Is your keyless remote safe? Connected cars face increasing threats as new technologies present hackers and thieves with additional ways to access vehicles. One vulnerability, though, involves older tech — remote key fobs used to unlock cars. Researchers at the Usenix security conference in Austin will soon present a paper outlining two remote unlocking vulnerabilities, one of which puts nearly every Volkswagen Group vehicle manufactured since 1995 in jeopardy, as reported in Wired.
The researchers said VW’s latest Golf 7 model and others that use the same locking system are immune to the hack because they use unique security keys. Most VWs, however, still use the older, vulnerable tech. Neither of the two hacks, which use different methods, do more than let thieves unlock and enter the cars, which of course would enable them to steal the contents. They’d have to use other tricks to start the engine and steal the car.
Related: LoJack reveals the high-tech tricks thieves use to steal connected cars
The research team, lead by Flavio Garcia of the University of Birmingham, discovered the ability to start millions of VW Group cars in 2013 but due to a lawsuit didn’t make that potential hack public until 2015. Now the team is back and, with the German engineering firm Kasper & Oswald, are reporting another hack to wirelessly unlock doors that affects nearly 100 million VWs.
A similar hack found by the team works with millions of other vehicles including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel, and Peugeot.
The researchers did not fully disclose in the public paper exactly how they broke into the systems, not wanting to give real thieves that edge. They did, however, say that after “tedious reverse engineering” of a single component of VW’s onboard vehicle network, they found a cryptographic key value used by millions of vehicles. With remote radio eavesdropping, they could then discover the second “secret” key used by an owner when locking and unlocking a car. The first cryptographic key, the one stored in an internal component, is one of four common keys used in most of nearly 100 million VWs. The four crypto keys are stored in different components, but Garcia and his team found them all.
The researchers didn’t use crazy complex technology to break the vehicle codes. Garcia said it can be done with a “software-defined radio” connected to a laptop. And an even smaller device could be constructed for about $40 using an Arduino board — a programmable circuit board — connected to a radio receiver.
For the second hack, the one that works with millions of vehicles from other manufacturers, Garcia’s team took advantage of an out-of-date cryptographic method called HiTag2. In this case, they didn’t need to find internal keys but were able to use the same radio scanning setup to find one of eight rolling codes to discover the codes used by a vehicle owner.
According to Wired, the researchers said VW acknowledged the vulnerability they discovered. The semiconductor company that sells chips with the HiTag2 legacy crypto system, NXP, said it has been recommending that customers use newer algorithms for years.
Commenting on the current state of vehicle locking system vulnerabilities, Garcia said, “It’s a bit worrying to see security techniques from the 1990s used in new vehicles. If we want to have secure, autonomous, interconnected vehicles, that has to change.”
For now, however, if you have one of the vulnerable vehicles, the researchers suggest people not assume their cars and trucks are “safeboxes” and avoid leaving valuables inside. Even greater security would involve leaving remote keyfobs at home and manually unlocking and locking cars with physical keys — a strategy that won’t work with newer cars that are totally keyless.
voipadmin @ August 11, 2016
SAN FRANCISCO — Facebook has taken to the skies with ambitious plans for a fleet of unmanned solar-powered aircraft that beam the Internet to the four billion or so people who don’t have it. Now it’s focused on terra firma.
The company which runs the world’s most popular social network and among the most popular messaging services said it has built two new ground-based technologies that aim to deliver the Internet to people who live in cities where networks are routinely jammed or who live far away from cell towers and fiber optic lines, using methods that cost less.
“The challenge is huge. More than half the world is not online,” Facebook’s chief technology officer Michael Schroepfer told USA TODAY.
Facebook’s connectivity plans try to bring the Internet where it’s not available and where it is available, “making it radically cheaper,” he said, “so that more people can use and use more of it.”
It’s all part of Facebook’s grand plan to connect every person on the planet. According to Facebook, fewer than half of the world’s population are online, and 1.6 billion people don’t live within range of a data network.
The earthbound experiment uses wireless antennas that can improve Internet in urban and rural areas through two projects called Terragraph and Project ARIES, executives said Wednesday at Facebook’s annual developers conference here.
