Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping.The company is asking security experts to look at its code, published on GitHub, and report vulnerabilities, wrote Alex Stamos, Yahoo’s chief information security officer, in a blog post.The plugin should be ready by year end, wrote Stamos, who gave a presentation on Sunday at the South by Southwest conference in Austin, Texas.To read this article in full or to leave a comment, please click here

German industry is poised to exploit rural broadband

Internet speeds of 50Mbps are nothing but a pipe dream for most inhabitants of Britain, while even 5Mbps would be a welcome boost for many living in remote areas.Yet by 2018, German Chancellor Angela Merkel wants all Germans, even those in rural communities, to have access to 50Mbps broadband connections, she said at the opening ceremony of the Cebit trade show on Sunday.This ambitious goal, if attained, could revolutionize many aspects of farming and forestry, allowing a transition from practices based on intuition and tradition to those based on big data and analytics.And German businesses, including century-old agricultural machinery maker Claas, enterprise software specialist SAP, and a new generation of mobile app developers, are ready to take advantage of it.To read this article in full or to leave a comment, please click here

Cisco Access Point Default Password

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
The Cisco Access Point Default Password is – Cisco / Cisco You could probably have guessed that, but if you are configuring a cisco wireless access point out of the box for the first time you are going to want to know the default password and if you are reading this then you haven’t been... [Read More]

Post taken from CCIE Blog

Original post Cisco Access Point Default Password

Kubernetes and Google container engine

In this blog, I will cover the Google container engine service that I tried out. Pre-requisites: Need Google cloud account. Install Google cloud SDK. Google container engine is not available in the normal gcloud SDK installation. To use container engine service, we need to update preview component. $ gcloud components update preview I followed the … Continue reading Kubernetes and Google container engine

Vodafone, Deutsche Telekom put mobile security in the spotlight

Telecom operators Vodafone and Deutsche Telekom are betting that in a post-Snowden world, “made in Germany” is more attractive than “made in U.S.A.”The need for more secure communications has been a hot topic in Germany since former U.S. government contractor Edward Snowden made his revelations about National Security Agency (NSA) snooping.The operators see the revelations, rightly or wrongly, as a golden opportunity to differentiate their products from competing U.S. offerings. As often as they can, Vodafone and Deutsche Telekom are highlighting that the German credentials of two new security products that were announced on Sunday at the Cebit trade fair in Hanover.To read this article in full or to leave a comment, please click here

Opencompute Networking – Facebook Contributions

Earlier, I had written a blog on Opencompute networking project. There were few recent contributions from Facebook to Opencompute. In this blog, I wanted to capture major Opencompute Networking contributions from Facebook. I see these contributions as pretty significant in the context of White box switches. Wedge hardware design for TOR: The goal here was to develop … Continue reading Opencompute Networking – Facebook Contributions

German IT spending forecast to rise on eve of industry’s biggest trade show

IT spending is forecast to rise faster than previously expected in Germany, a bellwether for European industry, while IT sector jobs there will total almost one million by year-end. However, forthcoming legislation could have a chilling effect, industry association Bitkom warned.The news will put a smile on the faces of exhibitors and visitors at the giant Cebit trade show in Hanover, Germany, which opens Monday.Last year, 26,000 new jobs were created in the German IT industry, more than the 10,000 expected, Bitkom said. It expects 21,000 more will find employment in the industry by year end, taking the total to 990,000.The faster-than-expected rise in employment last year has prompted the association to raise its forecast for German IT spending on IT, telecommunications and consumer electronics this year to €155.5 billion (US$163 billion), up 1.5 percent year on year compared to an earlier growth forecast of 0.6 percent.To read this article in full or to leave a comment, please click here

28 – VxLAN/EVPN MP-BGP in a DCI environment

VxLAN Evolution in the Context of DCI Requirements

Since I posted this article “Is VxLAN a DCI solution for LAN extension ?” clarifying why Multicast-based VxLAN was not suitable to offer a viable DCI solution, the DCI market (Data Center Interconnect) has become a buzz of activity around the evolution of VxLAN based on Control Plane (CP).

