FCC plans to fine AT&T $100 million over ‘unlimited’ data plans

The Federal Communications Commission plans to fine AT&T $100 million for misleading customers by throttling speeds on the lines of millions of customers who had "unlimited" data plans.The FCC alleges that AT&T did not adequately disclose to its customers on "unlimited" data plans that their speed would slow drastically after they had reached a monthly data allowance of 5GBs. The policy began in 2011.Data speeds were significantly slowed to 512kbps from the advertised 5Gbps to 12Gbps under something AT&T called its maximum bit rate policy. That very name is clearly at odds with an unlimited plan, a senior FCC official told reporters on a conference call.To read this article in full or to leave a comment, please click here

The Future of Networking – Demonstrated at the AFCEA Defensive Cyber Operations Symposium

Plexxi is excited to be participating at the AFCEA Defensive Cyber Operations Symposium June 16 – 18 at the Baltimore Convention Center with our partners CloudGov and PSSC Labs in booth# 7071!

For anyone attending the AFCEA show, be sure to stop by to see the Defense Information Systems Agency (DISA) where they will be doing an SDN Use Case Proof of Concept (POC) demonstration. Plexxi is honored to be a featured technology in this POC.

Some of the key points and functionality highlighted in the SDN Use Case Proof of Concept Presentations video below are:

  • Automated provisioning
  • Improved end-to-end management and services delivery
  • Dynamic bandwidth reallocation and scheduling
  • Less time connected in the “box”/VM
  • Reduction in requirement for direct equipment access by personnel and management systems
  • Control plane separation from data plane

See DISA’s full SDN POC video:

The demonstration pod featured at the AFCEA show (a subset demonstration of the full video shown above) highlights how a data center network, integrated with VMware, can increase agility, decrease costs and improve security. Through workflow integration, the data center network is configured through the simple process of creating virtual machines (VMs) in vSphere. Seamless mobility is supported across the entire Continue reading

Xirrus takes aim at headaches of ‘guest’ Wi-Fi networks

It’s enough to keep you on your phone’s data connection – the annoying guest wireless network. Maybe it’s got a clunky, slow-loading web portal to navigate. Maybe the password is hard to find. Or maybe it’s entirely open, but you noticed that a seedy-looking guy over there has Wireshark open on his laptop.Wireless hardware vendor Xirrus, however, is rolling out what it’s hoping is a way to simplify Wi-Fi management and make the experience less annoying – the company this week has announced an mobile data management (MDM) suite called EasyPass.+ ALSO ON NETWORK WORLD: Office 365 vs. Google for Work: A cloud comparison for small businesses + The LastPass security breach: What you need to know, do, and watch out for +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Speedier 5.4-Gigabit Wi-Fi routers coming this year

It seems like I was only just writing about the new, up-to-3.2 Gbps Wi-Fi routers, such as the drone look-alike D-Link DIR-890L.In fact, it was all of six-months ago, in my post, "Is it time to move to beamforming 802.11ac?"Well, that generation of wireless networking gear using beamforming and combining multiple bands, is about to be superseded. Microprocessor-maker Broadcom has launched new 5.4 Gbps-capable chips that will appear in routers later this year.To read this article in full or to leave a comment, please click here

Multi-datacenter Firewall Policy Automation

secdevops

Back in that world where I reinvent the commercially available wheel, I’ve been wondering for a while about how to automate the creation of firewall policies in a multi-datacenter environment. This week I started tinkering with possible ways to achieve this, and knocked up some proof of concept code in my favorite untrendy, archaic language, Perl. Don’t say it.

The key issue is that given a firewall request (source IP, destination IP, port) it’s necessary to identify the firewalls and zones to which those rules apply, in order that rules can be automatically built in the right place(s). An additional twist I’ve seen is firewalls that have multiple routing instances, each of which maintains its own set of zones, effectively isolated from each other, even though they’re all on the same firewall.

Graphing Firewalls

I spent a while thinking about ways to model the firewall architecture, and kept on getting caught up on the firewalls with multiple routing instances. Because of the routing isolation, they behave like two separate firewalls, which makes it a little tricky to figure out the correct paths. I also wanted a solution that might also tell me which specific firewall zones were involved in the path; Continue reading

Response: The Wetware Crisis: the Dead Sea effect Or Where Have All the Good Staff Gone

Nodding my head so hard my chin is hitting my chest. "What tends to remain behind is the ‘residue’ — the least talented and effective IT engineers. They tend to be grateful they have a job and make fewer demands on management; even if they find the workplace unpleasant, they are the least likely to be able to find a job elsewhere. "

The post Response: The Wetware Crisis: the Dead Sea effect Or Where Have All the Good Staff Gone appeared first on EtherealMind.

Review: The best password managers for PCs, Macs, and mobile devices

Thanks to a continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager. It's one of the easiest too.A password manager won't shield you against Heartbleed or the NSA, but it's an excellent first step in securing your identity, helping you increase the strength of the passwords that protect your online accounts because it will remember those passwords for you. A password manager will even randomly generate strong passwords, without requiring you to memorize or write down these random strings of characters. These strong passwords help shield against traditional password attacks such as dictionary, rainbow tables, or brute-force attacks.To read this article in full or to leave a comment, please click here

Review: Building Microservices

bulding microservicesBuilding Microservices
Sam Newman
ISBN: 978-1-491-95035-7

Scale out where you can, scale up where you must.

Someone, somewhere, should probably start a collection of “where you can, where must” sayings, as these rules of thumb (thumbs were used by carpenters instead of a ruler to measure an inch, apparently) are important to remember, even if they’re imprecise. Route where you can, switch where you must — really refers to using layer 3 versus layer 2 networking as much as possible — for instance. Scaling out, from the perspective of network engineering, is all about repeatable modules, spine and leaf fabrics, and distribution of the control plane (didn’t think of that last one, did you?).

But what does scaling out mean in the application development world? It means splitting services into modular pieces which interact over the network. The ultimate goal of splitting services is to get to the microservice.

But what is a microservice?

To answer this question, you need to turn to the first chapter of Scaling Microservices, which says, “Microservices are small, autonomous services that work together.” Sam Newman, in the rest of the first chapter, explains the concept well, from a number of different angles, Continue reading

The Upload: Your tech news briefing for Wednesday, June 17

Say it ain’t so: FBI probes alleged Cardinals-Astros hackEven America’s pastime isn’t safe from cybercrime: the FBI is investigating allegations that the St. Louis Cardinals hacked into computer systems belonging to rival baseball team the Houston Astros. The investigation centers on the baseball operations database, which is said to contain statistics, video and other vital information about players.Airbus joins the Internet satellite crowdCount European consortium Airbus in on the business of delivering Internet service via satellites, the Verge reports. It’s going to design and build 900 orbiters for Richard Branson’s OneWeb, which aims to provide LTE, 3G, and Wi-Fi to rural communities.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Wednesday, June 17

Say it ain’t so: FBI probes alleged Cardinals-Astros hackEven America’s pastime isn’t safe from cybercrime: the FBI is investigating allegations that the St. Louis Cardinals hacked into computer systems belonging to rival baseball team the Houston Astros. The investigation centers on the baseball operations database, which is said to contain statistics, video and other vital information about players.Airbus joins the Internet satellite crowdCount European consortium Airbus in on the business of delivering Internet service via satellites, the Verge reports. It’s going to design and build 900 orbiters for Richard Branson’s OneWeb, which aims to provide LTE, 3G, and Wi-Fi to rural communities.To read this article in full or to leave a comment, please click here