Terragraph is designed to bring high-speed Internet to dense urban areas. It’s currently being tested at Facebook headquarters in Menlo Park, Calif., with plans for a bigger trial in San Jose. Rather than laying fiber optic lines, Terragraph places small nodes or boxes on lamp posts, buildings, bus stops and other “street furniture” up to 820 feet apart to stretch the 60 gigahertz signal to offer high-speed Internet.
Project ARIES is in its early stages. Its goal is to extend Internet access to rural communities by using the existing wireless spectrum more efficiently. Facebook says in 20 countries it studied, more than 90% of people live 25 miles from a major city. It plans to make the technology available to wireless communications researchers.
Facebook hopes to speed development of new technologies by making much of its own research available at no cost. The arrangement is inspired by the open-source software movement, in which anyone can have access the computer code but must share advances with the community at large.
“We take our mission to connect everyone seriously,” Jay Parikh, Facebook’s vice president of engineering, said on stage at the f8 conference.. “However, this is a really hard problem.”
The two latest initiatives work alongside a program to bring Internet to unconnected areas via solar-powered drones. These unmanned planes, dubbed Aquila (Latin for “eagle”), are the size of a Boeing 737 that fly miles above the Earth, providing broadband-level Internet for people in a 50-mile radius below.
“We are working on everything from state-of-the-art base stations that provide wireless Internet access in urban and suburban areas on a much higher performance and lower cost to Aquila which is our airplane designed to provide Internet access to remote regions of the world and use as a state of the art laser communication system to literally make an Internet backbone in the sky,” Schroepfer said.
Facebook is not alone in its quest to discover new technologies to deliver Internet access to billions of people in developing countries. Google parent company Alphabet is backing Project Loon, which uses high-altitude, wind-propelled balloons with the goal of blanketing Internet coverage across large swaths of the world. Loon beams the Internet from balloons circling the earth at altitudes twice as high as commercial aircraft, helping mobile operators extend wireless networks into more sparsely populated or remote terrains without running fiber optic cable or building cell towers.
voipadmin @ April 13, 2016
How to Perform DOS Attack Remotely?
- http://192.168.100.1/reset.htm (for restart)
- http://192.168.100.1/cmConfigData.htm?BUTTON_INPUT1=Reset+All+Defaults (for factory reset)
“Did you know that a web browser does not care whether an ‘image’ file is really an image?,” Longenecker explains. “Causing a modem to reboot is as simple as including an ‘image’ in any other web page you might happen to open.”
“Of course, it is not a real image, but the web browser does not know that until it requests the file from the modem IP address – which of course causes the modem to reboot.”
Are the flaws easy to Patch?
- The UI requires authentication (username and password) before allowing someone to reboot or reset the modem.
- The UI validates that a request originated from the application and not from an external source.
“We are in the process of working with our Service Provider customers to make this release available to subscribers,” said the company’s spokesperson.
“There is no risk of access to any user data, and we are unaware of any exploits. As a point of reference, the 135 million number is not an accurate representation of the units impacted. This issue affects a subset of the ARRIS SURFboard devices.”
voipadmin @ April 11, 2016
Petya appeared on researchers’ radar last month when criminals distributed it to companies through spam emails that masqueraded as job applications. It stood out from other file-encrypting ransomware programs because it overwrites a hard disk drive’s master boot record (MBR), leaving infected computers unable to boot into the operating system.
The program replaces the drive’s legitimate MBR code, which normally starts the operating system, with code that encrypts the master file table (MFT) and shows a ransom note. The MFT is a special file on NTFS volumes that contains information about all other files: their name, size and mapping to hard disk sectors.
The actual contents of the user’s files are not encrypted, but without the MFT, the OS no longer knows where those files are located on disk. Using data recovery tools to reconstruct files might be possible, but it is not guaranteed to work perfectly and would be time-consuming.
Fortunately, resorting to that method is no longer necessary, and neither is paying Petya’s authors. Someone using the online handle leostone devised an algorithm to crack the key needed to restore the MFT and recover from a Petya infection.
Computer experts from the popular tech support forum BleepingComputer.com confirmed that the technique works, but it requires extracting some data from an affected hard drive: 512 bytes starting at sector 55 (0x37h) with an offset of 0 and an 8-byte nonce from sector 54 (0x36) offset 33 (0x21).
