Advertisement
 
Friday, 18 April 2014

VMWare's Disaster Recovery Service in the Cloud

  

While the VMware vCloud Hybrid Service (vCHS) Disaster Recovery (DR) has been available since May 2013, it is just now gaining more notoriety. This service provides VMware’s enterprise users a public cloud option that integrates directly with their existing virtual deployments.

Recently, Matthew Lodge, VP of Cloud Services Product Marketing and Management at VMware, talked to the IT site Datamation. In their discussion of vCHS, Lodge said that anything that is running on a VMware vSphere host can be replicated, regardless of what kind of storage the customer has -- vSAN or anything else. The vCHS offers what they refer to as ‘continuous replication to enable DR.’ Per Lodge, "It's a replication rather than a back-up, and it's continuous as in the data is continuously copied from the protected site to vCHS. The VM state is captured at intervals, the Recovery Point Objective (RPO) interval, to ensure all VMs are consistent in the DR set."

The DR solution is continuous, but it is not a fully active to the point that it could be used to load balance VM workloads. Lodge states that vCHS-DR is designed for what is known as ‘active-passive DR.’ "It doesn't support active-active, though today many apps contain code to allow active-active configurations," Lodge said. "In that situation, you'd run the same VM at vCHS as you ran on-prem, and you would do state sharing between the two (built into the app) across the network."

Even though the vCHS is a remote cloud service, Lodge added that additional network acceleration hardware may be beneficial to some users due to the the data intensity that a DR operation can include. While it’s not a necessity, this hardware can help compress data and manage bandwidth and transfers. At this time, DR data stream is delta-compressed with only changes from the last set of updates being sent to vCHS.

For an existing VMware customer, there are just a few steps you’ll need to take to get this service. First, you need to download the vCloud Hybrid Service – Disaster Recovery replication virtual appliance from VMware.com. The virtual appliance is then installed into the VMware vCenter applications where the administrator will select the DR icon and perform the configuration. Lodge says, "To do that, the customer enters the API URL for the vCHS site to which they want to replicate, identifies the VMs to be protected, sets any VM-specific options, and selects the recovery point objective (15 mins - 24 hours). They then monitor from the vCenter console, and/or from the vCHS console."




Last Updated ( Friday, 18 April 2014 )
 
Friday, 18 April 2014

ATT considers taking a pass over 600Mhz spectrum rules

 

att_logo.gif

 

Unlike previous FCC spectrum auctions the FCC is now considering a policy for next year’s 600Mhz spectrum auction. Their plan is to restrict a portion of the frequency band for smaller competitors to ensure AT&T and Verizon don’t grab all the 600Mhz spectrum and squat on it, which prevents smaller companies from entering the wireless market. This policy comes after the last few spectrum auctions where Verizon and AT&T gobbled up the majority of spectrum for sale and still haven’t used a lot of the spectrum they have available now. AT&T was the first carrier to complain to the FCC in a letter stating the following:

"AT&T has never declined to participate in a major spectrum auction and certainly did not intend to do so here, where capital contributions will be needed across the wireless industry for a successful outcome. But if the restrictions as proposed are adopted, AT&T will need to seriously consider whether its capital and resources are directed toward other spectrum opportunities that will better enable AT&T to continue to support high quality LTE network deployments to serve its customers."


From this statement it sounds like AT&T is only interested in the auction if they can buy the entire 600Mhz spectrum band. Just like the 700Mhz auctions a few years ago the 600Mhz bands are highly desirable because they have better in building penetration and require fewer cell towers for coverage in rural areas. This is why both T-Mobile and Sprint are less than successful in rural areas where their 1700/1900/2100/2500Mhz bands don’t cover as large an area. Verizon and AT&T’s 700Mhz requires substantially less towers in a rural setting to cover the same space and if Sprint or T-Mobile could snatch up the 600Mhz spectrum we could see them start to offer better rural coverage.


 
Wednesday, 16 April 2014

Wilson Sleek 4G SmarTech III Cradle Amplifier (460107) Now Available - FCC Approved

wilson sleek

In anticipation of the upcoming FCC changes*, which will require cellular amplifiers to meet certain criteria (including only being sold in kits) and to be registered with the cell provider, Wilson Electronics has released a new FCC-approved version of their popular Sleek 4G cradle amplifier: the SmarTech III Sleek 4G Cradle Amplifier (460107). The Sleek 4G supports 700mhz/800mhz/1700mhz/1900mhz/2100mhz networks (which includes most 2G, 3G, and 4G providers in the US) and includes everything you need to boost the signal to a single phone or hotspot in a vehicle (a home/office accessory kit is available for use indoors).

