SDxCentral Weekly Wrap for March 29, 2019: Oracle jobs cuts are tied to the cloud; VeloCloud's...
A few weeks ago, I had an interesting video chat with David Bombal in which we covered a wide variety of topics including
Note: David posted the whole list of topics with timestamps in the pinned comment under the video.
U.K. authorities have “limited confidence in Huawei’s ability to understand the content of any...
As SD-WAN matures it will need to meet the requirements of the changing enterprise, which include...
If compromised, the flaw could allow an attacker to write files to any path on the user’s machine.
It connects Azure cloud security, visibility, and analysis tools with the company’s Azure IoT Hub...
A couple of quick thoughts that I’m having ahead of Aruba Atmosphere next week in Las Vegas, NV. Tech Field Day has a lot going on and you don’t want to miss a minute of the action for sure, especially on Wednesday at 3:15pm PST. In the meantime:
I’m making some changes to the Friday Photo series (which is why I’ve not posted any of these in a bit). I will be posting a small copy of each photo to Instagram, and a fuller image over on my smugmug page. I will be including a link to the smugmug version in the instagram post, but because of the way instragram sets things up you’ll have to copy the link out and paste it into a browser separately.
I will be going back through all my images and reprocessing them, so you will probably see duplicates from time to time.
For any new technology to be trusted, it must be secure. That is why privacy and security are essential to the development of new technologies from the outset. They must not be an afterthought.
This is especially so for the Internet of Things (IoT) and the plethora of devices that are now available. These devices are gradually being integrated into daily life as we enjoy the benefits they bring. In a number of cases, we are also increasing our dependence on them, such as fitness monitors and home automation.
But poorly-secured IoT devices and services can serve as entry points for cyber attacks, compromising sensitive data and potentially threatening the safety of individual users, as well others.
Attacks on infrastructure and other users, fueled by networks of poorly-secured IoT devices, can affect the delivery of essential services such as healthcare and basic utilities, put the security and privacy of others at risk, and threaten the resilience of the Internet globally.
As concerns mount about the need for regulating the ecosystem and policymakers around the world consider ways to secure it throughout its product lifecycles, it is important to consider the risks this fast-growing technology poses, as well as what steps Continue reading
The initiative targets interoperability and data exchange between Microsoft’s Dynamics 365,...
Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Cast Box and Sticher!
Click here for our previous episode.
Telemetry, is it cool or not? Host Brian tries to wrangle in JR Rivers and Scott Raynovich to find out in our latest episode. Will he succeed? Or, more importantly, what does integrated networking telemetry mean and why should you care? Listen and find out although pro tip: make sure you listen to the whole episode to find out what surprising band JR has been listening to.
Guest Bios
Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a variety of jobs, including bartending in three countries and working as an extra in a German soap opera. You can find him on Twitter at @bosullivan00.
Scott Raynovich: Scott is the Founder and Principal Analyst at Futuriom. Founded in Continue reading
The company plans to hire in the fields of software and hardware engineering, research science, and...
The vulnerability could allow a remote attacker to execute arbitrary commands on the underlying...
Nokia and China Unicom claim this is the first network with 4G and 5G running on the same cloud...