonging to rival baseball team the Houston Astros. The investigation centers on the baseball operations database, which is said to contain statistics, video and other vital information about players.Airbus joins the Internet satellite crowdCount European consortium Airbus in on the business of delivering Internet service via satellites, the Verge reports. It’s going to design and build 900 orbiters for Richard Branson’s OneWeb, which aims to provide LTE, 3G, and Wi-Fi to rural communities.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Wednesday, June 17

Say it ain’t so: FBI probes alleged Cardinals-Astros hackEven America’s pastime isn’t safe from cybercrime: the FBI is investigating allegations that the St. Louis Cardinals hacked into computer systems belonging to rival baseball team the Houston Astros. The investigation centers on the baseball operations database, which is said to contain statistics, video and other vital information about players.Airbus joins the Internet satellite crowdCount European consortium Airbus in on the business of delivering Internet service via satellites, the Verge reports. It’s going to design and build 900 orbiters for Richard Branson’s OneWeb, which aims to provide LTE, 3G, and Wi-Fi to rural communities.To read this article in full or to leave a comment, please click here

Google-infused storage startup Cohesity reveals itself

Mohit Aron has a tough act to follow: His previous startup, Nutanix, may be on the cusp of filing for an IPO that values the hyperconverged infrastructure company at $2.5 billion. But Aron is off to a good start with his new venture, Cohesity, which this week emerges from stealth mode with $70 million in venture funding, reference-able customers such as Tribune Media, and a focus on a potentially big market in converging the secondary storage that houses so much DevOps, data protection, analytics and other unstructured data.To read this article in full or to leave a comment, please click here

SDN/OpenFlow/NFV Workshop: Frequent Questions

One of the potential attendees of my SDN workshop sent me a long list of questions. Almost every networking engineer, team leader or CIO asks the first one:

What will happen, if we don´t follow the SDN hype (in the short term, in the medium term and in the long term)?

Answering this question is the whole idea of the workshop.

The up-to-date list of scheduled SDN workshops is available on my web site.

Read more ...

Free SSL/TLS certificate project moves closer to launch

Let’s Encrypt, a project aimed at increasing the use of encryption across websites by issuing free digital certificates, is planning to issue the first ones next month.Digital certificates are used to encrypt data traffic between a computer and a server using SSL/TLS (Secure Sockets Layer/Transport Layer Security) and for checking that a website isn’t a spoof.Let’s Encrypt is run by the Internet Security Research Group (ISRG), a new California public-benefit corporation. Its backers include Mozilla, the Electronic Frontier Foundation, Cisco and Akamai.The first certificates will not be valid unless administrators install the organization’s root certificate in their client software, wrote Josh Aas, ISRG’s executive director, in a blog post.To read this article in full or to leave a comment, please click here