In this network overlay context, the Control Plane objective is to leverage Unicast transport while processing VTEP and host discovery and distribution processes. This method significantly reduces flooding for Unknown Unicast traffic within and across the fabrics.

The VxLAN protocol (RFC 7348) is aimed at carrying a virtualized Layer 2 network tunnel established over an IP network, hence from a network overlay point of view there is no restriction to transport a Layer 2 frame over an IP network, because that’s what the network overlays offers.

Consequently a question as previously discussed with MCAST-only transport in regard to a new DCI alternative solution, comes back again;

  • Does a Control Plane suffice to claim that’s VxLAN can be used as a DCI solution?

Consequently, this noise requires a clarification on how reliable a DCI solution can be when based on VxLAN Unicast transport using a Control Continue reading

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market—this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.This is not the PlayBook 2 that BlackBerry was rumored to be working on last year, but the SecuTablet, developed by Secusmart and IBM for a German government department.The SecuTablet is a Samsung Galaxy Tab S 10.5 LTE 16GB bundled with some software from IBM and SecuSmart’s special MicroSD card, which combines a number of cryptographic chips to protect data in motion and at rest. Samsung’s Knox secure boot technology ensures that the OS on the tablet has not been tampered with, while IBM’s contribution to the security chain is to “wrap” certain apps in an additional layer of code that intercepts and encrypts key data flows using the Secusmart hardware.To read this article in full or to leave a comment, please click here

ECMP visibility with Cumulus Linux

Demo: Implementing the Big Data Design Guide in the Cumulus Workbench  is a great demonstration of the power of zero touch provisioning and automation. When the switches and servers boot they automatically pick up their operating systems and configurations for the complex Equal Cost Multi-Path (ECMP) routed network shown in the diagram.

Topology discovery with Cumulus Linux looked at an alternative Multi-Chassis Link Aggregation (MLAG) configuration and shows how to extract the configuration and monitor traffic on the network using sFlow and Fabric View.

The paper Hedera: Dynamic Flow Scheduling for Data Center Networks describes the impact of colliding flows on effective ECMP cross sectional bandwidth. The paper gives an example which demonstrates that effective cross sectional bandwidth can be reduced by a factor of between 20% to 60%, depending on the number of simultaneous flows per host.

This article uses the workbench to demonstrate the effect of large "Elephant" flow collisions on network throughput. The following script running on each of the servers uses the iperf tool to generate pairs of overlapping Elephant flows:
cumulus@server1:~$ while true; do iperf -c 10.4.2.2 -t 20; sleep 20; done
------------------------------------------------------------
Client connecting to 10.4.2.2, TCP port Continue reading

Facebook acquires The Find e-commerce search engine

Facebook has acquired The Find, a nine-year-old company with a search engine that indexes products across thousands of e-commerce sites.The deal, the value of which was not disclosed, was announced in a post on The Find’s website.“Key members of our team are joining the company and will be working hard to integrate our technology to make the ads you see on Facebook every day better and more relevant to you,” the company said.That probably means the ads Facebook users see will be more relevant to products they’ve been browsing and buying online, perhaps highlighting local retailers. One of The Find’s features is that it attempts to mix online and local stores and says its results are based on “your social profile.”To read this article in full or to leave a comment, please click here

Facebook acquires The Find e-commerce search engine

Facebook has acquired The Find, a nine-year-old company with a search engine that indexes products across thousands of e-commerce sites.The deal, the value of which was not disclosed, was announced in a post on The Find’s website.“Key members of our team are joining the company and will be working hard to integrate our technology to make the ads you see on Facebook every day better and more relevant to you,” the company said.That probably means the ads Facebook users see will be more relevant to products they’ve been browsing and buying online, perhaps highlighting local retailers. One of The Find’s features is that it attempts to mix online and local stores and says its results are based on “your social profile.”To read this article in full or to leave a comment, please click here

