Like Google, Mozilla set to punish Chinese agency for certificate debacle

The Mozilla Foundation plans to reject new digital certificates issued by the China Internet Network Information Center (CNNIC) in its products, but will continue to trust certificates that already exist.The move will follow a similar decision announced Wednesday by Google and is the result of CNNIC, a certificate authority (CA) trusted in most browsers and operating systems, issuing an unrestricted intermediary certificate to an Egyptian company called MCS Holdings.To read this article in full or to leave a comment, please click here

Galaxy S6 Edge review: Innovative, impressive — and impractical

Let this serve as a lesson: Looks can be deceiving.Samsung has introduced two new phones in its Galaxy line, and it's interesting to compare the two. Samsung's Galaxy S6 is a gorgeous phone that's both beautiful and brimming with top-notch technology. It really is an impressive device. The Galaxy S6 Edge is essentially the same phone with an added curve to its display that makes it even more striking.On paper and in pictures, the Edge seems like the phone to own. But after using it alongside the regular S6 for the past several days, I'm not convinced it is.To read this article in full or to leave a comment, please click here

VCDX-NV Interview: Chris Miller Talks VMware NSX Certification

Chris Miller is the principal architect for AdvizeX in Columbus OH. He runs the NSX program from a technical and marketing perspective, including Chris Miller-AdvizeXenterprise pre-sales support and go-to-market strategies.

*** 

I started my career as a traditional Cisco networking guy. I spent 10 to 15 years as a network architect. But I’d been tracking what was going on in the community, with Open Flow and some of the other technologies. When I saw what VMware was doing, it got me pretty excited. I thought, ’It’s pretty revolutionary what’s going on here.’ I immediately jumped on the opportunity to take part in NSX.

In terms of enterprise customers, we weren’t initially seeing a lot of adoption in the market. Then VMware announced the Nicira acquisition, and Cisco announced what they were going to do with ACI, and heads started turning. I realized, you know, here are two of our largest partners putting their investment dollars behind this technology. And then, when I saw what NSX could do, and the benefits it could bring, it was very clear to me that this was the next wave.

What excites me most about network virtualization is that you essentially don’t have to Continue reading

The Upload: Your tech news briefing for Thursday, April 2

Obama authorizes sanctions against hackersThe White House has added another weapon to the U.S. government’s arsenal in its fight against hackers, with an executive order signed by President Obama authorizing sanctions against hackers who harm critical infrastructure, or expose personal information and trade secrets. The order allows the government to block a person or organization’s access to U.S. financial institutions and any property they have in the country.Facebook Riffs on Snapchat with video appTo read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, April 2

Obama authorizes sanctions against hackersThe White House has added another weapon to the U.S. government’s arsenal in its fight against hackers, with an executive order signed by President Obama authorizing sanctions against hackers who harm critical infrastructure, or expose personal information and trade secrets. The order allows the government to block a person or organization’s access to U.S. financial institutions and any property they have in the country.Facebook Riffs on Snapchat with video appTo read this article in full or to leave a comment, please click here

Smart home hacking is easier than you think

Last March, a very satisfied user of the Honeywell Wi-Fi Thermostat left a product review on Amazon.com that shed some light on an unexpected benefit of the smart home – revenge.The reviewer wrote that his wife had left him, and then moved her new lover into the home they once shared, which now featured the Honeywell Wi-Fi thermostat. The jilted ex-husband could still control the thermostat through the mobile app installed on his smartphone, so he used it to make the new couple's lives a little less happily ever after:To read this article in full or to leave a comment, please click here

Chinese Internet authority clashes with Google over digital certificates

A Chinese Internet administrator blasted Google on Thursday, after the U.S. search giant decided to stop recognizing digital certificates issued by the group following a security lapse.“The decision that Google has made is unacceptable and unintelligible,” China’s Internet Network Information Center (CNNIC) said in an online posting.Google’s decision means that its Chrome browser could end up clashing with sites served by the Chinese Internet agency.On Wednesday, Google explained the move in an update to an earlier blog posting. The company is still concerned by the way CNNIC issued a certificate to an IT company based in Egypt that misused it in a botched security test.To read this article in full or to leave a comment, please click here

