You might have noticed that our Winter 2019 webinar schedule got crazily busy with seven live sessions in the first two months of the year (another first)… but that’s not all, there are two more live sessions that we haven’t announced yet as we always schedule a single live session of a particular webinar.
Wondering what’s coming during the rest of 2019? Starting with committed ideas:
Read more ...In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. While preparing to launch the 2019 Global Internet Report, we interviewed Chris Yiu to hear his perspective on the forces shaping the Internet’s future.
Chris is a senior policy fellow for technology in the Renewing the Centre team at the Tony Blair Institute for Global Change. His work focuses on how new technologies can be used to enhance the functioning of liberal democracy, and on policy solutions to the new economic challenges of automation and the digital economy. Chris was previously a general manager at Uber and has held senior roles in a number of public, private, and third-sector organizations. He recently authored the report, “A New Deal for Big Tech: Next-Generation Regulation Fit for the Internet Age” (Tony Blair Institute for Global Change, 2018).
The Internet Society: In your report you write that this “new deal for big tech” is urgent for protecting democratic values globally. Why?
Chris Yiu: Political leaders face an external environment characterised by disruption Continue reading
It's been more than a year since Cisco made a splash with its intent-based networking announcement. But the term seems to apply to everything from a bird's-eye-view to a worm's-eye-view.
While Cisco maintained its dominance in the enterprise infrastructure market, HPE beat out the vendor in the data center server segment of the market.
The job cuts are planned to begin later this month at 10 of AT&T's operational hubs across the country.
Much like most other problems in technology, securing the reachability (routing) information in the internet core as much or more of a people problem than it is a technology problem. While BGP security can never be perfect (in an imperfect world, the quest for perfection is often the cause of a good solution’s failure), there are several solutions which could be used to provide the information network operators need to determine if they can trust a particular piece of routing information or not. For instance, graph overlays for path validation, or the RPKI system for origin validation. Solving the technical problem, however, only carries us a small way towards “solving the problem.”
One of the many ramifications of deploying a new system—one we do not often think about from a purely technology perspective—is the legal ramifications. Assume, for a moment, that some authority were to publicly validate that some address, such as 2001:db8:3e8:1210::/64, belongs to a particular entity, say bigbank, and that the AS number of this same entity is 65000. On receiving an update from a BGP peer, if you note the route to x:1210::/64 ends in AS 65000, you might think you are safe in using this Continue reading
Verizon wants to be cable operators’ “best long term partner,” but its 5G Home service targets these same companies.
Huawei and ZTE have gained unwelcome notoriety on the global stage of late, but in their home market of China at least they are able to move ahead with 5G development plans.
There’s no doubt that Software-Defined Wide Area Networking is one of the most hyped technologies we’ve seen recent history. From cost savings to unprecedented simplicity, no claim seemed to be off limits when it came to controller driven networks. Now that’s it’s 2019 and some of the dust is settling we wanted to have a chat with a couple of engineers who have been in the thick of it and know what it’s really like to design, implement, and operate Software-Defined WANs.
We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective.
We would also like to think PathSolutions for sponsoring this episode of Network Collective. PathSolutions TotalView is designed to automatically dig deep into network devices to learn what they know about your network’s performance. This means your network is no longer full of mysteries because you know everything your network knows. Try TotalView on your Continue reading
I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. The post linked here looks at where we define our source of truth for device configurations; is it the device itself? Should it be? This is a key question when looking at automation, and one we should all be asking ourselves.
This post appeared on Orange Matter as “Where Is Your Config Source of Truth?“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent, which is perhaps a bit more in character.
I’d love it if you were to take a moment to visit and read, and maybe even comment!
If you liked this post, please do click through to the source at Orange Matter: Where is Your Configuration Source of Truth? and give me a share/like. Thank you!
IoT security is a pretty hot topic in today’s world. That’s because the increasing number of smart devices is causing issues with security professionals everywhere. Consumer IoT devices are expected to top 20 billion by 2020. And each of these smart devices represents an attack surface. Or does it?
Adding intelligence to a device increases the number of ways that it can compromised. Take a simple thermostat, for example. The most basic themostat is about as dumb as you can get. It uses the expansion properties of metal to trigger switches inside of the housing. You set a dial or a switch and it takes care of the rest. Once you start adding things like programmability or cloud connection, you increase the number of ways that you can access the device. Maybe it’s a webpage or an app. Maybe you can access it via wireless or Bluetooth. No matter how you do it, it’s more available than the simple version of the thermostat.
What about industrial IoT devices? The same rule applies. In this case, we’re often adding remote access to Supervisory Control And Data Acquistion (SCADA) systems. There’s a big market from enterprise IT providers to create Continue reading
The new year will see an appetite for unified communications solutions grow as customer expectations increase in today’s “always available from anywhere” business environment.
Here’s some feedback I got from a subscriber who got pulled into an SD-WAN project:
I realized (thanks to you) that it’s really important to understand the basics of how things work. It helped me for example at my work when my boss came with the idea “we’ll start selling SD-WAN and this is the customer wish list”. Looked like business-as-usual until I realized I’ve never seen so big a difference between reality, customer wishes and what was promised to customer by sales guys I never met. And the networking engineers are supposed to save the day afterwards…
How did your first SD-WAN deployment go? Please write a comment!