We love ideas like this: Open-source hardware could defend against the next generation of hacking

CTOvision

Pearce argue that open-source hardware could be the ultimate key against cyber attacks that companies are trying hard to find on The Conversation : You must have heard about open-source software helping in fighting cyber attacks but imagine open-source hardware doing the same job for you in much better way. Cyber Security NewsRead Prof. Joshua M.

5 open source alternatives for routing/firewall

Network World

Economical and flexible Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These products can be downloaded and deployed on your own hardware, on a virtual platform, or in the cloud.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

- Microsoft vs Open Source

Chief Seattle Greek Blog

In this environment, it sure is tempting to chuck Microsoft’s Office and web products and their complicated Enterprise and Select Agreements in favor of open source equivalents. Sure, you’ll say, Microsoft software is really prone to security flaws and attacks.

Review: 5 open source alternatives for routers/firewalls

Network World

Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS. Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia. Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. By Katie Kennedy.

Accelerated PCAP: An Architecture for Precision Packet Capture and Analysis on High-­?Speed Networks

CTOvision

time view of what is happening within a network, as well as the ability to perform a retrospective review of activity, is critical to understanding and measuring performance, identifying bottlenecks, troubleshooting issues, and securing the environment. By Charles Hall.

Datameer CEO Stefan Groschupf on the topic of Big Data

CTOvision

Utimaco and Zettaset Hardware-Based Big Data Encryption to Secure Hadoop and NoSQL (insidebigdata.com). Big Data Video Apache Hadoop Datameer NoSQL Open Source Stefan Groschupf

New White Paper, “The Public Sector Improves Security and Efficiency with Hadoop”, Available in Research Library

CTOvision

A white paper has been added to the CTOVision Research Library which showcases several use cases for improving security and efficiency for government agencies using Hadoop. With its efficient use of commodity hardware and its ability to scale linearly, open-source Apache Hadoop is an ideal platform upon which to offload many data processing workloads. By Charles Hall. Interested in using Hadoop in the federal space?

Using Accelerators to Close the Real-Time Intelligence Gap

CTOvision

Today''s data-intensive analytic platforms offer a dizzying amount of data, originating from sensors, markets, social media, the Internet of Things, and countless other sources. By placing these devices near the edge of your network, directly behind your security perimeter, it is possible to aggregate, triage, and process dozens of incoming data streams simultaneously. All of this is accomplished within the hardware of the accelerator at line rate. By Charles Hall.

Deep Insights Into The Future of #Hadoop By @Cutting of @Cloudera

CTOvision

For example, with hardware the past has always been that hardware gets cheaper and transistor counts go up so this cheaper hardware gets more powerful. Turns out that in parallel with this growth in capabilities in hardware is the adoption of technology. By Bob Gourley.

Enhancing the User Experience: Fantastic Android Q Features Proving Google as the Ultimate Winner

Galido

Hence, Google has introduced an open-source operating system running excellently over the smartphones and furnishing the customization needs of smartphone manufacturers, Android. . But now, Google is in no mood for security threats. Mobile New Gadgets & Hardware

Snakes in the Satellites: PassiveTotal provides an update on a massive adversary infrastructure

CTOvision

in hardware plus engineering time. CTO Cyber Security News DNS Domain name IP address Public key certificateBob Gourley.

Examining New Mission-Enabling Design Patterns Made Possible By The Cloudera-Intel Partnership

CTOvision

CTOlabs.com , the research arm of CTOvision.com , has just released a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership.

Intel 155

Architecture Matters in Big Data Modernization: See why in our examination of the Cloudera and Intel partnership

CTOvision

CTOlabs.com , the research arm of CTOvision.com , produced a White Paper for the federal technology community titled: Enhancing Functionality and Security of Enterprise Data Holdings: Examining new, mission-enabling design patterns made possible by the Cloudera-Intel partnership. The paper captures design considerations for enterprise technologists that flow from the engineering work both Cloudera and Intel have been putting into both open source technologies and hardware design.