If that sounds complicated, no worries: Fabian Wosar from security firm Emsisoft created a simple and free tool that can do it for you. However, because the infected computer can no longer boot into Windows, using the tool requires taking out the affected hard drive and connecting it to a different computer where the tool can run. An external, USB-based hard drive docking station can be used.
The data extracted by the tool must be inputted into a Web application created by leostone that will use it to crack the key. The user must then put the affected hard drive back into the original computer, boot from it, and input the key on the ransom screen displayed by Petya.
“Once the hard drive is decrypted, the ransomware will prompt you to reboot your computer and it should now boot normally,” BleepingComputer.com founder Lawrence Abrams, wrote in a blog post.
voipadmin @ April 11, 2016
BANGKOK, March 21 Thailand’s Jasmine International Pcl has forfeited a 4G telecoms licence it won in an auction in December after missing the deadline for an initial payment towards the $2.1 billion fee, the industry regulator said on Monday.
BANGKOK, March 21 Thailand’s Jasmine International Pcl has forfeited a 4G telecoms licence it won in an auction in December after missing the deadline for an initial payment towards the $2.1 billion fee, the industry regulator said on Monday.
The failure to pay ended Jasmine’s hopes of entering Thailand’s competitive mobile market, which is dominated by three players — Advanced Info Service Pcl (AIS), Total Access Communication Pcl (TAC) and True Move, a unit of True Corp.
Shares in those companies rallied as concerns eased that Jasmine’s entry would spark a price war in the $6.7 billion sector.
AIS closed up 3.5 percent and TAC shot up 5.6 percent. True rose nearly 2 percent, all outpacing the overall market rise of 0.77 percent higher. Jasmine also increased 2.8 percent as fears over the impact on its finances eased.
“Jasmine has no right to the 4G licence given they miss the deadline,” Settapong Malisuwan, vice-chairman of the National Broadcasting and Telecommunications Commission told a news conference.
The company was required to make the first payment of 8 billion baht ($229.4 million) and place bank guarantees for the rest by 4:30 p.m. (0930 GMT), Settapong said.
The regulator will keep a 644 million baht guarantee Jasmine posted before the auction and seek further compensation as well as considering other penalties including examining Jasmine’s qualifications to hold existing broadband licenses, Settapong said.
Jasmine did not send a representative to meet the regulator on Monday, he said. Company executives were not available for comment on Monday.
The NBTC will discuss on Wednesday whether to hold another round of bidding for the licence. If the regulator decides to relaunch the auction, the starting price will be Jasmine’s winning bid price, Settapong said.
Jasmine’s wholly-owned unit Jas Mobile Broadband Co won the licence with a bid of 75.65 billion baht ($2.1 billion) after an auction that lasted more than 65 hours, nearly six times higher than the value the regulator placed on the spectrum.
The high winning bid raised investor concern that Jasmine would struggle to get a return on its investment.
Jasmine, valued at $732 million on the Thai bourse, made net profit of 15.7 billion baht in 2015. Analysts said that the cost of the licence and investment in the 4G network could have wiped out any profits for three years.
Jasmine is Thailand’s second largest broadband operator with 2 million subscribers. ($1 = 34.8800 baht) (Editing by Simon Webb and Keith Weir)
voipadmin @ March 21, 2016
SEOUL, SOUTH KOREA — The move didn’t make sense to the humans packed into the sixth floor of Seoul’s Four Seasons hotel. But the Google machine saw it quite differently. The machine knew the move wouldn’t make sense to all those humans. Yes, it knew. And yet it played the move anyway, because this machine has seen so many moves that no human ever has.
In the second game of this week’s historic Go match between Lee Sedol, one of the world’s top players, and AlphaGo, an artificially intelligent computing system built by a small team of Google researchers, this surprisingly skillful machine made a move that flummoxed everyone from the throngs of reporters and photographers to the match commentators to, yes, Lee Sedol himself. “That’s a very strange move,” said one commentator, an enormously talented Go player in his own right. “I thought it was a mistake,” said the other. And Lee Sedol, after leaving the match room for a spell, needed nearly fifteen minutes to settle on a response.
