The new deal comes hot on the heels of a $567 million loan from the European Investment Bank (EIB), bringing the total amount of publicly announced 5G financing to $851 million.
The Public Interest Registry (PIR) is the non-profit operator of the .ORG, .NGO and .ONG domains. If you or someone you know has the interest and qualifications to help guide the future of PIR, the Internet Society invites you to consider a seat on the PIR Board of Directors.
In 2019 there are three positions opening on the PIR Board. These three directors will serve a 3-year term that begins mid-year 2019 and expires mid-year 2022. Prior board experience is preferred. All directors must be able to read and understand a balance sheet, as well as read and communicate effectively in the English language.
More information about the position, the qualifications, and a link to the nomination form can be found at:
https://www.internetsociety.org/pir/call-for-nominations/
The deadline for nominations is 15:00 UTC on February 4, 2019.
The post Nominations Now Open for 2019 Public Interest Registry (PIR) Board of Directors appeared first on Internet Society.
Millions of records stolen: Marriott International, one of the world’s largest hotel chains, has reported a data breach affecting up to 500 million customers, the Washington Post reports. The breached database includes information on guests staying at Sheraton, Westin and St. Regis hotels. The 500 million records lost makes it the second largest data breach reported.
Encryption debate back yet again: U.S. deputy attorney general Rod Rosenstein, best known for overseeing the investigation into President Donald Trump’s ties to Russia, has renewed the Department of Justice’s long-term call for encryption workarounds in tech products, Wired.com reports. Addressing critics of encryption backdoors, Rosenstein said: “Just because people are quick to criticize you does not mean that you are doing the wrong thing. Take it from me.”
Countering view: Meanwhile, Robert Anderson, a former top cyber official at the FBI, said that since leaving the agency and working on cybersecurity issues, he now understands why tech companies would oppose government efforts to break encryption. Companies “entrusted by the clients who have given them information” have a responsibility to protect it, he said in an FCW.com story.
Someone’s watching you: Chinese Internet companies have begun to keep detailed records Continue reading
Modern LAN design can address a wide range of challenges that network architects and administrators are encountering today
During a wet autumnal walk, I was explaining to my girlfriend about my recent presentations. I've been doing my 'Getting Started with Python' talk at Aruba Airheads meet-ups. I recorded an early version of it, see below. One point I mentioned is that the reaction is always mixed. When I ask who is learning Python, about 5% of each audience put their hands up. Regularly people object to the idea of network engineers learning Python. The arguments are usually along the lines of 'network engineers already have enough to learn'.
The conversation continued as we walked through sodden leaves and we discussed why, if the other speakers were doing talks that the crowds want to hear, like product updates, I'm burdened with a subject the audience are less enthusiastic about. The assumption being that I was assigned this topic. My response: "Oh no, I choose to do this." The next question was, of course, "Why?"
There's something of the two-edged sword in the word 'why'. It can be used to undermine, casting doubt about the veracity of an argument, cutting through the rhetoric and leaving those with ill-reasoned ideas to flounder and stutter a response. But Continue reading
One of the points David Gee, a guest speaker in Spring 2019 Building Networking Automation Solutions online course, and Christoph Jaggi touched on in their interview was the security of network automation solutions (see also: automated workflows and hygiene of network automation).
What are the security risks for automation?
Security is an approach, not an afterthought.
Read more ...Time for a little more fun in the Network Detective series! Today’s “Network Detective Ride-Along” will bring us into the config setup of someone very new to MPLS L3VPNs. As we go along remember the Network Detective Mantra “Be Prepared,... Read More ›
The post Troubleshooting Basic MPLS L3VPN – Part 1 – BGP appeared first on Networking with FISH.
There are 2 appliances Riverbed has announced, adding to the SteelConnect SD-WAN products they launched a couple of years ago. The first new appliance is the SteelHead SD. The second appliance is the SteelConnect SDI. Are these enough to make Riverbed a major SD-WAN player?
The post BiB 064: Is Riverbed’s SD-WAN Product Too Late To Matter? appeared first on Packet Pushers.
In the previous post I’ve demonstrated a special-purpose CNI plugin for network simulations inside kubernetes called meshnet. I’ve shown how relatively easy it is to build a simple 3-node topology spread across multiple kubernetes nodes. However, when it comes to real-life large-scale topology simulations, using meshnet “as is” becomes problematic due to the following reasons:
That is why I built k8s-topo - an orchestrator for network simulations inside kubernetes. It automates a lot of these manual steps and provides a simple and user-friendly interface to create networks of any size and configuration.
k8s-topo is a Python script that creates network topologies inside k8s based on a simple YAML file. It uses syntax similar to docker-topo with a few modifications to account for the specifics of kubernetes environment. For instance, the following file is all what’s required to create and configure a simple 3-node topology:
etcd_port: 32379
links:
- endpoints: ["host-1:eth1:12.12.12.1/24", "host-2:eth1:12.12.12.2/24"]
- endpoints: ["host-1:eth2:13.13.13.1/24", "host-3:eth1:13.13.13.3/24"]
- endpoints: ["host-2:eth2:23.23. Continue reading
As data analytics have improved, the massive amounts of data that companies acquire from their customers has only gained in economic value. In the corporate world of today, this data can be a real asset for companies. However, as today’s news, that the records of over 500 million guests of Marriott International’s Starwood division hotels were involved in a data breach, makes clear, corporate thinking about the value of customer data needs to be reevaluated.
Especially when it comes to corporate acquisitions, companies need to start treating customer data as a potential liability, as well as an asset.
In September 2016, Marriott International acquired Starwood for $13.6 billion. When Marriott International sought to buy the Starwood hotel chain, Starwood’s customer data, played a central role in their reasoning for the acquisition. Citing higher income and better brand loyalty among program members, Arne Sorenson, the Marriott CEO, specifically referred to Starwood’s loyalty program as a “central, strategic rationale for the transaction.” Loyalty programs, in addition to attracting repeat customers, also “provide hotels with a wealth of information on their guests” which hotels can use to “create laser focused marketing campaigns for various different kinds of guests.”
While Continue reading
SDxCentral Weekly Wrap for Nov. 30, 2018: Nokia creates access networks group, and more.
The company uses AWS SageMaker Ground Truth to create natural language understanding models for customer service conversations.
The elephant in the room on both earnings calls was the VMware-AWS relationship. The latest offering — AWS branded servers running in customers’ on-premises data centers — could hurt legacy hardware vendors like Dell.
To hear the moans on Wall Street, you’d think the end of the world is no longer coming—it has arrived. Successive waves of selling have pushed share prices down this year. To about where they were at the beginning of the year. Hardly a catastrophe for investors. Continue reading