Salesforce acquires mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.Toopher in Austin, Texas, said on its website that it will no longer sell its current products, but is “thrilled to join Salesforce, where we’ll work on delivering the Toopher vision on a much larger scale as part of the world’s #1 Cloud Platform.”It did not disclose the financial terms of the acquisition.Salesforce spokeswoman Karly Bolton confirmed the purchase but did not provide further details. Toopher’s website is now inaccessible, except for the notice announcing the acquisition.To read this article in full or to leave a comment, please click here

Salesforce acquires mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.Toopher in Austin, Texas, said on its website that it will no longer sell its current products, but is “thrilled to join Salesforce, where we’ll work on delivering the Toopher vision on a much larger scale as part of the world’s #1 Cloud Platform.”It did not disclose the financial terms of the acquisition.Salesforce spokeswoman Karly Bolton confirmed the purchase but did not provide further details. Toopher’s website is now inaccessible, except for the notice announcing the acquisition.To read this article in full or to leave a comment, please click here

Salesforce acquires mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.Toopher in Austin, Texas, said on its website that it will no longer sell its current products, but is “thrilled to join Salesforce, where we’ll work on delivering the Toopher vision on a much larger scale as part of the world’s #1 Cloud Platform.”It did not disclose the financial terms of the acquisition.Salesforce spokeswoman Karly Bolton confirmed the purchase but did not provide further details. Toopher’s website is now inaccessible, except for the notice announcing the acquisition.To read this article in full or to leave a comment, please click here

Big Tap sFlow: Enabling Pervasive Flow-level Visibility


Today's Big Switch Networks webinar, Big Tap sFlow: Enabling Pervasive Flow-level Visibility, describes how Big Switch uses software defined networking (SDN) to control commodity switches and deliver network visibility. The webinar presents a live demonstration showing how real-time sFlow analytics is used to automatically drive SDN actions to provide a "smarter way to find a needle in a haystack."

The video presentation covers the following topics:

  • 0:00 Introduction to Big Tap
  • 7:00 sFlow generation and use cases
  • 12:30 Demonstration of real-time tap triggering based on sFlow

The webinar describes how the network wide monitoring provided by industry standard sFlow instrumentation complements the Big Tap SDN controller's ability to capture and direct packet selected packet streams to visibility tools.

The above slide from the webinar draws an analogy for the role that sFlow plays in targeting the capture network to that of a finderscope, the small, wide-angle telescope used to provide an overview of the sky and guide the telescope to its target. Support for the sFlow measurement standard is built into commodity switch hardware and is enabled on all ports in the capture network to provide a wide angle view of all traffic in the data center. Once Continue reading

Wider use of HTTPS could have prevented attack against GitHub

The unique attack method used to disrupt the code-sharing site GitHub over the last week could have been prevented if more websites enabled encryption, the Electronic Frontier Foundation (EFF) said Wednesday.The attack against GitHub was enabled by someone tampering with regular website traffic to unrelated Chinese websites, all of which used a JavaScript analytics and advertising related tool from Baidu.Somewhere on China’s network perimeter, that analytics code was swapped out for code that transparently sent data traffic to GitHub, at times crippling parts of the popular website, particularly two projects that specialize in anti-censorship tools. It was also particularly insidious since the users whose traffic was modified didn’t know they had been roped into the attack.To read this article in full or to leave a comment, please click here

Logging in Kubernetes with Fluentd and Elasticsearch

image In previous posts, we talked about running skyDNS and Heapster on your Kubernetes cluster.  In this post, I want to talk about the last of the cluster ‘addons’ available today in the Kubernetes repository.  This add on is a combination of Fluentd, Elasticsearch, and Kibana that makes a pretty powerful logging aggregation system on top of your Kubernetes cluster.   One of the major struggles with any large deployment is logging. Having a central place to aggregate logs makes troubleshooting and analysis considerably easier to do.   That being said, let’s jump right into the configuration.

Note: I have an open PR on this addon to make it a little more flexible from a configuration perspective.  Namely, I want to be able to specify the port and protocol used by the API server to access the backend service when using the API server as a service proxy.  That being said, some of my pod/controller definitions will be different from what you see on GitHub.  I’ll point out the differences below when we come across them.

The first step is to have the Kubernetes nodes collect the logs.  This is done with a local Fluentd Continue reading

Pin-pointing China’s attack against GitHub

For the past week, the website "GitHub" has been under attack by China. In this post, I pin-point where the attack is coming from by doing an http-traceroute.

