How do we coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won’t survive for long as the network of networks grows ever larger. But it’s not just the technology, it’s also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create.
One such challenge is unwanted traffic, ranging from spam and other forms of messaging-related abuse to multi-gigabit distributed denial of service attacks. Numerous incident response efforts exist to mitigate the effects of these attacks. Some are focused on specific attack types, while others are closed analysis and sharing groups spanning many attack types.
We are helping to bring together operators, researchers, CSIRT team members, service providers, vendors, information sharing and analysis centre members to discuss approaches to coordinating attack response at Internet scale. The Internet Society is sponsoring a two-day “Coordinating Attack Response at Internet Scale (CARIS) Workshop” intended to help build bridges between the many communities working on attack response on the Internet and to foster dialogue about how we can better collaborate.
The workshop will take place on February 28 Continue reading
Attending conferences has always been expensive, time consuming and tiring. Most people don’t talk about this but prefer to highlight the positives of meeting people, sitting in high quality sessions and enjoy some time off from the repetitive activities of the $dayjob. If you have questions that you want answered but can’t attend, head over […]
The post Virtual Design Clinic 3 at Packet Pushers appeared first on EtherealMind.
Kyrgyzstan’s transition to post-Soviet renovation toward a free market economy has had severe effects on the nation’s educational system. Having limited resources, schools in Kyrgyzstan desperately need more teachers. Currently, there are over 2500 teaching positions not being covered, most of them in the fields of natural science and mathematics.
Aiming to cover the need of affordable education, the Internet Society Kyrgyzstan Chapter developed Spring of Knowledge, a project supported by the Internet Society Beyond the Net Funding Programme, to provide new learning opportunities via digital self-study materials, such as offline access to Wikipedia, the Khan Academy online courses, as well as eBooks and video lessons in local languages.
Isabek Asanbaev,
Project Manager
“The provision of textbooks in schools during the 2013-2014 academic year was only 73%.” explains the project manager Isabek Asanbaev. “The Kyrgyz Republic was ranked last in mathematics, science and reading among nations that participated in the 2006 and 2009 rounds of the Program for International Student Assessment (PISA). The National Sample-Based Achievement Test (NSBA) showed the same trend of underachievement. Our project aims to provide an opportunity for children to continue learning through self study in schools that don’t have enough teachers and Continue reading
How quickly did this blog post load? Did you happen to notice?
Most website visitors do notice that sort of thing, even if they don't realize it consciously. In fact, virtually all visitors have strong opinions about how quickly a website should load, how responsive it should be, and how often it should go down (preferably, never). Most users strongly prefer webpages that take under 5 seconds to load, and they're much more likely to leave without buying products or reading content if a page takes too long to render.
Part of the Cloudflare mission is to make the Internet better by helping it perform better. One way we are delivering on our mission is by sharing easy-to-read educational content to assist anyone with a web property.
We recently launched a performance-themed Learning Center: a series of educational articles on why performance matters, the factors affecting performance, and some of the best practices for making websites faster. Check out the Performance Learning Center!
This Learning Center is for anyone who wants to really do a deep dive into the complex topic of website performance, no matter what their technical background Continue reading
New capabilities allow security teams to create custom data collectors in the appliance using threat data from any Juniper or third-party firewall. This eliminates the need for custom code or pre-defined integrations.
Today’s enterprises use many different clouds, which makes monitoring and management more difficult than ever.
Whether through a purchase or demo gear, you have your hands on an Aerohive AP. If you have never dealt with Aerohive before from a wireless perspective, you might be asking yourself how to configure the AP. This post is meant to serve as a starting point to take that AP and put some configuration on it so that you can start connecting clients.
This post is not meant to be an exhaustive reference, as there are MANY things that can be configured. Rather, it is meant to be a starting point in which the reader is introduced to the overall configuration mechanisms within HiveManager at a high level. At the time of publishing(December 2018), these are the steps needed to put in AP into operation. However, the nature of the rapid pace at which HiveManager is updated means that things could change that alter the configuration flow. It is also worth noting that this post utilizes the public cloud/Internet option for HiveManager. Although there are 3 different deployment options for HiveManager(public cloud, private cloud, single VM), this post utilizes the public cloud option. Configuration between the 3 different models is relatively the same.
