We love ideas like this: Open-source hardware could defend against the next generation of hacking

CTOvision

Pearce argue that open-source hardware could be the ultimate key against cyber attacks that companies are trying hard to find on The Conversation : You must have heard about open-source software helping in fighting cyber attacks but imagine open-source hardware doing the same job for you in much better way. Cyber Security NewsRead Prof. Joshua M.

5 open source alternatives for routing/firewall

Network World

Economical and flexible Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These products can be downloaded and deployed on your own hardware, on a virtual platform, or in the cloud.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia. Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. By Katie Kennedy.

Review: 5 open source alternatives for routers/firewalls

Network World

Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS. Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-­?Speed Networks

CTOvision

time view of what is happening within a network, as well as the ability to perform a retrospective review of activity, is critical to understanding and measuring performance, identifying bottlenecks, troubleshooting issues, and securing the environment. By Charles Hall.

Datameer CEO Stefan Groschupf on the topic of Big Data

CTOvision

Utimaco and Zettaset Hardware-Based Big Data Encryption to Secure Hadoop and NoSQL (insidebigdata.com). Big Data Video Apache Hadoop Datameer NoSQL Open Source Stefan Groschupf

New White Paper, “The Public Sector Improves Security and Efficiency with Hadoop”, Available in Research Library

CTOvision

A white paper has been added to the CTOVision Research Library which showcases several use cases for improving security and efficiency for government agencies using Hadoop. With its efficient use of commodity hardware and its ability to scale linearly, open-source Apache Hadoop is an ideal platform upon which to offload many data processing workloads. By Charles Hall. Interested in using Hadoop in the federal space?

Deep Insights Into The Future of #Hadoop By @Cutting of @Cloudera

CTOvision

For example, with hardware the past has always been that hardware gets cheaper and transistor counts go up so this cheaper hardware gets more powerful. Turns out that in parallel with this growth in capabilities in hardware is the adoption of technology. By Bob Gourley.

IDF 2014: Open Source Storage Optimizations

Scott Lowe

This is a liveblog of IDF 2014 session DATS009, titled “Ceph: Open Source Storage Software Optimizations on Intel Architecture for Cloud Workloads.” This brings Chagam to discussing Ceph, which he describes as the “only” (quotes his) open source virtual block storage option. This brings Chagam to a discussion of where Intel is specifically contributing back to open source storage solutions with Ceph.

- Microsoft vs Open Source

Chief Seattle Greek Blog

In this environment, it sure is tempting to chuck Microsoft’s Office and web products and their complicated Enterprise and Select Agreements in favor of open source equivalents. Sure, you’ll say, Microsoft software is really prone to security flaws and attacks.

Snakes in the Satellites: PassiveTotal provides an update on a massive adversary infrastructure

CTOvision

in hardware plus engineering time. CTO Cyber Security News DNS Domain name IP address Public key certificateBob Gourley.

Examining New Mission-Enabling Design Patterns Made Possible By The Cloudera-Intel Partnership

CTOvision

CTOlabs.com , the research arm of CTOvision.com , has just released a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership.

Intel 334

Architecture Matters in Big Data Modernization: See why in our examination of the Cloudera and Intel partnership

CTOvision

CTOlabs.com , the research arm of CTOvision.com , produced a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. The paper captures design considerations for enterprise technologists that flow from the engineering work both Cloudera and Intel have been putting into both open source technologies and hardware design.

Enhancing the User Experience: Fantastic Android Q Features Proving Google as the Ultimate Winner

Galido

Hence, Google has introduced an open-source operating system running excellently over the smartphones and furnishing the customization needs of smartphone manufacturers, Android. . But now, Google is in no mood for security threats. Mobile New Gadgets & Hardware

What’s Trending For Hackers?

CTOvision

In addition to the hardware, very effective and fairly robust software has been released as well (GnuRadio). As the cost of radio hardware falls and more players enter the radio arena, you can expect more attention to be paid to these (comparatively) little-known and poorly-secured protocols.

Trends 283

Comprehending Machine Intelligence: Research and Graphic by Shivon Zilis

CTOvision

Human-computer interaction: Hardware companies with network effects. Technology platforms: Exploiting the increasing power of the browser, and WebRTC in particular; exploring companion businesses to open source software. Bob Gourley.

How Open Hybrid Clouds Will Change Cloud Computing

CTOvision

If those options weren’t enough, here comes the open hybrid cloud. An open hybrid cloud leverages the benefits of accessing data and processes across private and public implementations, while facilitating open source development. The DoD’s technology development community can use open source software and collaborate privately. What the Open Hybrid Cloud Means for Businesses. The business also has many perks of open source at their disposal.