Fan Hui, the three-time European Go champion who lost five straight games to AlphaGo this past October, was also completely gobsmacked. “It’s not a human move. I’ve never seen a human play this move,” he said. But he also called the move “So beautiful. So beautiful.” Indeed, it changed the path of play, and AlphaGo went on to win the second game. Then it won the third, claiming victory in the best-of-five match after a three-game sweep, before Lee Sedol clawed back a dramatic win in Game Four to save a rather large measure of human pride.
It was a move that demonstrated the mysterious power of modern artificial intelligence, which is not only driving one machine’s ability to play this ancient game at an unprecedented level, but simultaneously reinventing all of Google—not to mention Facebook and Microsoft and Twitter and Tesla and SpaceX. In the wake of Game Two, Fan Hui so eloquently described the importance and the beauty of this move. Now an advisor to the team that built AlphaGo, he spent the last five months playing game after game against the machine, and he has come to recognize its power. But there’s another player who has an even greater understanding of this move: AlphaGo.
I was unable to ask AlphaGo about the move. But I did the next best thing: I asked David Silver, the guy who led the creation of AlphaGo.
David Silver. Click to Open Overlay Gallery
David Silver. Geordie Wood for WIRED
‘It’s Hard to Know Who To Believe’
Silver is a researcher at a London AI lab called DeepMind, which Google acquired in early 2014. He and the rest of the team that built AlphaGo arrived in Korea well before the match, setting up the machine—and its all important Internet connection—inside the Four Seasons, and in the days since, they’ve worked to ensure the system is in good working order before each game, while juggling interviews and photo ops with the throng of international media types.
But they’re mostly here to watch the match—much like everyone else. One DeepMind researcher, Aja Huang, is actually in the match room during games, physically playing the moves that AlphaGo decrees. But the other researchers, including Silver, are little more than spectators. During a game, AlphaGo runs on its own.
That’s not to say that Silver can relax during the games. “I can’t tell you how tense it is,” Silver tells me just before Game Three. During games, he sits inside the AlphaGo “control room,” watching various computer screens that monitor the health of the machine’s underlying infrastructure, display its running prediction of the game’s outcome, and provide live feeds from various match commentaries playing out in rooms down the hall. “It’s hard to know what to believe,” he says. “You’re listening to the commentators on the one hand. And you’re looking at AlphaGo’s evaluation on the other hand. And all the commentators are disagreeing.”
During Game Two, when Move 37 arrived, Silver had no more insight into this moment than anyone else at the Four Seasons—or any of the millions watching the match from across the Internet. But after the game and all the effusive praise for the move, he returned to the control room and did a little digging.
Playing Against Itself
To understand what he found, you must first understand how AlphaGo works. Initially, Silver and team taught the system to play the game using what’s called a deep neural network—a network of hardware and software that mimics the web of neurons in the human brain. This is the same basic technology that identifies faces in photos uploaded to Facebook or recognizes commands spoken into Android phones. If you feed enough photos of a lion into a neural network, it can learn to recognize a lion. And if you feed it millions of Go moves from expert players, it can learn to play Go—a game that’s exponentially more complex than chess. But then Silver and team went a step further.
Using a second technology called reinforcement learning, they set up matches in which slightly different versions of AlphaGo played each other. As they played, the system would track which moves brought the most reward—the most territory on the board. “AlphaGo learned to discover new strategies for itself, by playing millions of games between its neural networks, against themselves, and gradually improving,” Silver said when DeepMind first revealed the approach earlier this year.
And then the team went a step further than that. They fed moves from these AlphaGo-versus-AlphaGo matches into another neural network, refining its play still more. Basically, this neural network trained the system to look ahead to the potential results of each move. With this training, combined with a “tree search” examines the potential outcomes in a more traditional and systematic, it estimates the probability that a given move will result in a win.
So, in the end, the system learned not just from human moves but from moves generated by multiple versions of itself. The result is that the machine is capable of something like Move 37.
