FAA: Big tech challenges for massive Washington, DC warbirds flyover

It will be one of the largest gatherings of flying WWII aircraft in history as 56 famous vintage warbirds will fly through restricted airspace over the National Mall Friday in remembrance of the 70th anniversary of VE-Day or Victory in Europe Day.The huge flyover, dubbed the “The Arsenal of Democracy,” of so many different types of aircraft – from seaplanes to fighters and the only flying B-29 Superfortress – was no easy undertaking. Reuters P-38 Lightning (right); P-51 (left)To read this article in full or to leave a comment, please click here

Four cool vendors in the Internet of Things

What’s cool?The Internet of Things presents unique challenges to businesses considering the secure use of these devices. Gartner has taken a look at some of the vendors trying to address these concerns and has designated four of them cool. It’s not an exhaustive list, Gartner says, but it highlights interesting, new and innovative vendors, products and services.To read this article in full or to leave a comment, please click here

AMD developing mega-chip that combines CPUs and GPUs

AMD will battle Intel for computer performance supremacy with a new high-speed chip that could be the fastest when it ships.The chip will combine many CPUs and graphics processors in a single package. It will deliver multiple teraflops of performance, and will be targeted at high-end graphics, supercomputing and data modeling.The chip doesn’t have a name yet, and could be released in the next two years, said Forrest Norrod, senior vice president at AMD, during an investor meeting on Wednesday.There is no chip that mixes CPUs and GPUs, and AMD wants to introduce the concept to high-performance computing, Norrod said.For decades, AMD and Intel have been locked in a leapfrogging race, one-upping each other by increasing their chips’ clock speeds. At the height of the chip wars in 2011, AMD claimed a Guinness World Record for achieving the “highest frequency of a computer processor” with its eight-core FX chip, which ran at a clock speed of 8.4GHz. The silliness of the chip battles dissipated soon after, though chip makers still love to parade high-performance chips as a sign of technological progress.To read this article in full or to leave a comment, please click here

Appeals court judge shoots down DOJ’s defense of NSA phone program

A U.S. appeals court judge shredded the government’s defense of an extensive National Security Agency program targeting the phone records of the nation’s residents.Judge Gerard Lynch, writing for a three-judge panel in the U.S. Court of Appeals for the Second Circuit, picked apart the Department of Justice’s arguments for the phone records collection program, revealed by former NSA contractor Edward Snowden in mid-2013.The appeals court ruled that Congress didn’t authorize the massive phone records collection in the Patriot Act of 2001, the antiterrorism law the past two U.S. presidents have used as a basis for the collection. A representative of the U.S. White House’s National Security Council noted that President Barack Obama’s administration is working with Congress to create a more limited program.To read this article in full or to leave a comment, please click here

Appeals court judge shoots down DOJ’s defense of NSA phone program

A U.S. appeals court judge shredded the government’s defense of an extensive National Security Agency program targeting the phone records of the nation’s residents.Judge Gerard Lynch, writing for a three-judge panel in the U.S. Court of Appeals for the Second Circuit, picked apart the Department of Justice’s arguments for the phone records collection program, revealed by former NSA contractor Edward Snowden in mid-2013.The appeals court ruled that Congress didn’t authorize the massive phone records collection in the Patriot Act of 2001, the antiterrorism law the past two U.S. presidents have used as a basis for the collection. A representative of the U.S. White House’s National Security Council noted that President Barack Obama’s administration is working with Congress to create a more limited program.To read this article in full or to leave a comment, please click here

Cisco VIRL Exclude From Launch

<hr> One of the few pet-peeves with Cisco’s VIRL has been waiting for a bunch of things to start, when I just needed a couple from that simulation. Not sure if this is a new update though it’s...

[[ Summary content only, you can read everything now, just visit the site for full story ]]

5 Reasons to Attend Cumulus Linux Boot Camp

Sure, you’re smart and can figure out Cumulus Linux on your own. Or maybe you can’t spare 8 hours for training. If you don’t think you have the time or can benefit from attending the Cumulus Linux Boot Camp as you get started with open networking, here are five good reasons to think again.

1. Save Time

Yes, you can actually SAVE time deploying and managing your network by investing time in training. Our Cumulus Linux Boot Camp is an instructor-led, hands-on training course for networking and sysadmins, optimized to get you going quickly with open networking using Cumulus Linux. You could read the documentation and try to figure things out on your own, but why not maximize your time by leveraging a course where the essential information is gathered in a single place, presented in a methodical order?

2. Access Experts

Our class is taught by technical trainers and consultants who are well-versed with open networking. It’s a great venue to get answers to your questions.