Technology Short Take #80

Scott Lowe

Servers/Hardware. Security. Acra is open source and available via GitHub. Here’s a post outlining some of VMware’s more prominent open source projects in the “cloud-native” space. Or, in plain English instead of vRA jargon, Gavin shows how to prepare a Photon OS instance that can be deployed by vRA and which registers automatically with Admiral (VMware’s open source GUI for deploying containers). Welcome to Technology Short Take #80!

Memcached servers can be hijacked for massive DDoS attacks

Network World

The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.

Technology Short Take #83

Scott Lowe

Servers/Hardware. Security. These viewpoints—that security via micro-segmentation is a compelling use case for NSX—is one I’ve seen repeated in numerous environments. Turns out there’s a security vulnerability in some of the wireless keyboard and mice out there. This was the source of some confusion in the past; the move to Moby sidesteps those concerns. Welcome to Technology Short Take #83!

Technology Short Take #83

Scott Lowe

Servers/Hardware. Security. These viewpoints—that security via micro-segmentation is a compelling use case for NSX—is one I’ve seen repeated in numerous environments. Turns out there’s a security vulnerability in some of the wireless keyboard and mice out there. This was the source of some confusion in the past; the move to Moby sidesteps those concerns. Welcome to Technology Short Take #83!

Things To Understand To Prevent Data Loss

Galido

Customer data is the lifeblood of any business entity; they are driven towards the increasing obligation of securing it as they possibly can. Cyber risk is now a huge corporate concern, and IT security budgets have risen in connection with it. Cyber Security 101. Security

What’s Trending For Hackers?

CTOvision

In addition to the hardware, very effective and fairly robust software has been released as well (GnuRadio). As the cost of radio hardware falls and more players enter the radio arena, you can expect more attention to be paid to these (comparatively) little-known and poorly-secured protocols.

Trends 132

Comprehending Machine Intelligence: Research and Graphic by Shivon Zilis

CTOvision

Human-computer interaction: Hardware companies with network effects. Technology platforms: Exploiting the increasing power of the browser, and WebRTC in particular; exploring companion businesses to open source software. Bob Gourley.

Technology Short Take #79

Scott Lowe

Skydive is (in the project’s own words) an “open source real-time network topology and protocols analyzer.” Servers/Hardware. Security. Here’s a great article highlighting some of the risks involved in relying only on HTTPS certificates to denote the “security” or “validity” of a site. Here’s a list of some open source Docker-related tools that developers may find useful. Welcome to Technology Short Take #79!

Technology Short Take #60

Scott Lowe

And while we are on the topic of Linux and open source in the networking industry…read this entertaining and informative article on the importance of (truly) open source libraries in networking. This post on automating NSX security rules using Splunk (and some custom code) is pretty cool. Servers/Hardware. Security. Have you heard about the DoD Security Technical Implementation Guide (STIG) ESXi VIB? Welcome to Technology Short Take #60.

Technology Short Take #70

Scott Lowe

In this post you’ll find a collection of links to articles discussing the major data center technologies—networking, hardware, security, cloud computing, applications, virtualization…you name it! (If Numan Siddique describes the native DHCP support available in OVN (Open Virtual Network). Thinking of using a hardware VTEP (VXLAN Tunnel Endpoint) with VMware NSX? Servers/Hardware. Security. and Trend Micro’s Deep Security in this article.

eBook 40

How Open Hybrid Clouds Will Change Cloud Computing

CTOvision

If those options weren’t enough, here comes the open hybrid cloud. An open hybrid cloud leverages the benefits of accessing data and processes across private and public implementations, while facilitating open source development. The DoD’s technology development community can use open source software and collaborate privately. What the Open Hybrid Cloud Means for Businesses. The business also has many perks of open source at their disposal.