A One in Ten Thousand Probability
Following the game, in the control room, Silver could revisit the precise calculations AlphaGo made in choosing Move 37. Drawing on its extensive training with millions upon millions of human moves, the machine actually calculates the probability that a human will make a particular play in the midst of a game. “That’s how it guides the moves it considers,” Silver says. For Move 37, the probability was one in ten thousand. In other words, AlphaGo knew this was not a move that a professional Go player would make.
But, drawing on all its other training with millions of moves generated by games with itself, it came to view Move 37 in a different way. It came to realize that, although no professional would play it, the move would likely prove quite successful. “It discovered this for itself,” Silver says, “through its own process of introspection and analysis.”
Is introspection the right word? You can be the judge. But Fan Hui was right. The move was inhuman. But it was also beautiful.
voipadmin @ March 14, 2016
A spelling mistake in an online bank transfer instruction helped prevent a nearly $1 billion heist last month involving the Bangladesh central bank and the New York Federal Reserve, banking officials said.
Unknown hackers still managed to get away with about $80 million, one of the largest known bank thefts in history.
The hackers breached Bangladesh Bank’s systems and stole its credentials for payment transfers, two senior officials at the bank said. They then bombarded the Federal Reserve Bank of New York with nearly three dozen requests to move money from the Bangladesh Bank’s account there to entities in the Philippines and Sri Lanka, the officials said.
Four requests to transfer a total of about $81 million to the Philippines went through, but a fifth, for $20 million, to a Sri Lankan non-profit organization was held up because the hackers misspelled the name of the NGO, Shalika Foundation.
Hackers misspelled “foundation” in the NGO’s name as “fandation”, prompting a routing bank, Deutsche Bank, to seek clarification from the Bangladesh central bank, which stopped the transaction, one of the officials said.
There is no NGO under the name of Shalika Foundation in the list of registered Sri Lankan non-profits. Reuters could not immediately find contact information for the organization.
Deutsche Bank declined to comment.
At the same time, the unusually large number of payment instructions and the transfer requests to private entities – as opposed to other banks – raised suspicions at the Fed, which also alerted the Bangladeshis, the officials said.
The details of how the hacking came to light and was stopped before it did more damage have not been previously reported. Bangladesh Bank has billions of dollars in a current account with the Fed, which it uses for international settlements.
The transactions that were stopped totaled $850-$870 million, one of the officials said.
Last year, Russian computer security company Kaspersky Lab said a multinational gang of cyber criminals had stolen as much as $1 billion from as many as 100 financial institutions around the world in about two years.
Iraqi dictator Saddam Hussein’s son Qusay took $1 billion from Iraq’s central bank on the orders of his father on the day before coalition forces began bombing the country in 2003, American and Iraqi officials have said. In 2007, guards at the Dar Es Salaam bank in Baghdad made off with $282 million.
Bangladesh Bank has said it has recovered some of the money that was stolen, and is working with anti-money laundering authorities in the Philippines to try to recover the rest.
A bank spokesman could not be reached for comment late on Thursday.
The recovered funds refer to the Sri Lanka transfer, which was stopped, one of the officials said.
Initially, the Sri Lankan transaction reached Pan Asia Banking Corp , which went back to Deutsche Bank for more verification because of the unusually large size of the payment, a Pan Asia official said. “The transaction was too large for a country like us,” the official said. “Then (Deutsche) came back and said it was a suspect transaction.” A Pan Asia spokesman could not immediately be reached for comment.
The dizzying, global reach of the heist underscores the growing threat of cyber crime and how hackers can find weak links in even the most secure computer networks.
More than a month after the attack, Bangladeshi officials are scrambling to trace the money, shore up security and identify weaknesses in their systems. They said there is little hope of ever catching the hackers, and it could take months before the money is recovered, if at all.
FireEye Inc’s Mandiant forensics division is helping investigate the heist, people familiar with the matter told Reuters on Thursday.
The sources said Silicon Valley-based FireEye, which has investigated some of the biggest cyber thefts on record, was brought in by World Informatix, a smaller firm that is advising Bangladesh Bank on the investigation.
Security experts said the perpetrators had deep knowledge of the Bangladeshi institution’s internal workings, likely gained by spying on bank workers.
