What’s in a typo? More evidence tying North Korea to the Sony hack

A security company in the U.S. has provided further evidence that last year’s devastating hacking attack on Sony Pictures Entertainment was carried out by a group with ties to North Korea.The FBI has already named North Korea as the source of the attack, but some security experts have been skeptical, in part because the FBI didn’t disclose all the details of its investigation.Security firm CrowdStrike is among those who believe North Korea was the culprit, and on Tuesday it presented another piece of evidence to support that claim.To read this article in full or to leave a comment, please click here

Yahoo has reasons of its own to help mobile developers

Yahoo, one of Silicon Valley’s aging giants, wants to show it’s got the goods for today’s mobile app developers.On Thursday, the company will hold its first-ever mobile developer conference. The daylong event in San Francisco shows the company wants to develop lucrative relationships with developers and put mobile at the center of its turnaround effort.The event will feature talks by top Yahoo executives, including CEO Marissa Mayer, and deep dives into Yahoo’s technology services for mobile apps. A critical part of those services is Flurry, a mobile analytics and advertising company Yahoo acquired last year. Flurry tracks more than 600,000 apps worldwide, providing information on app performance and users that can aid in ad targeting.To read this article in full or to leave a comment, please click here

Free-Form Discussion at CLEUR

I was fortunate enough to be invited out to Milan, Italy for Cisco Live Europe, and we had a few interesting discussions about a multitude of topics. One of them was more free-form than the others, and focused on defining SDN, what it’s value is, and where that value is most realized. Check out this video recording of the session; it was good to get a few perspectives from non-networkers, since I’m sure their perspective is different from the network administrator’s as it pertains to the ongoing shift in this industry:

Free-Form Discussion at CLEUR

I was fortunate enough to be invited out to Milan, Italy for Cisco Live Europe, and we had a few interesting discussions about a multitude of topics. One of them was more free-form than the others, and focused on defining SDN, what it’s value is, and where that value is most realized. Check out this video recording of the session; it was good to get a few perspectives from non-networkers, since I’m sure their perspective is different from the network administrator’s as it pertains to the ongoing shift in this industry:

Russian extradited to US for hacks that stole 160 million credit card numbers

A Russian man accused of high-profile cyberattacks on Nasdaq, Dow Jones, Heartland Payment Systems and 7-Eleven has been extradited to the U.S. and appeared in court in Newark, New Jersey, Tuesday.Vladimir Drinkman, 34, of Syktyykar and Moscow, Russia, was charged for his alleged role in a data theft conspiracy that targeted major corporate networks and stole more than 160 million credit card numbers, the U.S. Department of Justice said in a press release. Drinkman was arrested in the Netherlands in June 2012 and had been detained there.Drinkman appeared Tuesday in U.S. District Court for the District of New Jersey and entered a plea of not guilty to 11 counts he faces. His trial is scheduled to begin in April.To read this article in full or to leave a comment, please click here

Wireless carriers aren’t complying with cellphone unlocking agreement

Sina Khanifar, a technology fellow at the Electronic Frontier Foundation and a long-outspoken advocate for cellphone unlocking, recently reviewed the major U.S. wireless carriers' policies and practices since they reached a voluntary agreement to unlock former customers' smartphones so they can switch carriers.You might be surprised to learn that most carriers are not sticking to the agreement very well.A little background on the policy – after years of criticism from relatively niche technology and privacy advocates, by late 2013 the wireless carriers found themselves the targets of mainstream criticism for their refusal to unlock former customers' smartphones. This, of course, prevented customers from switching carriers and often forced them to sign new contracts with them. Even the White House called for reform on the issue, and FCC Chairman Tom Wheeler threatened to impose new regulations on the practice if the industry didn't voluntarily change its unlocking policies. The carriers chose the latter and, through a letter from wireless trade organization CTIA, promised to reach an agreement.To read this article in full or to leave a comment, please click here

Competition, new rules to spur West African electronic financial services

New regulations, competition and product diversity are likely to help boost digital financial services across the eight West African Economic and Monetary Union countries.Making financial services available and affordable to all segments of the population, especially those excluded by income level, political instability, gender, location, or education, has been a major topic over the past few years in Africa.The availability of financial services to those who historically not had access to them—so-called financial inclusion—is essential for widespread economic growth, according to the African Development Bank (ADF). However, Africa has been lagging behind other continents in this area, with less than one out of four adults holding an account at a formal financial institution, according to an ADF report, “Financial Inclusion in Africa.”To read this article in full or to leave a comment, please click here