Cloud 238

Technology Short Take #80

Scott Lowe

Servers/Hardware. Security. Acra is open source and available via GitHub. Here’s a post outlining some of VMware’s more prominent open source projects in the “cloud-native” space. Or, in plain English instead of vRA jargon, Gavin shows how to prepare a Photon OS instance that can be deployed by vRA and which registers automatically with Admiral (VMware’s open source GUI for deploying containers). Welcome to Technology Short Take #80!

Technology Short Take #83

Scott Lowe

Servers/Hardware. Security. These viewpoints—that security via micro-segmentation is a compelling use case for NSX—is one I’ve seen repeated in numerous environments. Turns out there’s a security vulnerability in some of the wireless keyboard and mice out there. This was the source of some confusion in the past; the move to Moby sidesteps those concerns. Welcome to Technology Short Take #83!

Technology Short Take #83

Scott Lowe

Servers/Hardware. Security. These viewpoints—that security via micro-segmentation is a compelling use case for NSX—is one I’ve seen repeated in numerous environments. Turns out there’s a security vulnerability in some of the wireless keyboard and mice out there. This was the source of some confusion in the past; the move to Moby sidesteps those concerns. Welcome to Technology Short Take #83!

Things To Understand To Prevent Data Loss

Galido

Customer data is the lifeblood of any business entity; they are driven towards the increasing obligation of securing it as they possibly can. Cyber risk is now a huge corporate concern, and IT security budgets have risen in connection with it. Cyber Security 101. Security

Understanding Readium – Features, Architecture and Alternatives

Kitaboo

The Open Source Foundation aims to develop technology for expediting the adoption of ePUB3 and the Open Web Platform by the Digital Publishing Industry. It strives to deliver leading-edge functionality that is fully specified, free, open, and interoperable.

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

As advanced applications are developed that leverage the capabilities that make Bitcoin possible, enterprise technologists will be able to tap into new capabilities for security and functionality. It was invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open source software in 2009. In addition, anyone can process transactions using the computing power of specialized hardware and earn a reward in bitcoins for this service.

Technology Short Take #60

Scott Lowe

And while we are on the topic of Linux and open source in the networking industry…read this entertaining and informative article on the importance of (truly) open source libraries in networking. This post on automating NSX security rules using Splunk (and some custom code) is pretty cool. Servers/Hardware. Security. Have you heard about the DoD Security Technical Implementation Guide (STIG) ESXi VIB? Welcome to Technology Short Take #60.

Technology Short Take #79

Scott Lowe

Skydive is (in the project’s own words) an “open source real-time network topology and protocols analyzer.” Servers/Hardware. Security. Here’s a great article highlighting some of the risks involved in relying only on HTTPS certificates to denote the “security” or “validity” of a site. Here’s a list of some open source Docker-related tools that developers may find useful. Welcome to Technology Short Take #79!

Technology Short Take #70

Scott Lowe

In this post you’ll find a collection of links to articles discussing the major data center technologies—networking, hardware, security, cloud computing, applications, virtualization…you name it! (If Numan Siddique describes the native DHCP support available in OVN (Open Virtual Network). Thinking of using a hardware VTEP (VXLAN Tunnel Endpoint) with VMware NSX? Servers/Hardware. Security. and Trend Micro’s Deep Security in this article.

eBook 60

21-22 May O’Reilly Solid Conference Heralds the Merging of the Physical and Virtual Worlds

CTOvision

As big data moves from the Web into the physical world, it’s more important than ever that people who deal with software and people who deal with hardware and machinery understand each other,” says Jon Bruner, who chairs Solid with MIT Media Lab’s Joi Ito. Brian Gerkey, CEO of Open Source Robotics Foundation. By Bob Gourley.

Technology Short Take #64

Scott Lowe

Cumulus Networks has added another hardware partner to its list of supported hardware partners; this time it’s Mellanox, as outlined in this SDx Central article. Servers/Hardware. Security. Andreas Wittig reminds people of the common-sense security rules regarding SSH key pairs , specifically with Amazon EC2, and provides a few suggestions for how to address shared key pairs. Welcome to Technology Short Take #64.

Key #BigData Partnership: @Cloudera and @Koverse Team to Deliver on the Enterprise Data Hub

CTOvision

An enterprise data hub is one place to store and work with all data, with the flexibility to run a variety of enterprise workloads — including batch processing, interactive SQL, enterprise search and advanced analytics — together with the integrations to existing systems, robust security, governance, data protection and management that enterprises require. Cloudera announced support for Accumulo in 2013 as part of their ongoing commitment to open source software.

Technology Short Take #82

Scott Lowe

Aaron Conole provides an overview of using the ovs-dpctl command to “program” the Open vSwitch (OVS) kernel module. Servers/Hardware. Security. It’s nice to see some folks attempting to help tackle potential security concerns with containers. Ryan Kelly shows readers how to configure Harbor (open source container registry project) to use Amazon S3 for storage. Welcome to Technology Short Take #82!