The Bangladesh government, meanwhile, is blaming the Fed for not stopping the transactions earlier. Finance Minister Abul Maal Abdul Muhith told reporters on Tuesday that the country may resort to suing the Fed to recover the money.
“The Fed must take responsibility,” he said.
The New York Fed has said its systems were not breached, and it has been working with the Bangladesh central bank since the incident occurred.
The hacking of Bangladesh Bank happened sometime between Feb. 4-5, over the Bangladeshi weekend, which falls on a Friday, the officials said. The bank’s offices were shut.
Initially, the central bank was not sure if its system had been breached, but cyber security experts brought in to investigate found hacker “footprints” that suggested the system had been compromised, the officials said.
These experts could also tell that the attack originated from outside Bangladesh, they said, adding the bank is looking into how they got into the system and an internal investigation is ongoing.
The bank suspects money sent to the Philippines was further diverted to casinos there, the officials said.
voipadmin @ March 11, 2016
Data centers power the Internet. They’re the nervous system that allows all kinds of services to run–including Facebook.
But until five years ago, the largest technology companies all designed their data centers and computing infrastructure in secret. They viewed this technology as a competitive advantage to beat others in the industry.
We realized that if we opened up our designs and shared our progress with the industry, we’d all make faster progress together. By working together, we’d produce more efficient designs that would save energy, protect the environment and build better infrastructure for our community.
Today, Google joined the Open Compute Project. Google has always built some of the best infrastructure in the industry, so this is strong symbolic move that our open model of development is the best way forward for everyone.
Over the next decade, we’re going to build experiences that rely more on technology, like artificial intelligence and virtual reality. These will require a lot more computing power, and through efforts like OCP, we’re developing a global infrastructure to enable everyone to enjoy them.
Facebook also took advantage of OCP U.S. Summit 2016 in San Jose, Calif., to tout advances in open computing over the past year and announce some new developments.
OCP highlights from the past year included:
- Equinix announced its adoption of the Wedge network-switch design and open-source architecture.
- Goldman Sachs announced that more than 80 percent of the servers it has acquired since last summer are based on OCP standards.
- IDC predicted that nearly one-half of all hyperscale servers sold globally will be based on OCP standards by 2020.
- The Department of Energy’s National Nuclear Security Administration announced plans to deploy a series of OCP-inspired high-performance computing clusters.
- Penguin Computing deployed YJ America’s OpenStack infrastructure on its Relion OCP servers for Yahoo Japan.
- The telecommunications industry was brought into the fold with the launches of the OCP Telco Project and the Telecom Infra Project.
Highlights of product announcement made at OCP U.S. Summit 2016 follow:
- Facebook introduced Lightning, which it described as “a flash building block–a flash sled–that we can use to better scale out the flash capacity across multiple applications and tune the compute-to-storage ratio.”
- Facebook announced that the OpenBMC board-management software it introduced at last year’s OCP Summit will now support storage and, specifically, Lightning.
- The designs for the 6-pack modular switch platform and Wedge operating-system-agnostic top-of-rack switch were opened.
- Facebook announced the redesign of its front-end servers to improve performance without using more power.
voipadmin @ March 11, 2016
Cutting the red ribbon for bandwidth commodity trading, high-bandwidth application service company Enron Communications Inc. Friday officially introduced its new approach to bandwidth.”This is ‘Day One’ of a potentially enormous market,” said Jeff Skilling, Enron president and chief operating officer. He compared the present inflexible agreements for pre-set capacity amounts to pre-reform “oil contracts in the 1970s, natural gas contracts prior to 1990 and electric power contracts prior to 1994.”The first contract for Enron’s (ENE) new structure is for DS-3 bandwidth between New York and Los Angeles which transmits video and other high-bandwidth data at 45 megabits per second. Global Crossing (GBLX) is selling the capacity, and has expressed its excitement to be involved in the new system.Skilling said that his company will prove that bandwidth can be traded without losing quality standards, adding that both the buyer and the seller will be monitoring the transactions.
Enron introduced plans for the new bandwidth capacity reservation system in May, promising that bandwidth trading would make Internet applications more efficient and cost-effective, as well as pave the way for development of new applications. Cisco Systems Inc. and other major companies welcomed the concept, which would free them from signing long-term capacity contracts.Enron Communications also announced that the currently operational North American (New York-Los Angeles) Benchmark Segment is expected to be connected to the mid-construction Atlantic (New York – London) Benchmark Segment soon after its introduction in May of next year. Once tapped, the connection will allow international bandwidth trade in the near future.