Before You Plug That AP Continue reading
My friend Andrea Dainese (of the Route Reflector Labs fame) sent me this observation:
Because of lack of fundamental skills, I see two groups forming: junior guys with low salary (the bigger group), and a few experts (hopefully with higher salary). The middle group is disappearing. Intermediate-level engineers are either moving to the entry level (because the complexity is increasing and they are not keeping up with it) or to the upper level.
I call this phenomenon bifurcation of knowledge (I’m positive it has a formal name – would appreciate a comment with a set of pointers), and it’s a direct result of commoditization and the changing shape of the learning curve.
Read more ...Cisco slashes jobs in new round of layoffs; what top Cisco executives make; and Germany joins in on Huawei bans.
In this Tech Bytes episode we talk with sponsor VIAVI about performance management and the essential role that end user experience metrics play in turning piles of data into actionable insights.
The post Tech Bytes: How VIAVI Measures End User Experience To Improve Performance Management (Sponsored) appeared first on Packet Pushers.
The newly charted ISOC Botswana Chapter is set to spread the Internet Society mandate in Botswana through engagement with relevant stakeholders. The diverse team of technical, communications, and policy practitioners will venture into impact initiatives to complement the Internet Society mission and mandate. As a Beyond the Net 2018 beneficiary, the local chapter is embarking on a project titled: “Internet for Development of Rural Botswana: Empowering Village Development Committees Through Use of the Internet.”
The Village Development Committees (VDCs) are the custodians of community development initiatives. VDCs operate on values of engagement, consultation, and participation and this project hopes to contribute in enhancing these values using the Internet. The digital literacy trainings program is designed to target VDCs leaders in 4 remote regions with the aim of empowering these village leaders with digital tools and resources. VDC Tech Champions will be identified and will be responsible for continued facilitation of the digital literacy training program. To facilitate future support, ISOC Botswana will donate laptops and wireless Internet modems to ensure resources and access.
Beyond the trainings, this project will collect impact stories of the anticipated improvements in VDCs’ operations, relating to digital access and engagement. The hope Continue reading
Bill Walker, director of network architecture and innovation with CenturyLink, said there are three business cases for NFV. The worst business case is for new technology that is not directly revenue generating.
As part of this partnership, systems integrators and value-added resellers will be able to brand and personalize Intel servers running Nutanix software.
The partners expanded their support for Pluribus’ network operating system and cloud fabric software on five additional Edgecore white box, top-of-rack switches.
Is your network ready for applications, automation, multi-cloud, containers and more? Here’s a truth bomb for you: the network that got us here today is not sufficient for tomorrow. Sorry to be sardonic, but here are the facts: today, new business models, cloud adoption, and the explosion of connected devices are now must-haves for organizations that are prioritizing digital transformation initiatives. But legacy network approaches rooted in hardware just don’t cut it anymore; technology is rapidly shifting and improving at a rate that is undeniably fast. To keep up, modern networks must be able to support operations across data centers, multiple clouds, branch locations, and edge devices while prioritizing security for the ever-growing amount of application data that flows from every point within a network.
Despite these shifts and needs, many organizations do not have a unified approach to management, automation, and security. Do you know if your network does? Find out how software-first networking can transform your business.
The Virtual Cloud Network Readiness Assessment can help you assess the current state of your network and security – for free. By answering a few questions in this 10-minute survey, you’ll get a personalized report that Continue reading
The executive team shakeup caps a tumultuous year for the company that recently concluded an internal investigation into financial disclosures and announced plans to cut about 8 percent of its global workforce.
The new deal comes hot on the heels of a $567 million loan from the European Investment Bank (EIB), bringing the total amount of publicly announced 5G financing to $851 million.