iPaaS: A new approach to cloud Integration

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Application integration has often been an exercise in frustration – long delays, high costs and over promises by vendors. How many ERP projects have you heard of that were canceled or shelved due to complex customization and integration challenges?

Integration though, is coming to a new place. Cloud technologies and open APIs are helping enterprises merge on-premise and off-premise systems without considerable coding and re-architecting. Instead of requiring specialists in SOA, enterprise service bus (ESB), extract transform and load (ETL) and data warehousing, organizations are hoping the concept of Integration Platform as a Service (iPaaS) can be used to integrate systems in half the time using technically-savvy generalists and increased involvement from lines of business.

To read this article in full or to leave a comment, please click here

New malware program used in attacks against energy sector companies

A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.The program, dubbed Trojan.Laziok by researchers from antivirus vendor Symantec, was used in spear-phishing attacks earlier this year against companies from the petroleum, gas and helium industries.The attacks targeted companies from many countries in the Middle East, but also from the U.S., India, the U.K., and others, according to malware researchers from Symantec.The Trojan is spread via emails with malicious documents that exploit a Microsoft Office vulnerability for which a patch has existed since April 2012.To read this article in full or to leave a comment, please click here

Tanium’s fast-acting endpoint management tool grows up

A tool for nearly real-time management of clients like desktops, laptops and Windows tablets is now set to take on massive organizations that have millions of endpoints.Tanium is software that can examine and modify all such clients across an enterprise within 15 seconds, according to the company. It’s already being used by customers with more than 500,000 endpoints, and the newly released Version 6.5 is designed to serve some of the world’s largest organizations, especially in the public sector, Tanium says.At the heart of Tanium’s software is the ability to rapidly reach all endpoints throughout an organization, which can speed up both security and IT management tasks. Tanium makes this work by organizing endpoints into linear chains in which they communicate peer to peer.To read this article in full or to leave a comment, please click here

Infinit speeds up video, photo sharing via smartphones

French company Infinit has released Android and iOS applications for free file-sharing that promise improved transmission speeds over cloud-based services.High-resolution smartphone cameras that can shoot 4K videos means that such a service is needed on mobile devices, Infinit said in a blog post on Tuesday. There are already apps for Mac OS and Windows.All the apps are free and there is no limit on file sizes or types that can be transferred. There are two ways to share files. Recipients who have the one of the apps installed get a notification they have to accept. It’s also possible to share content with users who don’t have the apps; they get a link to download it from via email.To read this article in full or to leave a comment, please click here

‘One-sentence stories’: An oxymoron from the New York Times for the Apple Watch

I figured this had to be an early April Fool’s Day joke … or the New York Times doesn’t understand that “one-sentence story” is an oxymoron.And a spokesperson for the newspaper tells me via email that it’s no joke. A press release reads: The New York Times has developed a new form of storytelling to help readers catch up in seconds on Apple Watch. One-sentence stories, crafted specially for small screens, will provide the news at a glance across many Times sections, including Business, Politics, Science, Tech and The Arts.One-sentence stories are accompanied by The Times’s award-winning photography and short, bulleted summaries. Readers can use Handoff to continue reading any story on iPhone or iPad, or tap “Save for Later” to build a personal reading list.To read this article in full or to leave a comment, please click here

Facebook tracks all site vistors, violating EU law, report says

Facebook tracks everyone who visits its site, including people who don’t have an account, and even continues to track users and non-users who have opted out of targeted ads, researchers at two Belgian universities have found.Researchers at the University of Leuven in cooperation with researchers at the Vrije Universiteit Brussel have published an update to a February analysis of Facebook’s new policies and terms. The report, commissioned by the Belgian Privacy Commission, already found in preliminary conclusions in February that Facebook, with its 2015 privacy policy update, likely acts in violation of European law.To read this article in full or to leave a comment, please click here

BrandPost: Personalizing Business Technology

The Bring Your Own Device (BYOD) revolution is in full swing. According to a global survey of CIOs by Gartner, 38 percent of companies expect to stop providing devices to workers by 2016. As BYOD adoption accelerates and consumer smartphones and other devices evolve, the technology we use at work must find a way to keep up.Consumer devices are tightening the bond between ‘Man and Machine’, and one thing is certain: our smartphones and smart watches are getting smarter. In fact, it’s eerie how smart they have become. There are the widely used personal devices: the explosion of smart watches like the highly-anticipated Apple Watch™, the enormously popular fitness bands like FITBIT®, and smartphones like Samsung’s Galaxy S6 Edge™ that are making strides in streamlined app management.To read this article in full or to leave a comment, please click here

Cumulus Linux Switch Monitoring with Datadog

As a Linux platform, one of the cool things is that we often don’t have visibility into how customers use their switches running Cumulus Linux. They buy HCL-compatible hardware from our partners, and with some training and enablement, are off to the races.

The idea for running Datadog in Cumulus Linux came about for the simple reason that we were in adjacent booths at PuppetConf last year, and we all figured it would be cool to try it out. Further, since Datadog already provides visibility across systems, apps and services, they were interested in seeing how networking can be added into the mix. As you will see, it turns out to be pretty simple.