Global Crossing enters the picture again as the facility owner of the UK bandwidth pooling point.
Enron’s IP broadband infrastructure, the Enron Intelligent Network, is also expected to expand into Europe, Japan, Asia and South America early next year.
voipadmin @ March 8, 2016
SUNNYVALE, Calif. & YOKNEAM, Israel–(BUSINESS WIRE)–Mellanox® Technologies, Ltd. (NASDAQ:MLNX), a leading supplier of high-performance, end-to-end interconnect solutions for data center servers and storage systems, today announced it has added Cumulus® Linux® support for the Spectrum line of 10/25, 40/50, and 100 Gb/s Ethernet switches.
The addition of Cumulus Linux provides customers a best in class Network Operating System (NOS) with the highest performance and most predictable Ethernet switch platform. The availability of third party NOS solutions is the cornerstone of the Open Ethernet initiative and provides customers with freedom of choice. “Mellanox is uniquely positioned to capitalize on a big opportunity as the industry continues to move towards open solutions” Tweet this“The addition of Cumulus Linux means we now give our customers the option to choose the leading Linux NOS on the market,” said Amit Katz, vice president Ethernet switch sales, Mellanox Technologies. “We are confident our Ethernet switch platforms will continue to deliver unmatched predictability, packet performance and the ability to achieve Web-Scale IT efficiencies.”In order to achieve more agile innovation and to avoid vendor lock-in, many of the largest and most advanced web scale businesses have rejected closed, proprietary, black box switches.
Taking a page from these hyperscale data centers, more modestly sized businesses are emulating these architectures and adopting open, disaggregated switches – which separate the choice of hardware and software components. These open networking platforms enable customers to choose best of breed components in order to optimize and automate their data centers to meet their business needs. The fully integrated and tested combination of Spectrum switches and Cumulus Linux is the ideal way to achieve this agility, with an open networking platform that frees enterprises to extend and improve the pace of innovation, efficiency, and automation of their data center infrastructure.Mellanox is helping to accelerate the adoption of open networking and the transformation of businesses to achieve web-scale IT efficiencies.
The partnership between Mellanox and Cumulus Networks is a realization of the Open-Ethernet initiative and furthers both companies’ long-standing commitment to open networking, as demonstrated by their contributions to the Open Compute Project (OCP), Switch Abstraction Interface (SAI), Linux Switchdev, and Open Network Install Environment (ONIE). In addition, Mellanox has made multiple contributions of 10/25, 40/50, & 100 Gb/s Ethernet switch and OCP adapters designs.“Mellanox is uniquely positioned to capitalize on a big opportunity as the industry continues to move towards open solutions,” said JR Rivers, CEO and co-founder, Cumulus Networks. “With Mellanox’s performance-focused value proposition, Open Ethernet initiative, and large base of clients, Cumulus can expand into new markets and help accelerate customers’ move to Web IT. Open is becoming the industry standard at every level in modern infrastructure builds. As ecosystems open up, customers win; all due to selecting the best technology under the best terms.”“At Cloudalize, we offer the GPU Desktop as a Service (GDaaS) Platform to a wide range of partners for the cloud solutions they deliver to their customers, so we demand performance, predictability, and industrial-grade control of our networking equipment,” said Benny Willen, CEO Cloudalize. “Cloudalize’s requirements for high performance networking, that could be provisioned as easily as servers, led us to look at an Open solution in the form of Cumulus Linux running on top of Mellanox’s Ethernet Switches.
With Cumulus Linux, we could leverage many of our server tools to automate our network orchestration and monitoring activities. With Mellanox Ethernet Switches, we get the predictable performance we need, without worrying about packet loss.”Come see how to transform your data center and achieve web-scale IT efficiency with the Cumulus Linux running on the Spectrum switch at the Mellanox booth #B4 at the OCP Summit taking place March 9-10 at the San Jose Convention Center.
voipadmin @ March 8, 2016