Chinese Internet authority clashes with Google over digital certificates

A Chinese Internet administrator blasted Google on Thursday, after the U.S. search giant decided to stop recognizing digital certificates issued by the group following a security lapse.“The decision that Google has made is unacceptable and unintelligible,” China’s Internet Network Information Center (CNNIC) said in an online posting.Google’s decision means that its Chrome browser could end up clashing with sites served by the Chinese Internet agency.On Wednesday, Google explained the move in an update to an earlier blog posting. The company is still concerned by the way CNNIC issued a certificate to an IT company based in Egypt that misused it in a botched security test.To read this article in full or to leave a comment, please click here

The day the first iPad arrived

April 3, 2010Image by REUTERS/Robert GalbraithTablets had always flopped so there was no shortage of naysayers pooh-poohing Apple’s new iPad when the first model was delivered to homes and made available in stores on April 3, 2010. While sales growth has slowed recently, the naysayers could not possibly have been more wrong. Here are some images from the iPad’s debut day.To read this article in full or to leave a comment, please click here

Texas wants RadioShack to specify what customer information would be for sale

The dispute between U.S. states and RadioShack over the sale of customer information continues, with the state of Texas requesting a bankruptcy court to ask RadioShack to specify in any motion for sale what information would be included and the number of people likely to be affected.Texas Attorney General Ken Paxton is concerned that although the personally identifiable information (PII) was not sold in a recently concluded auction, in argument and testimony during the sale hearing, RadioShack “has indicated that PII remains available for sale and will likely be sold in the future, attendant to the sale of trademarks and/or intellectual property,” according to a filing Wednesday.To read this article in full or to leave a comment, please click here

Texas wants RadioShack to specify what customer information would be for sale

The dispute between U.S. states and RadioShack over the sale of customer information continues, with the state of Texas requesting a bankruptcy court to ask RadioShack to specify in any motion for sale what information would be included and the number of people likely to be affected.Texas Attorney General Ken Paxton is concerned that although the personally identifiable information (PII) was not sold in a recently concluded auction, in argument and testimony during the sale hearing, RadioShack “has indicated that PII remains available for sale and will likely be sold in the future, attendant to the sale of trademarks and/or intellectual property,” according to a filing Wednesday.To read this article in full or to leave a comment, please click here

Ruckus first to roll out enterprise 802.11ac Wave 2 AP

Ruckus became the first enterprise wireless equipment vendor to roll out an 802.11ac Wave 2 access point today, with the release of the ZoneFlex R710.The R710 features the multi-user MIMO capability characteristic of Wave 2 devices, using what Ruckus calls Beamflex technology – built around antenna polarization – to focus signals directionally, making more efficient use of available bandwidth. The company says the R710 can handle 800Mbps of throughput via the older 2.4GHz frequencies, and 1733Mbps via 5GHz.Analyst and Network World contributor Zeus Kerravala said that the R710 is, in a very real sense, far ahead of its time."There aren't any wave 2 [client] devices expected for at least 18 months," he said. "So they are way early."To read this article in full or to leave a comment, please click here

Salesforce acquires mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.Toopher in Austin, Texas, said on its website that it will no longer sell its current products, but is “thrilled to join Salesforce, where we’ll work on delivering the Toopher vision on a much larger scale as part of the world’s #1 Cloud Platform.”It did not disclose the financial terms of the acquisition.Salesforce spokeswoman Karly Bolton confirmed the purchase but did not provide further details. Toopher’s website is now inaccessible, except for the notice announcing the acquisition.To read this article in full or to leave a comment, please click here