sleek contents
The 460107 kit includes (clockwise from left): manual, Sleek cradle amplifier, 4" magnetic mount antenna w/ 12' cable, USB cable and cigarette lighter power supply, and mount

Features & Benefits:

  • Stronger cell signal indoors
  • Fewer dropped calls & lost connections
  • Faster data downloads
  • Clearer voice calls
  • Longer battery life for cellular devices
  • FCC certified to 2014 technical specs
  • Boosts voice, 3G, and 4G data signals for all major North American cell carriers
  • All needed components included in package
  • Optional home accessory kit sold separately
  • DIY installation
 
installation diagram
installation diagram (not to scale. representative graphic only - appearance of actual components may vary)

The new Sleek 4G is available now at 3Gstore at an introductory price of $148.99 (MSRP $179.99). See the full specs and order the Wilson Sleek 4G SmarTech III (460107)

*It is important to note that users of currently available amplifiers that do not meet the upcoming new FCC regulations DO NOT need to worry - all amplifiers sold before the switchover date (May 1) will be “grandfathered in.”




Last Updated ( Wednesday, 16 April 2014 )
 
Tuesday, 15 April 2014

Wilson MobilePro 45db SmarTech III Repeater Kit (460113) Now Available - FCC Approved

wilson mobile pro

In anticipation of the upcoming FCC changes*, which will require cellular amplifiers to meet certain criteria (including only being sold in kits) and to be registered with the cell provider, Wilson Electronics has released a new FCC-approved version of their popular MobilePro amplifier: the MobilePro SmarTech III Repeater Kit (460113). The MobilePro works for 800/1900mhz cellular networks, which includes most voice and 3G providers in the US and includes accessories for use both at home or in a vehicle. The MobilePro can boost the signal for multiple phones/modems at the same time, as long as they are within about 5 feet of the amplifier.

mobilepro installation
The 460113 kit includes both AC and DC power supplies as well as a window mount for the magnetic mount antenna so the kit can be used in a vehicle or at home

Features & Benefits:

  • Installs in minutes
  • FCC certified to 2014 technical specs
  • Boosts voice & 3G data signals for all major North American cell carriers
  • All needed components included in package
  • DIY installation
  • Extends cellular signal range
  • Fewer dropped calls & lost connections
  • Faster data downloads
  • Clearer voice calls
  • Longer battery life for cellular devices

The new MobilePro is available now at 3Gstore at an introductory price of $178.99 (MSRP $199.99). See the full specs and order the Wilson MobilePro SmarTech III (460113)

*It is important to note that users of currently available amplifiers that do not meet the upcoming new FCC regulations DO NOT need to worry - all amplifiers sold before the switchover date (May 1) will be “grandfathered in.”




Last Updated ( Tuesday, 15 April 2014 )
 
Tuesday, 15 April 2014

Android Found Vulnerable To Heartbleed Bug

android_heartbleed.png

It seems every day since its April 7th public release date, more information is coming to light on the Open SSL "Heartbleed" vulnerability. "Heartbleed" is the name given to a flaw found in certain versions of the OpenSSL software. Lookout Security, a major provider of Android security software, said Android phones and devices running version 4.1.1 are open to attack. While this is an older versions of Android, a little more than 30% of all Android devices are still on version 4.1.1.

The Android exploit works by injecting malicious traffic into the web browser and pulling information from the memory of any other open browser tabs. This can include secure usernames and passwords for sites like e-mail and online banking. Fortunately the way Android is developed there is no way to pull information from outside the browser, but this still opens up tens of thousands of handsets to attack.

Lookout has developed a free Android application, Heartbleed Detector, which users can install on ther Android devices. The app will scan for vulnerabilities related to Heartbleed and let you know if your device is at risk. It is recommended that anybody with Android devices running version 4.1.1 use alternative means of logging into secure sites until updates are available that fix this bug.

android_heartbleed_2.png
The Heartbleed Detector in action
More information will be updated as it becomes available.


Last Updated ( Tuesday, 15 April 2014 )
 
Friday, 11 April 2014

Simplexity / Wirefly files for Bankruptcy 

screen_shot_2014-04-11_at_10.09.18_am.png 

Years ago, 3Gstore.com had teamed up with Simplexity/ Wirefly to do mobile broadband activations. Unfortunately, this partnership did not last long. As many of our customers know, we pride ourselves on customer service - something Simplexity/ Wirefly did not. So, when the news came in about them filing for bankruptcy, we were naturally not surprised.

