Uber shifts strategy, requiring taxi licenses for Dutch UberPop drivers

Uber will require drivers of its Dutch UberPop ride-hailing service to have a taxi license. That will not, however, be enough to mitigate its legal troubles in the country.UberPop connects passengers with drivers who use their own cars and typically don’t have a taxi license, allowing them to offer rides for a much lower fare then regular taxis.A Dutch court last year declared the service illegal, banning it because it unfairly competes with strictly regulated taxi services. Even though fines totaled €100,000, several UberPop drivers landed in court and Dutch authorities raided company offices, Uber kept on flouting the ban, operating UberPop with unlicensed drivers.To read this article in full or to leave a comment, please click here

Introducing Multi-User Organizations: Share An Account Without Sharing A Login

An enterprise needs security and controls around access.

Your web developer needs to update your website’s logo and make sure it’s live immediately, but doesn’t need access to your SSL keys. Your sysadmin manages your DNS, but doesn’t need to see your visitor traffic. Your marketing team needs to see traffic, but shouldn’t have access to your WAF.

Today CloudFlare is introducing new Multi-User functionality so that many members of a team can work together to manage one CloudFlare account, each with different levels of access.

The Super Admin, and Role-Based Permissions

CloudFlare Multi-User accounts are hierarchical, with the root privileges given to the account’s Super Administrator. The Super Administrator can add or delete users in the organization, change the permissions given to each user, and see and edit all CloudFlare settings. If there is more than one Super Administrator, the Super Administrators can remove each other, which is good practice when an employee leaves the company or switches jobs.

When a user joins a multi-user organization on CloudFlare, they can only see and access the settings that a Super Admin has delegated to them. For example, a user added to the organization as a DNS Administrator would only be Continue reading

Introduction to Storage Networking and Design

Introduction

Storage and storage protocols are not generally well known by network engineers. Networking and srorage have traditionally been two silos, Modern networks and data centers are looking to consolidate these two nettworks into one and to run them on a common transport such as Ethernet,

Hard Disks and Types of Storage

Hard disks can use different type of connectors and protocols.

  • Advanced Technology Attachment (ATA)
  • Serial ATA (SATA)
  • Fibre Channel (FC)
  • Small Computer System Interface (SCSI)
  • Serial Attached SCSI (SAS)

ATA and SATA and SCSI are older standards, newer disks will typically use SATA or SAS where SATA is more geared towards the enterprise market. FC is used to attach to Storage Area Network (SAN)

Storage can either be file-level storage or block-level storage. File-level storage provides access to a file system through protocols such as Network File System (NFS) or Common Internet File System (CIFS). Block-level storage can be seen as raw storage that does not come with a file system. Block-level storage presents Logical Unit Number (LUN) to servers and the server may then format that raw storage with a file system. VmWare uses VmWare File System (VMFS) to format raw devices.

DAS, NAS and SAN

Storage can Continue reading

Facebook, under siege, slams European privacy regulators

Facebook has warned that overlapping national probes into its privacy policy could severely endanger the European Union’s economy if such a fragmented strategy is continued and applied to other businesses.The social networking company also warned that the high cost of compliance with multiple national laws, rather than with an overarching EU regime, could cause it to introduce new features more slowly or not at all.Data protection authorities from Belgium, the Netherlands and Germany in February formed a task force to deal with Facebook’s new privacy policy, introduced late January. They suspect that the new policy violates EU privacy laws. French, Spanish and Italian authorities later joined the group.To read this article in full or to leave a comment, please click here

Going Back to the Mainframes?

25 years ago when I started my networking career, mainframes were all the rage, and we were doing some crazy stuff with small distributed systems that quickly adapted to topology changes, and survived link, port, and node failures. We called them routers.

Yes, we were crazy and weird, but our stuff worked. We won and we built the Internet, proving that we can build networks bigger than any mainframe-based solution could ever hope to be.

Read more ...

After Google, Microsoft also cracks down on misleading advertisements

Microsoft is taking a hard stance against advertisements that trick users into visiting malicious websites or downloading potentially harmful applications.The effects will be seen in Internet Explorer, whose SmartScreen Filter feature will enforce new rules against misleading ads beginning June 1. The filter will display warnings to users when they encounter such ads.“There has been a recent increase in the number of online advertisements that are intentionally misleading in nature,” Microsoft said in a blog post Tuesday. “Weve found that these types of advertisements often try to convince a user to do something, the consequences of which they may not fully understand, such as visiting an infected website or downloading a program that can negatively impact their browsing experience.”To read this article in full or to leave a comment, please click here

Here’s what Google Glass v2.0 needs

With reports that Google is developing a new version of its troubled wearable, Glass, industry watchers weighed in on what changes are needed to turn the product from being the butt of jokes to a computer that people would want to wear.After pulling Google Glass out of the public's critical gaze this past January, the Wall Street Journal reported that the company may be close to unveiling an updated version of Glass.To read this article in full or to leave a comment, please click here

Containers vs. virtual machines: How to tell which is the right choice for your enterprise

