The writing has been on the wall for SHA-1 for quite some time. The cryptographic hash has been around over a decade now, but organizations have started to move away from it as more sophisticated options became available (SHA-256, SHA-3, etc). Back in 2013, researchers published theoretical approach to generating a collision. Now with the help of Google’s computation grunt and additional resources, were able to actually generate a collision in the wild.
Our favorite material from around the web
When Broadcom announced plans to acquire Brocade, it was contingent upon divestiture of the assets from Brocade’s recent acquisition of Ruckus Wireless. Arris’ name had been circling the rumor mill for a while as a possible suitor, so it’s not too surprising. I was a little interested to see the price. At $800 million, it seems like a pretty good deal for Arris.
Sometimes, you need a champion in life. In Lee Badman’s case, he’s not just any champion, he’s a newly minited Cisco Champion! In this fun little journey, based on a Twitter comment, he investgates just how much data Open Mesh APs are using. The end result is interesting enough, but Lee’s “gonzo blogging” makes the whole post entertaining to go through.
Much like with storage, the world of container networking is still a relatively emergent space. That being said, the landscape is not completely devoid of tools. Jon Langemak wrote up a look at the Container Networking interface, going over some basic configuration and setup. Somewhat confusingly, this can work with Docker’s Container Network Model, but not out of the box.
Intel acquired Altera about 20-months ago in a big $16 billion dollar deal. While they gained their existing product portfolio, it’s taken all this time before they released a fundamentally new FPGA design. The new Cyclone 10 FPGAs are a successor to the Cyclone V series, which was first introduced in 2011 and shipped in 2012.
Adam Leventhal didn’t feel like waiting for snapshots in future MacOS updates, so he decided to find a way to take advantage of the fs_snapshot system call included in the most recent betas. He basically uses DTrace to reverse engineer how a snapshot is created. He then builds an app in an attempt to create an actual snapshot.