Technology Short Take #59

Scott Lowe

Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Servers/Hardware. This is a fascinating (to me, at least) paper on the implications of non-volatile storage on today’s data centers (and data center hardware). Security. A moderate security bug in OpenSSH (all releases between 5.4

Watch A New World Of Innovation Launch At O’Reilly Solid Conference 21-22 May 2014 in San Francisco

CTOvision

“As big data moves from the Web into the physical world, it’s more important than ever that people who deal with software and people who deal with hardware and machinery understand each other,” says Jon Bruner, who chairs Solid with MIT Media Lab’s Joi Ito. Brian Gerkey, CEO of Open Source Robotics Foundation.

Technology Short Take #63

Scott Lowe

I recently came across a couple useful troubleshooting guides, one for Open vSwitch (OVS) and OpenStack Neutron and one for VMware NSX. At the recent OCP Summit, Microsoft introduced Software for Open Networking in the Cloud (SONiC). Matt Oswalt recently unveiled (and open sourced) a framework called ToDD, which stands for “Testing on Demand: Distributed”. Servers/Hardware. Security. Welcome to Technology Short Take #63.

Hexis Cyber Solutions Unveils NetBeat Product Line for Simplified Network Visibility & Control

CTOvision

Editor’s note: We believe the release below will be of high interest to enterprise technologists since it directly relates to topics of enhanced functionality and security of your mission critical infrastructure. BYOD, virtualization and cloud computing have changed the landscape of the traditional network and enabled many new unauthorized devices to attach to networks thereby increasing security risk and potentially affecting network performance. By Bob Gourley.

Memcached servers can be hijacked for massive DDoS attacks

Network World

The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.

Technology Short Take #46

Scott Lowe

Servers/Hardware. While all the attention is “up the stack,” there are still some occasions when you need to worry about the details in the hardware. Security. I find it enormously helpful to stay connected to various open source-related IRC channels, but staying logged while on the move is, for all intents and purposes, impossible. Installing CoreOS on vSphere got a bit easier, thanks to the inclusion of Open VM Tools in CoreOS Alpha 490.0.0

Technology Short Take #65

Scott Lowe

In any case, I can see some very useful cases for subnet pools, particularly in conjunction with tenant networks that use “routable” IPs and don’t use source NAT on the logical router(s). Servers/Hardware. Security. Bruce Schneier asks the question that society has yet to answer (and may be afraid to answer): “…do we prioritize security over surveillance, or do we sacrifice security for surveillance?”. Welcome to Technology Short Take #65!

IPv6 60

Technology Short Take #71

Scott Lowe

Dmitri Kalintsev is back with another article in a series of articles on using hardware VXLAN tunnel endpoints (VTEPs) with VMware NSX. Servers/Hardware. Security. On the face of it, I agree with Matt’s statement that “design by committee” tends not to work well; however, I also believe that there needs to be some reasonable counterbalance to a single (commercial) entity’s control over an open source project. Welcome to Technology Short Take #71!

Technology Short Take #61

Scott Lowe

In his post on the unspoken benefits of open networking , Matt presents a similar argument: that the rise of open networking is something that offers benefits to all organizations, not just the web-scale companies. Servers/Hardware. Colin Lynch gives a “first look” at the Cisco UCS Generation 3 hardware , which may be of interest if you’re a UCS customer or looking at purchasing UCS. Security. Welcome to Technology Short Take #61.

VOIP 60

Windows 10 May 2020 Update now available with built-in Linux kernel and Cortana updates

The Verge

Microsoft is also promising to update this kernel through Windows Update, and it will be open source so developers can create their own WSL kernel and contribute changes. Microsoft is releasing its Windows 10 May 2020 Update today.

Technology Short Take #44

Scott Lowe

To help resolve this issue, Cumulus Networks (and possibly Metacloud, I’m not sure of their involvement yet) has release an open source project called vxfld. As described in this Metacloud blog post , vxfld is designed to “handle VXLAN traffic from any operationg system or hardware platform that adheres to the IETF Internet-Draft for VXLAN” Nir Yechiel recently posted part 1 of a discussion on the need for network overlays. Servers/Hardware. Security.

Technology Short Take #41

Scott Lowe

Rob Sherwood, CTO of Big Switch, recently published a reasonably in-depth look at “modern OpenFlow” implementations and how they can leverage multiple tables in hardware. Connecting Docker containers to Open vSwitch is one thing, but what about using Docker containers to run Open vSwitch in userspace? Servers/Hardware. Security. Red Hat recently announced they were acquiring Inktank, the company behind the open source scale-out Ceph project.

Big Data: The Hadoop Business Case

CTOvision

When including the cost of software, hardware, and licensing/support, the cost per terabyte (TB) of an MPP system is estimated at tens of thousands of dollars [4]. Hadoop continues to mature as a widely supported open source solution nearing its ten year anniversary.