Checkout the details on the bankruptcy report below.

simplexity_bankruptcy.jpg

 




Last Updated ( Friday, 11 April 2014 )
 
Thursday, 10 April 2014

OpenSSL Heartbleed Vulnerability discovered

 

security_image.jpg

 

On April 7th there was a serious security flaw discovered with OpenSSL and the problem is being called “Heartbleed”. Some major companies have been affected by the security flaw including Google, AWS and Rackspace, which plan to release patches quickly to fix the issue. Any company that uses OpenSSL to terminate SSL connections could find themselves facing issues with Heartbleed. To be proactive to the growing news we’ve received statements from Peplink to inform customers that their routing platforms aren’t affected by the Heartbleed OpenSSL Flaw:

Peplink/Pepwave Statement:

“On April 7th, a serious security issue called "Heartbleed" in OpenSSL was made public. We have since reviewed our products and online services for the impact.

Peplink has verified and confirmed that all of our products are not affected by this vulnerability - including Balance, MAX, FusionHub, AP One/Pro, Surf, Device Connector families.

As for the online services, they are either unaffected or we have been able to apply mitigation to fully resolve the issue.

There is no customer action required on your part.

Thank you for your attention.

The Peplink Team“   

3Gstore.com Statement:

We have ran internal tests to check for the OpenSSL security vulnerability and passed the check. 3Gstore remains PCI Compliant and is unaffacted by the security flaw! When you shop with 3Gstore you can ensure that your data is safe and you'll experience a smooth transaction and speedy delivery of equipment. 

Cradlepoint Statement:

In response to the critical security vulnerability discovered in the OpenSSL cryptography software library (CVE-2014-0160), nicknamed “Heartbleed,” CradlePoint has taken steps to incorporate the OpenSSL version 1.0.1g into its latest firmware and Enterprise Cloud Manager. The purpose of this email is to inform you of the vulnerabilities and the steps necessary to remediate this issue.

If exploited, this vulnerability could allow attackers to monitor all information passed between a user and a web service or decrypt past traffic they’ve collected. More details can be found here: http://heartbleed.com.

Affected Products

CradlePoint recommends immediately upgrading products to the upcoming firmware versions (available 4/14/14) in order to mitigate this vulnerability. The following are affected products (with firmware versions 4.2.0 and later):

  • AER 2100

  • ARC MBR1400

  • MBR1400

  • MBR1200B

  • ARC CBA750B

  • CBA750B

  • COR IBR600

  • COR IBR650

  • CBR400

  • CBR450

  • MBR95

WAN INTERFACES

On WAN interfaces routers were only exposed to risk under the following conditions:

1) Remote access is enabled (setting disabled by default)

2) AND remote administration access control is not enabled (setting disabled by default).

 

LAN INTERFACES

On LAN interfaces routers were only exposed under the following conditions:

If the network allows Admin Access, which is the default for the Primary LAN. Guest LAN default settings do not allow Admin Access and are not exposed to this vulnerability. Admin Access can be checked using the Network Settings / WiFi / Local Networks tab, listed for each network in the “Access Control” section.

PLEASE NOTE: Product firmware is still affected by this bug and CradlePoint recommends firmware upgrades for all affected products.


Products Not Affected

  • CBA750 (prior version to CBA750B)

  • CTR35

  • CTR250

  • CTR350

  • CTR500

  • CX111 (Juniper)

  • MBR90

  • MBR800

  • MBR900

  • MBR1000

  • MBR1100

  • MBR1200 (prior version to CBA1200B

  • PHS300

  • PHS2000W

Firmware Patch Available 4/14/2014

  • 5.1.1 – AER 2100, ARC MBR1400, MBR1400, MBR1200B, ARC CBA750B, CBA750B, COR IBR600, COR IBR650

  • 5.0.4 – MBR95

Download the latest firmware (new versions available 4/14/14).

Sierra Wireless Statement: 

This bulletin provides information about the impact of CVE-2014-01601 on AirLink gateways.

 

AirLink gateways running ALEOS are not affected by the issue described in CVE-2014-0160. Known as 'Heartbleed'.

 

Update: You can use this website to check any server to see if they were inpacted by Heartbleed - http://filippo.io/Heartbleed/




Last Updated ( Wednesday, 16 April 2014 )
 

EVDO News, Tips, Products, Reviews, Verizon and Sprint Experts.
Welcome to the #1 source for EVDO Information. Search our EVDO forums, read our EVDO Blogs, check EVDO coverage and when ready, buy your EVDO products from us, your EVDO Experts. Call us @ 1-866-3GSTORE.
 
The image “http://www.evdoinfo.com/images/stories/evdo_easy_button.jpg” cannot be displayed, because it contains errors.
 

CrawlTrack: free crawlers and spiders tracking script for webmaster- SEO script -script gratuit de dÔøΩtection des robots pour webmaster