3. Get Stick Time on Switches

This course includes hands-on labs using switches in our Cumulus Workbench. You’ll run through practical exercises and be provided with lab answers and sample code to increase Continue reading

Cisco ACI users up, TCO down

While Cisco’s SDN customers are trending up, the TCO benefits of its solution are trending down. At its recent Cisco Partner Summit, Insieme SVP Soni Jiandani held up a slide that claimed over 2,655 customers for the Nexus 9000 switch and over 585 customers for the Application Centric Infrastructure APIC controller.The slide was tweeted by CEO-in-waiting Chuck Robbins:To read this article in full or to leave a comment, please click here

Lyft turns to Verizon for an edge against Uber

Lyft is looking to better compete against larger rival Uber through a partnership with Verizon Wireless.Lyft’s ride-hailing app will now come preloaded on select Verizon Android smartphones, under a national partnership with the carrier that Lyft is announcing Thursday. The change will go into effect immediately for the newest Android smartphones, Lyft said. It didn’t specify which handsets are included. The partnership does not change the way Lyft’s app works.The deal, the first of its kind between the companies, will get Lyft’s app in front of more potential users. Lyft’s service, which lets people request rides through their smartphones, is currently available in 65 cities across the U.S. Uber is active in more than 300 cities and nearly 60 countries.To read this article in full or to leave a comment, please click here

Lyft turns to Verizon for an edge against Uber

Lyft is looking to better compete against larger rival Uber through a partnership with Verizon Wireless.Lyft’s ride-hailing app will now come preloaded on select Verizon Android smartphones, under a national partnership with the carrier that Lyft is announcing Thursday. The change will go into effect immediately for the newest Android smartphones, Lyft said. It didn’t specify which handsets are included. The partnership does not change the way Lyft’s app works.The deal, the first of its kind between the companies, will get Lyft’s app in front of more potential users. Lyft’s service, which lets people request rides through their smartphones, is currently available in 65 cities across the U.S. Uber is active in more than 300 cities and nearly 60 countries.To read this article in full or to leave a comment, please click here

Overwhelmed – CCDE

I am preparing for the CCDE written exam, which I have coming up at CLUS.

There are so much material to go through, both to read as well as watch CL presentations, it can be a bit overwhelming at times.

So if you are thinking about going down this path, learn how to speed-read :)

Just under a month until we leave for the US. We are looking very much forward to the break!

Just a quick thought for the day!

Cloud disasters can and will happen. Are you prepared?

It's going to happen, and happen to you and your organization. No, I'm not a salesguy, otherwise bereft of booth babes at RSA. I'm a systems engineer going back to the days of SNA, DSLAMs, CSU/DSUs, ARCNet over NetWare, and other ancient interconnect. Stuff happens.So, whatchya gonna do? What is your plan?Did you notice how none of this cloud stuff talks to none of this cloud stuff among competing vendors? Even the mighty Open Data Center Alliance can't help you if you don't have a plan, and haven't tried to do a failover successfully.This year, thankfully, we dodged a number of hurricanes and tornadoes. The snows were gruesome, but it was rare to see data centers go down because of it. The cloud usually kept on ticking.To read this article in full or to leave a comment, please click here

Appeals court rules against NSA phone records collection

The U.S. National Security Agency’s program to collect domestic telephone records in bulk was not authorized by Congress in the Patriot Act, an appeals court has ruled.The NSA’s phone records program violates U.S. law because it “exceeds the scope of what Congress has authorized,” a three-judge panel for the U.S. Court of Appeals for the Second Circuit has ruled.The appeals court vacated a December 2013 ruling by a district court judge who granted the government a motion to dismiss the case, but upheld the district court decision to deny plaintiffs, including the American Civil Liberties Union, a preliminary injunction to halt the so-called phone metadata collection program.To read this article in full or to leave a comment, please click here

Appeals court rules against NSA phone records collection

The U.S. National Security Agency’s program to collect domestic telephone records in bulk was not authorized by Congress in the Patriot Act, an appeals court has ruled.The NSA’s phone records program violates U.S. law because it “exceeds the scope of what Congress has authorized,” a three-judge panel for the U.S. Court of Appeals for the Second Circuit has ruled.The appeals court vacated a December 2013 ruling by a district court judge who granted the government a motion to dismiss the case, but upheld the district court decision to deny plaintiffs, including the American Civil Liberties Union, a preliminary injunction to halt the so-called phone metadata collection program.To read this article in full or to leave a comment, please click here

WordPress fixes actively exploited flaw

A new WordPress version released Thursday fixes two critical cross-site scripting (XSS) vulnerabilities that could allow attackers to compromise websites.One of the flaws is located in the Genericons icon font package that is used by several popular themes and plug-ins, including the default TwentyFifteen WordPress theme.Researchers from Web security firm Sucuri warned Wednesday that they’ve already seen attacks targeting this XSS vulnerability.To exploit it, attackers need to trick users to click on specifically crafted links, but once they do that, they can leverage the flaw to steal authentication cookies. If the victim is a website’s administrator, they could gain full control over that website.To read this article in full or to leave a comment, please click here

Five reasons threat intelligence fails today, and how to overcome them

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

As cyber security threats have become increasingly sophisticated and pervasive, it’s become impossible to identify and defend against every probable attack with traditional security budgets. That’s where threat intelligence comes in. Effective use of threat intelligence is a way for businesses to pool their resources and overcome internal technical or resource limitations. Theoretically, it allows companies to “crowd source” security and stay one step ahead of malicious entities.

To read this article in full or to leave a comment, please click here