Installing Datadog in Cumulus Linux

The Datadog agent, as with most things Debian, installs easily on Cumulus Linux. For x86 switches, this is as simple as installing a Debian package and performing simple changes in the Datadog agent files, such as the application/API key, which is the tag associated with the switch. You can easily automate this installation using common automation tools like Puppet and Ansible.

Configuration

Since the Datadog agent is designed for servers, metrics can be collected using Datadog’s SNMP plugin, a custom sFlow Continue reading

Three Tips for Technical Blogging

From time to time, I’m asked by new or potential technical bloggers for advice on how to get into writing, or how to overcome some kind of mental reservation that he/she may have.

It’s actually somewhat ironic - I still suffer from many of the same issues that I suffered from back before Keeping It Classless existed.

So, truth be told, I constantly remind myself of the same advice that I give to the bloggers-to-be that ask me for advice. It’s high time that I open the kimono a little bit and hopefully help someone in the process. Here are my top three tips for technical bloggers - whether you’re just getting started, or if you’re already fairly established but maybe hitting some blockage.

Know Why You Do It

Be keenly aware of the motivation(s) that drive your blogging. Write them down. Look at them every day. Keeping these in mind should be your primary source of energy when writing about a technical topic. Unless blogging is your actual job (in which case this Continue reading

Three Tips for Technical Blogging

From time to time, I’m asked by new or potential technical bloggers for advice on how to get into writing, or how to overcome some kind of mental reservation that he/she may have.

It’s actually somewhat ironic – I still suffer from many of the same issues that I suffered from back before Keeping It Classless existed.

So, truth be told, I constantly remind myself of the same advice that I give to the bloggers-to-be that ask me for advice. It’s high time that I open the kimono a little bit and hopefully help someone in the process. Here are my top five tips for technical bloggers – whether you’re just getting started, or if you’re already fairly established but maybe hitting some blockage.

Know Why You Do It

Be keenly aware of the motivation(s) that drive your blogging. Write them down. Look at them every day. Keeping these in mind should be your primary source of energy when writing about a technical topic. Unless blogging is your actual job (in which case Continue reading

Lebanese cyberespionage campaign hits defense, telecom, media firms worldwide

For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.The still-active attack campaign was uncovered and analyzed recently by security researchers from Check Point Software Technologies, who dubbed it Volatile Cedar. The company’s researchers found evidence that the attackers started their operation in late 2012, but have managed to fly under the radar until now by carefully adapting their tools to avoid being detected by antivirus programs.Unlike most cyberespionage groups, the Volatile Cedar attackers do not use spear phishing or drive-by downloads to gain a foothold into their victims’ networks. Instead they target Web servers and use them as initial entry points.To read this article in full or to leave a comment, please click here

Microsoft’s Surface 3 starts at $499, eligible for free Windows 10 upgrade

Microsoft wants laptop diehards to switch over to its lightweight Surface 3 tablet, which will offer PC-like performance and be eligible for a free upgrade to Windows 10 later this year.The Surface 3 tablet has a 10.8-inch screen with a 1920 x 1280-pixel resolution, and can double up as a laptop with a keyboard attachment. The tablet provides 10 hours of battery life when playing video.With prices starting at US$499, the tablet is positioned by Microsoft as a nimbler, less expensive version of the faster Surface Pro 3 tablet, which starts at $799. Surface 3 will ship in 26 countries starting in May, and an LTE version of the tablet will be available through carriers later this year, Microsoft said.To read this article in full or to leave a comment, please click here

Broken NFC terminals, lack of retail support stifling Apple Pay usage

Apple Pay got off to a hot start after its debut in October, attracting 11% of all credit card-using households and converting 66% of iPhone 6 users in its first four months on the market, according to an ongoing study of more than 3,000 credit card users conducted by market research firm Phoenix Marketing International.Although iPhone users appeared eager to try out Apple's new mobile payment plan – the study estimates that more than 88% of those who set up an Apple Pay wallet went on to make a purchase with it either in a retail store or in a mobile app – they have run short on opportunities to use them in the time since."The demand is there: 59% of Apple Pay users have gone into a store and asked to make a purchase with Apple Pay," Greg Weed, Phoenix Marketing International director of research, said in a statement. "But so is the disappointment: 47% visited a store that was listed as an Apple Pay merchant only to find out that the specific store they visited did not accept (or were not ready to accept) Apple Pay."To read this article in full or to leave Continue reading

Arista decouples switch, software pricing

Arista Networks this week decoupled the pricing of its software and switch hardware as a consumption option for cloud providers.Arista is offering its EOS operating system as a separate subscription-based license from its switch hardware. The hardware is priced under a separate bundle but its purchase requires an EOS subscription.Essentially what Arista has done is priced its hardware and software separately and offered EOS as a subscription-based license vs. a perpetual license. It’s a new consumption model for Arista kit that the vendor says is more aligned with the way cloud providers purchase and operate the products.To read this article in full or to leave a comment, please click here

VRF-Lite+GRE/dot1q or MPLS L3 VPN

I am going to create a new category on the blog which we will discuss together the different technologies,protocols, designs and architecture. You can suggest a discussion topics and you all please welcome to join the discussions in the comment box of each topic. I want to throw a first topic for the discussions !… Read More »

The post VRF-Lite+GRE/dot1q or MPLS L3 VPN appeared first on Network Design and Architecture.