Name a tech company, any tech company, and they're investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn't mean virtual machines are out of date. They're not.Yes, containers can enable your company to pack a lot more applications into a single physical server than a virtual machine (VM) can. Container technologies, such as Docker, beat VMs at this part of the cloud or data-center game.To read this article in full or to leave a comment, please click here

Cisco secures its SDN

Cisco is looking to provide threat protection for data centers and clouds by integrating acquired security technology with its programmable, policy-based networking portfolio.Cisco this week announced that it is combining the FirePOWER threat protection services software obtained from the 2013 acquisition of Sourcefire with its Application Centric Infrastructure (ACI) automated policy fabric. ACI is Cisco’s response to software-defined networking.To read this article in full or to leave a comment, please click here

Cisco secures its SDN

Cisco is looking to provide threat protection for data centers and clouds by integrating acquired security technology with its programmable, policy-based networking portfolio.Cisco this week announced that it is combining the FirePOWER threat protection services software obtained from the 2013 acquisition of Sourcefire with its Application Centric Infrastructure (ACI) automated policy fabric. ACI is Cisco’s response to software-defined networking.To read this article in full or to leave a comment, please click here

Microsoft preaches the gospel of universal apps at Build

With its universal Windows apps concept, Microsoft is promoting the notion of apps that can be developed once and run across a variety of form factors. Unsurprisingly, the universal apps effort will be prominent at this week's Microsoft Build 2015 developer conference.The conference's session list details Microsoft's outreach in this vein, including a discussion on the use of XAML for building universal Windows apps. "XAML UI took a big step forward in Windows 10 with new controls and new features to simplify tailoring app experiences across devices," the session description says.To read this article in full or to leave a comment, please click here

10 killer tips to get your Apple Watch set up just right

Navigating the Apple Watch can be a little confusing at first, and it definitely takes a while to get your notifications dialed in so it’s not bugging you too often, but you’re still finding out what you need to know. These tips can help you adjust what the watch shows you and how, so you’ll spend less time fiddling with settings and more time enjoying your new arm candy.Take control of notifications If you’re one of those people who allows push notifications for every app on your iPhone, the Apple Watch will drive you insane. This is a gadget that requires very specific tailoring to ensure you’re only getting the most important alerts. Otherwise your wrist will be barraged with taps. Get to know the Apple Watch app on your iPhone: It will make your watch the personalized device you want.To read this article in full or to leave a comment, please click here

Spec showdown: Samsung Galaxy S6 vs. LG G4

The Samsung Galaxy S6 has emerged as the benchmark for flagship smartphones running Android, but there are lots of challengers, including the new G4 from LG Electronics.The companies have had many of the same goals when building their respective high-end models, including improving the looks and the cameras. But there are still differences that may be relevant to your purchase decision. Here’s a spec comparison between the phones:DesignA more premium design has been a common theme for this year’s launches of high-end smartphones. The Galaxy S6 combines a metal frame with a glass back, while the G4 has a plastic frame and offers the option of a back made of leather or a mixture of ceramics and plastic.To read this article in full or to leave a comment, please click here

A fantastic overview of the Elastic Cloud project from Luca Relandini

A fantastic overview of the Elastic Cloud project from Luca Relandini

This post shows how the porting of the Elastic Cloud project to a different platform is achieved with UCSD

http://lucarelandini.blogspot.com/2015/03/the-elastic-cloud-project-porting-to.html?

And don’t miss this excellent recent post which explains how to invoke UCS Director workflows via the northbound REST API.

http://lucarelandini.blogspot.com/2015/03/invoking-ucs-director-workflows-via.html 

The Upload: Your tech news briefing for Wednesday, April 29

Build opens Wednesday, here’s what to expectAt Microsoft’s Build developer’s conference—starting in San Francisco on Wednesday—look for a focus on Windows 10 phone, and tools for building universal apps that run not only across the huge installed base of Windows PCs but also on mobile devices, says PC World. It’s also likely that Microsoft will make the app store available on all of your devices, and it may outline plans for third-party app development for Office. Finally, don’t be surprised if there’s talk of Windows as a service; CEO Satya Nadella likes the idea of recurring revenue from subscriptions.To read this article in full or to leave a comment, please click here

Flaw in Realtek SDK for wireless chipsets exposes routers to hacking

The software that controls wireless networking chipsets made by Realtek Semiconductor contains a critical vulnerability that could allow attackers to compromise home routers.The flaw exists in a firmware component called miniigd that’s present in router models based on Realtek chipsets. The component is part of the software development kit (SDK) for RTL81xxx chipsets that Realtek provides to router manufacturers.The vulnerability was discovered by Ricky Lawshae, a researcher with Hewlett-Packard’s TippingPoint Digital Vaccine Labs (DVLabs) which runs the well-known Zero-Day Initiative (ZDI) bug bounty program.“An attacker could leverage this vulnerability to execute code with root privileges,” the ZDI team said in an advisory published Friday. Exploitation does not require authentication, it said.To read this article in full or to leave a comment, please click here