GitHub is a key infrastructure website for the Internet, being the largest host of open-source projects, most famously Linux. (I host my code there). It's also a popular blogging platform.

Among the zillions of projects are https://github.com/greatfire and https://github.com/cn-nytimes. These are mirrors (copies) of the websites http://greatfire.com and http://cn.nytimes.com. GreatFire provides tools for circumventing China's Internet censorship, the NYTimes contains news stories China wants censored.

China blocks the offending websites, but it cannot easily block the GitHub mirrors. It's choices are either to block or allow everything on GitHub. Since GitHub is key infrastructure for open-source, blocking GitHub is not really a viable option.

Therefore, China chose another option, to flood those specific GitHub URLs with traffic in order to pressure GitHub into removing those pages. This is a stupid policy decision, of course, since Americans are quite touchy on the subject and are unlikely to comply with such pressure. It's likely GitHub itself can resolve the issue, as there are a zillion ways to respond. If Continue reading

Is an SDN Switch A New Form of a Firewall?

Many people anticipated that enterprise organizations would adopt Software Defined Network (SDN) technologies later than service providers or multi-tenant data centers and cloud service providers.  We are now seeing more use of Network Functions Virtualization (NFV) within enterprises and some enterprises are starting SDN pilot projects.  As enterprises consider how to utilize SDN technologies in their data center environments, they start to consider what new security capabilities SDN can provide.  SDN switches can drop packets for flows that are not permitted by the controller.  This article explores if SDN switches can behave like a traditional firewall.To read this article in full or to leave a comment, please click here

Techie April Fools’ Day – in pictures

The corporate world is serious businessThe annual scramble for momentary flashes of attention in the public eye has become an undignified, childish reversion to the mean, and a symptom of the terrible harm the Internet has done to the business world and to the media. It is with regret that we begrudgingly direct still more of your dwindling attention span to the following unedifying “pranks,” of which we hereby express our disapproval, our tongues far from our cheeks.To read this article in full or to leave a comment, please click here

Health care industry receives first mobile apps from Apple, IBM

An enterprise mobility partnership between Apple and IBM has yielded more iPhone and iPad apps, including the first ones for the health care industry and industrial production management.Under an agreement announced last July, the two companies develop enterprises mobile apps together, and IBM sells and supports Apple hardware. The first 10 mobile apps debuted in late December and a second batch was released in March. The apps released this week bring the total offered to 22.The four new health care apps are for nurses who work in hospitals and provide home care. Hospital RN replaces a nurse’s pager and phone with an iPhone, and allows them to access a patient’s records. The app uses iBeacon technology to identify patients and displays notifications including status updates on hospital equipment that is offline, backups at the lab and patient requests.To read this article in full or to leave a comment, please click here

Health care industry receives first mobile apps from Apple, IBM

An enterprise mobility partnership between Apple and IBM has yielded more iPhone and iPad apps, including the first ones for the health care industry and industrial production management.Under an agreement announced last July, the two companies develop enterprises mobile apps together, and IBM sells and supports Apple hardware. The first 10 mobile apps debuted in late December and a second batch was released in March. The apps released this week bring the total offered to 22.The four new health care apps are for nurses who work in hospitals and provide home care. Hospital RN replaces a nurse’s pager and phone with an iPhone, and allows them to access a patient’s records. The app uses iBeacon technology to identify patients and displays notifications including status updates on hospital equipment that is offline, backups at the lab and patient requests.To read this article in full or to leave a comment, please click here

Graphene is hot, hot, hot

Super substanceThe question is becoming what can't graphene do? The material, which is a form of carbon (what’s known as an allotrope of carbon), was recently described by the National Physical Laboratory as having many extraordinary properties including superior mechanical stiffness, strength and elasticity, electrical and thermal conductivity while being optically active, chemically inert and impermeable to gases. The possession of all of these properties in a single material makes graphene a potentially disruptive technology in sectors like optoelectronics, flexible electronics, bioelectric devices, energy storage and ultrafiltration, the lab stated. Indeed, take a look at just some of the recent applications being ascribed to the material.To read this article in full or to leave a comment, please click here