Competition, new rules to spur West African electronic financial services

New regulations, competition and product diversity are likely to help boost digital financial services across the eight West African Economic and Monetary Union countries.Making financial services available and affordable to all segments of the population, especially those excluded by income level, political instability, gender, location, or education, has been a major topic over the past few years in Africa.The availability of financial services to those who historically not had access to them—so-called financial inclusion—is essential for widespread economic growth, according to the African Development Bank (ADF). However, Africa has been lagging behind other continents in this area, with less than one out of four adults holding an account at a formal financial institution, according to an ADF report, “Financial Inclusion in Africa.”To read this article in full or to leave a comment, please click here

IBM puts software and cloud at the center of storage

The future of storage may not be in storage itself, but in the intelligence to manage it.Major storage vendors and startups alike are now pushing software-defined systems spanning anything from a set of arrays to a whole enterprise. On Tuesday, IBM placed a big bet on this trend, announcing the first product in a portfolio called IBM Spectrum Storage and saying it will invest $1 billion in storage software over the next five years.The strategy will see IBM offer its traditional storage systems in software form so customers can choose to buy them as appliance, software or service. The first Spectrum Storage product out of the gate is IBM Spectrum Accelerate, software that’s based on the company’s own XIV high-end storage appliance.To read this article in full or to leave a comment, please click here

Arabic cyberespionage group attacking Middle Eastern, other targets

An Arabic cyberespionage group has attacked thousands of high-profile targets in Egypt, Israel, Jordan and other countries for the past two years, cybersecurity vendor Kaspersky Lab said.The cybermercenaries, which the vendor dubbed the Desert Falcons, has stolen more than 1 million files from 3,000 victims in more than 50 countries, Kaspersky Lab said Tuesday. The group, likely native Arabic speakers, began in 2011, with the first infections coming in 2013, the company said.Targeted countries include Algeria, Lebanon, Turkey and the United Arab Emirates in the Middle East, and the U.S., Russia, France and Sweden beyond the region, Kaspersky said.To read this article in full or to leave a comment, please click here

From the Desk of Jarrod Mills :: Updated R&S Material is on the Way!

Over the next few months, several enhancements and upgrades to the CCIE Routing and Switch product line will be rolled out. I am currently doing a thorough review of the Volume 1 Workbook to ensure that every topic within the Version 5 Blueprint is thoroughly tested and validated. Shortly thereafter, I will be editing and compiling the complete Volume 2 Mock Lab workbook with 5 full 8-hour labs. These labs will fully prepare students for success on the rigorous Cisco CCIE lab exam.

After listening to the feedback of current and prospective students, I realized that the Troubleshooting and Diagnostic Sections were a stumbling block for many and that these sections were under-represented in the current training program. As a result, new Troubleshooting and Diagnostic workbooks are currently under development with a target completion date within the next 2 months. The Troubleshooting workbook will contain 50 tickets that are similar in difficulty to the tickets the student will experience in the Cisco lab exam. Similarly, the Diagnostic workbook will also contain 50 issues and be designed to allow students to hone their skills, and become confident in their ability to identify and choose the correct solution(s) in this section of Continue reading

Vagrant Box for Learning Open vSwitch

As you may have picked up from some of my recent posts, I’m focused on building content and tools that will help others learn new projects, products, and technologies that I think will be very relevant in the future. One such project is Open vSwitch (OVS), which I’ve written about quite a bit (you can see all OVS-related posts here). To help others work with and learn about Open vSwitch, I’ve published a new Vagrant base box.

(In the event you’re not familiar with Vagrant, take a look at this quick introduction.)