Salesforce acquires mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.Toopher in Austin, Texas, said on its website that it will no longer sell its current products, but is “thrilled to join Salesforce, where we’ll work on delivering the Toopher vision on a much larger scale as part of the world’s #1 Cloud Platform.”It did not disclose the financial terms of the acquisition.Salesforce spokeswoman Karly Bolton confirmed the purchase but did not provide further details. Toopher’s website is now inaccessible, except for the notice announcing the acquisition.To read this article in full or to leave a comment, please click here

Salesforce acquires mobile authentication firm Toopher

Salesforce.com has acquired Toopher, the developer of a mobile two-factor authentication app that uses location-awareness.Toopher in Austin, Texas, said on its website that it will no longer sell its current products, but is “thrilled to join Salesforce, where we’ll work on delivering the Toopher vision on a much larger scale as part of the world’s #1 Cloud Platform.”It did not disclose the financial terms of the acquisition.Salesforce spokeswoman Karly Bolton confirmed the purchase but did not provide further details. Toopher’s website is now inaccessible, except for the notice announcing the acquisition.To read this article in full or to leave a comment, please click here

Big Tap sFlow: Enabling Pervasive Flow-level Visibility


Today's Big Switch Networks webinar, Big Tap sFlow: Enabling Pervasive Flow-level Visibility, describes how Big Switch uses software defined networking (SDN) to control commodity switches and deliver network visibility. The webinar presents a live demonstration showing how real-time sFlow analytics is used to automatically drive SDN actions to provide a "smarter way to find a needle in a haystack."

The video presentation covers the following topics:

  • 0:00 Introduction to Big Tap
  • 7:00 sFlow generation and use cases
  • 12:30 Demonstration of real-time tap triggering based on sFlow

The webinar describes how the network wide monitoring provided by industry standard sFlow instrumentation complements the Big Tap SDN controller's ability to capture and direct packet selected packet streams to visibility tools.

The above slide from the webinar draws an analogy for the role that sFlow plays in targeting the capture network to that of a finderscope, the small, wide-angle telescope used to provide an overview of the sky and guide the telescope to its target. Support for the sFlow measurement standard is built into commodity switch hardware and is enabled on all ports in the capture network to provide a wide angle view of all traffic in the data center. Once Continue reading

Wider use of HTTPS could have prevented attack against GitHub

The unique attack method used to disrupt the code-sharing site GitHub over the last week could have been prevented if more websites enabled encryption, the Electronic Frontier Foundation (EFF) said Wednesday.The attack against GitHub was enabled by someone tampering with regular website traffic to unrelated Chinese websites, all of which used a JavaScript analytics and advertising related tool from Baidu.Somewhere on China’s network perimeter, that analytics code was swapped out for code that transparently sent data traffic to GitHub, at times crippling parts of the popular website, particularly two projects that specialize in anti-censorship tools. It was also particularly insidious since the users whose traffic was modified didn’t know they had been roped into the attack.To read this article in full or to leave a comment, please click here

Logging in Kubernetes with Fluentd and Elasticsearch

image In previous posts, we talked about running skyDNS and Heapster on your Kubernetes cluster.  In this post, I want to talk about the last of the cluster ‘addons’ available today in the Kubernetes repository.  This add on is a combination of Fluentd, Elasticsearch, and Kibana that makes a pretty powerful logging aggregation system on top of your Kubernetes cluster.   One of the major struggles with any large deployment is logging. Having a central place to aggregate logs makes troubleshooting and analysis considerably easier to do.   That being said, let’s jump right into the configuration.

Note: I have an open PR on this addon to make it a little more flexible from a configuration perspective.  Namely, I want to be able to specify the port and protocol used by the API server to access the backend service when using the API server as a service proxy.  That being said, some of my pod/controller definitions will be different from what you see on GitHub.  I’ll point out the differences below when we come across them.

The first step is to have the Kubernetes nodes collect the logs.  This is done with a local Fluentd Continue reading