State Dept. to shut down email system to clean out malware

The U.S. Department of State will shut down its unclassified email system for a short time to clean up malware that may have resided there since late last year.The State Department said Friday it has scheduled a planned outage of the unclassified email system to make security improvements and to respond to “activity of concern” on the network.The State Department’s unclassified email system was compromised by a suspected state-sponsored hacking campaign, possibly originating in Russia, according to media reports from November.To read this article in full or to leave a comment, please click here

MacBook makes a case for wireless docking — but too soon

The new MacBook is supposed to usher in a wire-free future for laptops, but Apple left out technologies that could have saved road warriors a few ungainly wires.“The only intelligent vision for the future of the notebook is one without wires, where you don’t have to plug up cables to connect to things,” Apple marketing chief Phil Schiller said as he introduced the MacBook on Monday.But while he crowed about the IEEE 802.11ac Wi-Fi and Bluetooth 4.0 built into the laptop, Schiller never mentioned that Apple passed on emerging technologies to make a USB connection over the air or wirelessly link peripherals at 7Gbps (bits per second).To read this article in full or to leave a comment, please click here

Google’s solar-drone Internet tests about to take off

Google’s ambitious plans to provide Internet access to remote areas via solar-powered drones are getting ready to take off.Titan Aerospace, the drone-maker acquired last year by Google to help realize the project, recently applied for and received two licenses from the U.S. Federal Communications Commission to run tests over the next six months.The licenses, which are valid from March 8 until September 5, don’t give away much because Google has asked the FCC to keep many of the details confidential for commercial reasons, but they reveal the tests will take place inside a 1,345 square kilometer (520 square mile) area to the east of Albuquerque. The area includes the town of Moriarty, where Titan Aerospace is headquartered and conducts its research and development work.To read this article in full or to leave a comment, please click here

PlexxiPulse—Arrow IoT Immersions in Boston 3/26

Last week, we were in Santa Clara, California for Arrow Electronics’ Internet of Things Immersions conference. We demonstrated our big data fabrics, learned about Arrow’s #FiveYearsOut philosophy and conversed with innovators and thought leaders from businesses, government agencies and academia. We will be exhibiting at the last installment of the Immersions conference in Boston on March 26 at the Hynes Convention Center. Come see Plexxi in action and to talk with our team about the next era of IT. You can register to attend here. We can’t wait to see you!

Below please find a few of our top picks for our favorite news articles of the week. Have a great weekend!

Channelnomics: SDN and SDS key for CIOs – Walsh
By Jessica Meek
Software defined networking (SDN) and software defined storage (SDS) are key concerns for chief information officers (CIOs), delegates at the ITEX 2015 National Conference and Expo in Fort Lauderdale, FL heard today. In his keynote address, Lawrence M. Walsh, CEO and chief analyst at The 2112 Group, said this was a top concern for CIOs he speaks with. “CIOs consistently tell me that what’s getting them excited is SDN and SDS. This is the ability to Continue reading

How the Apple Watch is made

Apple products are highly touted for being extremely sleek and well-designed. While some companies opt to use cheaper materials in an effort to preserve the bottom line, Apple has a penchant for sparing no expense when it comes to manufacturing.As a result, Apple not only opts to use the best materials available, but it's also willing to expend millions upon millions of dollars on advanced machinery and tooling processes that competitors either a) can't afford to use themselves or b) simply don't want to. Consequently, the build quality on Apple products is typically best in class.Apple's next big game-changing product is the Apple Watch, slated for release on April 24. During Apple's recent media event, the company, as it's prone to do, showcased a video detailing certain aspects of the Apple Watch manufacturing process.To read this article in full or to leave a comment, please click here