The new Vagrant box I’ve created is running Ubuntu 14.04.1 and has Open vSwitch 2.3.1—the latest available release—pre-installed. To install this Vagrant box for use in your Vagrant environments, simply run this command:

vagrant box add slowe/ubuntu-1404-x64-ovs

Vagrant will download and install the box. (Note that this box is formatted for the “vmware_desktop” provider, which means you’ll need VMware Fusion or VMware Workstation as well as the Vagrant plugin for VMware.) Once the box is installed on your system, then you can begin using it in a Vagrantfile by just referencing the box name. As with the other Vagrant boxes Continue reading

Twitter improves security for shared accounts

Twitter is giving users what it thinks is a safer way to handle shared access to an account without compromising the login.Users of TweetDeck, the popular dashboard system for the site, will be able to share access to Twitter accounts without sharing passwords. That adds a useful layer of security for businesses that use Twitter, by eliminating the need to disseminate passwords among employees.Some high-profile Twitter accounts like those belonging to Newsweek magazine and the U.S. military’s Central Command have been hacked in recent months. Shared passwords are an obvious weak point for corporate social media accounts, as they increase the likelihood of unauthorized access.To read this article in full or to leave a comment, please click here

Most memorable SNL tech skits & bits

In the wake of SNL celebrating its 40th anniversary this past weekend (complete with a free SNL 40 iOS app), we take a trip back through some of Saturday Night Live's most memorable techie skits and bits. Feel free to hit me up if there are good ones I missed (I purposely left out a few NSFW ones).With smartphones, computers and the Internet going mainstream in recent years, tech has become a much more prevalent subject on the late night show.Google Glass Tech's diversity problemTo read this article in full or to leave a comment, please click here

Review: Nvidia’s Android-powered Shield tablet is actually great for gaming

Over the past few years, I have become increasingly reliant on Android-powered tablets for a large majority of my daily activities: general browsing, social media and email, and even for the majority of my entertainment (music and movie watching).But gaming…gaming is the one area in which Android has just never really embedded itself in my home. Sure, I play some Android games here and there, but I still own dedicated, non-Android powered consoles. Part of the reason is the lack of big, Triple-A quality games available for Android; there are some, but not as many as competing gaming platforms. The other part is the lack of great gaming hardware.To read this article in full or to leave a comment, please click here

Networking Field Day at Cumulus Networks – Recap

Networking Field Day is not your typical event; it is an interactive forum where vendors present to selected networking industry experts.

Feb 11, 2015 was our first Networking Field Day at Cumulus Networks and as many have commented, it was “very informational” and an “excellent” presentation. So, for those of you that could not make it, here is the recap with the recordings.

Being an atypical event, #NFD9 had to start off differently with…. a grandiose entrance from the delegates in a limo and some first-class espressos powered by the Cumulus Networks team before getting off to an exciting 2hours forum.

Networking Field Day - Cumulus Networks tweets
Tweets from NFD9

Cumulus Networks Overview

Kicking off the session was JR Rivers (@JRCumulus), Co-founder and CEO of Cumulus Networks for a straight conversation and great anecdotes on Cumulus Networks and what makes Cumulus Linux different. “Cumulus Linux is fundamentally & unashamedly Linux!” What sets Cumulus Networks apart from others? The responsibility to take patches upstream, the real partnerships, being an enabler rather than a gatekeeper.

Networking Field Day at Cumulus Networks

Data Center Architectures

What architectures are best suited for today’s date center network? And how does Cumulus Networks make it easier to build networks? Dinesh Dutt (@ddcumulus), Chief Continue reading

Let’s Meet at Interop Las Vegas 2015

I will be at Interop Las Vegas this year from Tuesday, April 28 through Thursday, April 30. If you are a vendor who would like to brief me, someone who would like to explore consulting opportunities, or if you just want a word, let's connect. I'd be happy to swing by your booth, meet for coffee, or simply hang out.

The Buzz About NetBeez

One of the great benefits of attending Tech Field Day events is the opportunity to learn about new startups that I might otherwise not have heard about. And one of the great things about startups is their ability to apply a fresh set of eyes to long-standing problems without being bogged down by existing products or past decisions.

The problem I’m thinking of in this case is monitoring the network right out to the user edge in a cost-effective manner. Network performance monitoring platforms tend to be network-centric, looking at port statistics and reachability from the monitoring platform to the access switch. Application performance monitoring tools often monitor from a single, central point of the network either generating transactions or trying to intercept user transactions and interpolate performance characteristics while deriving performance stats. Each of these solutions can have a place, but neither one really gives you a view from the ground. Existing options to get a user-like view that really comes from the edges of your network (where the users are, after all) are very limited. Enter NetBeez, with a very simple premise: Monitor from the edge. Every edge. Wired edges. Wireless edges. From the user’s perspective. And use a central, or cloud-based, dashboard Continue reading