The integration will allow customers to deploy and manage Redis as a stateful Kubernetes service.
12 October to 6 November 1998, Minneapolis, United States: a point in time that cannot be forgotten. The ITU Plenipotentiary conference (PP-98) took place, recognizing perhaps for the first time points that impacted the future of Information and Communication Technologies (ICT) diplomacy.
The conference acknowledged the need to have the private sector as part of the union membership, together with the “associates category” for some of its study groups. Furthermore, the resolution calling for the World Summit on the Information Society (WSIS) first emerged, introducing ITU’s role in the “evolution of Internet as a means of global communication.”
The scene prior to this was an intense discussion on digital evolution. Governments were starting to understand how ICTs could help solve many issues and contribute to economic growth. The “divide” that was once prevailing between the north and the south economically, or between the developing and developed world, quickly started to shift to a “digital divide,” not only between different countries and regions, but among one country and its own boundaries and cities.
In 2001, the ITU Council approved the WSIS Summit in two phases (2003 in Geneva and 2005 in Tunisia). Later, the UN General Assembly approved the Continue reading
When you think of a “security” company, what comes to mind? Is it a software house making leaps in technology to save us from DDoS attacks or malicious actors? Maybe it’s a company that makes firewalls or intrusion detection systems that stand guard to keep the bad people out of places they aren’t supposed to be. Or maybe it’s something else entirely.
What comes to mind when you think of a traditional security company? What kinds of technology do they make? Maybe it’s a firewall. Maybe it’s an anti-virus program. Or maybe it’s something else that you’ve never thought of.
Is a lock company like Schlage a security company? Perhaps they aren’t a “traditional” IT security company but you can guarantee that you’ve seen their products protecting data centers and IDF closets. What about a Halon system manufacturer? They may not be a first thought for security, but you can believe that a fire in your data center is going cause security issues. Also, I remember that I learned more about Halon and wet/dry pipe fire sprinkler systems from my CISSP study than anywhere else.
The problem with classifying security companies as “traditional” or “non-traditional” Continue reading
AI and your job: Artificial Intelligence will affect 100 percent of the jobs out there, IBM CEO Ginni Rometty predicted, as noted at ZDNet.com. Everyone will have to change the way they work, she said. IBM’s work with its Watson AI system “starts with a fundamental belief that it’s going to change 100 percent of jobs, 100 percent of industries, and 100 percent of professions,” she added.
AI and your vote: Meanwhile, AI is creating new threats to election security, says CBS News. AI will help hackers better design attacks against voting systems, some security experts said. Automated bots can also be used to help hackers guess passwords, they said.
Big money for AI: Before we leave AI as a topic, the Massachusetts Institute of Technology has announced it will spend US$1 billion on a new college of computing with an AI focus, Fortune reports. The new college will serve as an interdisciplinary hub for data and computer science-related work.
Call it a comeback: BlackBerry, the down-on-its-luck smartphone maker, plans to reinvent itself as a secure Internet of Things hub, FT.com reports. Building on its past reputation as a maker of secure phones, BlackBerry wants to become a Continue reading
The other week I had the privilege of attending Juniper Nxtwork 2018 in Las Vegas, NV. I have attended the …
The post Juniper Nxtwork 2018 – Recap appeared first on Fryguy's Blog.
It can be a big deal for Internet users when Cloudflare rolls into town. After our recent Mongolia launch, we received lots of feedback from happy customers that all of a sudden, Internet performance noticeably improved.
As a result, it's not a surprising that we regularly receive requests from all over the world to either peer with our network, or to host a node. However, potential partners are always keen to know just how much traffic will be served over that link. What performance benefits can end-users expect? How much upstream traffic will the ISP save? What new bandwidth will they have available for traffic management?
Starting today, ISPs and hosting providers can request a login to the Cloudflare Peering Portal to find the answers to these questions. After validating ownership of your ASN, the Cloudflare network team will provide a login to the newly launched Peering Portal - Beta. You can find more information at: cloudflare.com/partners/peering-portal/
If you're new to the core infrastructure of the Internet, the best way to understand peering is to frame the problems it solves:
Would you recommend your SIP trunking provider to a friend? See which providers came out on top in the Eastern Management Group's customer satisfaction study that surveyed more than 3,000 IT managers.
This blog post was initially sent to subscribers of my mailing list. Subscribe here.
Following on his previous work with Cisco ACI Dirk Feldhaus decided to create an Ansible playbook that would create and configure a new tenant and provision a vSRX firewall for the tenant when working on the Create Network Services hands-on exercise in the Building Network Automation Solutions online course.
Read more ...On a BGP-routed network with multiple redundant paths, we seek to achieve two goals concerning reliability:
A failure on a path should quickly bring down the related BGP sessions. A common expectation is to recover in less than a second by diverting the traffic to the remaining paths.
As long as a path is operational, the related BGP sessions should stay up, even under duress.
To quickly detect a failure, BGP can be associated with BFD, a protocol to detect faults in bidirectional paths,1 defined in RFC 5880 and RFC 5882. BFD can use very low timers, like 100 ms.
However, when BFD runs in a process on top of a generic kernel,2 notably when running BGP on the host, it is not unexpected to loose a few BFD packets on adverse conditions: the daemon handling the BFD sessions may not get enough CPU to answer in a timely manner. In this scenario, it is not unlikely for all the BGP sessions to go down at the same time, creating an outage, as depicted in the last case in the diagram below.