Technology Short Take #64

Scott Lowe

Cumulus Networks has added another hardware partner to its list of supported hardware partners; this time it’s Mellanox, as outlined in this SDx Central article. Servers/Hardware. Security. Andreas Wittig reminds people of the common-sense security rules regarding SSH key pairs , specifically with Amazon EC2, and provides a few suggestions for how to address shared key pairs. Welcome to Technology Short Take #64.

Technology Short Take #82

Scott Lowe

Aaron Conole provides an overview of using the ovs-dpctl command to “program” the Open vSwitch (OVS) kernel module. Servers/Hardware. Security. It’s nice to see some folks attempting to help tackle potential security concerns with containers. Ryan Kelly shows readers how to configure Harbor (open source container registry project) to use Amazon S3 for storage. Welcome to Technology Short Take #82!

Technology Short Take #59

Scott Lowe

Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Servers/Hardware. This is a fascinating (to me, at least) paper on the implications of non-volatile storage on today’s data centers (and data center hardware). Security. A moderate security bug in OpenSSH (all releases between 5.4

Technology Short Take #63

Scott Lowe

I recently came across a couple useful troubleshooting guides, one for Open vSwitch (OVS) and OpenStack Neutron and one for VMware NSX. At the recent OCP Summit, Microsoft introduced Software for Open Networking in the Cloud (SONiC). Matt Oswalt recently unveiled (and open sourced) a framework called ToDD, which stands for “Testing on Demand: Distributed”. Servers/Hardware. Security. Welcome to Technology Short Take #63.

Technology Short Take #65

Scott Lowe

In any case, I can see some very useful cases for subnet pools, particularly in conjunction with tenant networks that use “routable” IPs and don’t use source NAT on the logical router(s). Servers/Hardware. Security. Bruce Schneier asks the question that society has yet to answer (and may be afraid to answer): “…do we prioritize security over surveillance, or do we sacrifice security for surveillance?”. Welcome to Technology Short Take #65!

IPv6 40

Technology Short Take #46

Scott Lowe

Servers/Hardware. While all the attention is “up the stack,” there are still some occasions when you need to worry about the details in the hardware. Security. I find it enormously helpful to stay connected to various open source-related IRC channels, but staying logged while on the move is, for all intents and purposes, impossible. Installing CoreOS on vSphere got a bit easier, thanks to the inclusion of Open VM Tools in CoreOS Alpha 490.0.0

Technology Short Take #71

Scott Lowe

Dmitri Kalintsev is back with another article in a series of articles on using hardware VXLAN tunnel endpoints (VTEPs) with VMware NSX. Servers/Hardware. Security. On the face of it, I agree with Matt’s statement that “design by committee” tends not to work well; however, I also believe that there needs to be some reasonable counterbalance to a single (commercial) entity’s control over an open source project. Welcome to Technology Short Take #71!

Red Hat: Optimizing Your IT Operations

Perficient - Digital Transformation

I order to shift your focus to the future, you need to modernize what you have or migrate to flexible, stable, open platforms and tools. Reason #6: Improve security and compliance. IT optimization is the first step in your digital transformation journey.

Technology Short Take #61

Scott Lowe

In his post on the unspoken benefits of open networking , Matt presents a similar argument: that the rise of open networking is something that offers benefits to all organizations, not just the web-scale companies. Servers/Hardware. Colin Lynch gives a “first look” at the Cisco UCS Generation 3 hardware , which may be of interest if you’re a UCS customer or looking at purchasing UCS. Security. Welcome to Technology Short Take #61.

VOIP 40

Crypto-currencies and their promise for enterprise technology professionals

CTOvision

As advanced applications are developed that leverage the capabilities that make Bitcoin possible, enterprise technologists will be able to tap into new capabilities for security and functionality. It was invented by Satoshi Nakamoto, who published the invention in 2008 and released it as open source software in 2009. In addition, anyone can process transactions using the computing power of specialized hardware and earn a reward in bitcoins for this service.