Raspberry Pi 2 laptop coming with Pi-Top assembly kit

Do you want a Raspberry Pi 2 laptop? A new hardware kit coming from Pi-Top will help you build one at home in a matter of minutes.The popular US$35 Raspberry Pi 2 is an uncased computer that is already being used in drones, robots, gadgets, tablets and even desktops. The otherwise stationary computer can be transformed into a laptop even by beginners with no hardware assembly experience.The full Pi-Top kit includes a 13.3-inch screen, battery, trackpad, mousepad, laptop casings and Raspberry Pi 2, which would serve as the main motherboard. Users will be able to run a full Linux-based operating system and surf the Web, check email and run productivity software.To read this article in full or to leave a comment, please click here

Facebook ‘riffs’ on Snapchat with new group video app

Facebook has released a new app for making videos that it thinks can win over the competition by allowing collaboration among friends.The company on Wednesday released Riff, a mobile app that lets people create short videos and then share them with friends. A video creation and sharing app alone is not unique—other services like YouTube, Snapchat and Twitter provide some other apps for this—but Facebook is hoping to distinguish its app by adding a strong collaborative element to it.After someone creates a video in Riff, that person’s Facebook friends can add to the video with a video of their own. From there, friends of the friend can add to it, and so on. This has the potential to give the video a communal effect, reminiscent of the Our Stories function in Snapchat that lets people watch videos taken by others during an event or over a period of time.To read this article in full or to leave a comment, please click here

Cisco to buy SDN startup Embrane

Cisco plans to beef up its SDN [software-defined networking] technology by acquiring Embrane, a startup with an architecture for virtualized network appliances.Terms of the deal were not disclosed. Cisco is already an investor in Embrane, which is based in Santa Clara, California, near Cisco headquarters. The acquisition is expected to close within three months.M&A: 2015 enterprise network & IT mergers and acquisition trackerEmbrane’s Heleos platform can deploy software-based appliances such as firewalls across a pool of commodity servers, using more or less computing power as demands rise and fall. It lets cloud service providers quickly deploy new, differentiated services, the company says. With open APIs, users can integrate Embrane’s technology with third-party billing and orchestration tools.To read this article in full or to leave a comment, please click here

War on Hackers: a Clear and Present Danger

President Obama has upped his war on hackers by declaring a "state of emergency". This triggers several laws that grant him expanded powers, such as seizing the assets of those suspected of hacking, or taking control of the Internet.

One one hand, this seems reasonable. Hackers from China and Russia are indeed a threat, causing billions in economic damage every year, by stealing money and intellectual property. This declaration specifically targets these issues. Presumably, in the next few weeks, we'll see announcements from the Treasure Department seizing assets from Chinese companies known to have stolen intellectual property via hacking.

But on the other hand, it's problematic. Declarations of emergency tend to be permanent. We already operate under 30 declarations of emergencies dating back to the Korean war. Once government grabs new powers, it tends not to give them back. Also, this really isn't an "emergency", the hacking it addresses goes back a decade. It's obvious corruption of the "emergency" provisions in the law for the President to bypass congress and rule by decree.

Moreover, while tailored specifically to the threats of foreign hackers, it ultimately affects everyone everywhere. It allows the government to bypass due process and seize Continue reading

White Box Acronym Soup

The LightReading blog, Open Networking Acronym Soup, covers all the interest groups, communities and standards bodies that are driving this idea of Open Networking, which in itself is a grab bag of topics around SDN, NFV and of course white box/bare metal switches. A recent blog post struck a chord with me at first because the author, Marc Cohn, is a good guy and a friend.

But secondly, and more importantly to everyone else, is to point out his astute observation that “we” (people, users and vendors) try to simplify stuff by using acronyms. I agree. In my past job at Infoblox, people always wanted to know what DDI meant, I would reply in my standard excited way “DNS, DHCP and IPAM’’ and most would agree that DDI was easier to say. So let’s take a look at the acronym soup and examine several key factors that you should know about white boxes. And I will lay them out here and try to keep it simple and break the list into two sections, what you should know now, and what you need to keep an eye on…for now.

OCP – Open Compute Project – This is an organization driven Continue reading

Where SDN falls down

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Software Defined Networking (SDN) promises faster network deployment times and increased agility. Unfortunately, early SDN architectures focused only on solving connectivity challenges at layers 2 through 4 of the OSI model and largely ignored application-centric challenges at layer 4 to layer 7. Yet, layers 4 – 7 are where many of the services reside that ensure applications are fast, highly available and secure.

To read this article in full or to leave a comment, please click here