On 22nd of September Internet Society President and CEO, Andrew Sullivan, will take the stage in New York as part of the 2nd annual Global People’s Summit, an event dedicated to bringing new voices forward on some of the world’s most pressing issues.
We invite you to be a part of it. Here’s how:
Time: 12:20 EST / 18:20 CET
Date: 22nd September 2018
URL: https://www.globalpeoplesummit.org/
As the Internet Society believes that to build a future where the Internet is truly for everyone, everyone needs to be part of it. The Global People’s Summit is a great way make sure some of the voices we never hear can BE heard. Now it’s up to policy and decision makers to listen.
Join us on Saturday and use the hashtag #CountMyVoice along with #GlobalPeople and stand up for a digital future where your voice counts.
The post The Second Annual Global People’s Summit: Imagine a World with Equal Opportunities appeared first on Internet Society.
5G, intelligent connectivity, and shifting networking to the edge were some of the top topics of discussion at last week's Mobile World Congress Americas
This post follows on from a previous article which detailed how to establish a BGP peering session between Juniper QFX and VMware NSX Edge Gateway. This time we’ll take a look at how to configure BGP route policy and BGP filters.
When working with BGP, it’s important to consider how BGP routes are imported and exported. In certain scenarios, you may find that the default BGP import and export behaviour is sufficient. But more often than not, you will want to implement an import and export policy in order to control how traffic flows through your network. Here’s a quick reminder of the default behaviours:-
In the following scenario, we’re going to configure BGP import and export policies on Juniper QFX Switches and VMware NSX Edge Gateways. The Juniper QFX switches will be configured to export a default route (0.0.0.0/0) towards the Continue reading
When Neustar needed to take the next step with orchestration, assurance, and telemetry, they chose Anuta Network’s ATOM. In this Network Collective Short Take, Neustar’s Director of Network Engineering (Matt Wilson) joins us to share the end user perspective about how Anuta has helped them realize operational efficiencies and what they’ve learned along the way.
Thank you to Anuta Networks for sponsoring today’s episode and supporting the content we’re creating here at Network Collective. If you would like to learn more about Anuta’s ATOM platform, you can head to https://anutanetworks.com/collective for lots of great information, white papers, case studies, and to try the ATOM platform out for yourself.
The post [Sponsored] Short Take – Anuta Networks appeared first on Network Collective.
Hi, my name is Gilad Gressel and I’d like to tell you about my new course: Deep Learning with Python.
Deep learning is an old technology that has recently been sweeping through the field of machine learning and artificial intelligence. Deep learning powers many of the cutting edge technologies that appear to be “magic” in the world today. Voice recognition, image detection, facial recognition, AI game playing agents (Dota, Chess, and Go), all of these are examples of deep learning in action.
You might be interested in studying deep learning simply because you want to know what the “magic” is, what the hype is all about. That’s a fine reason to take this course, but I urge you to dig a bit deeper. If you have ever stared at a bunch of data and known “there is a pattern here, but I can’t find it,” then this is the course for you!
In this course you will learn what is going on in a deep learning program, what it can do and what it’s limitations are. If you are wondering if you can apply deep learning to your field Continue reading
When you visit a secure website, it offers you a TLS certificate that asserts its identity. Every certificate has an expiration date, and when it’s passed due, it is no longer valid. The idea is almost as old as the web itself: limiting the lifetime of certificates is meant to reduce the risk in case a TLS server’s secret key is compromised.
Certificates aren’t the only cryptographic artifacts that expire. When you visit a site protected by Cloudflare, we also tell you whether its certificate has been revoked (see our blog post on OCSP stapling) — for example, due to the secret key being compromised — and this value (a so-called OCSP staple) has an expiration date, too.
Thus, to determine if a certificate is valid and hasn’t been revoked, your system needs to know the current time. Indeed, time is crucial for the security of TLS and myriad other protocols. To help keep clocks in sync, we are announcing a free, high-availability, and low-latency authenticated time service called Roughtime, available at roughtime.cloudlare.com on port 2002.
It may surprise you to learn that, in practice, clients’ clocks are heavily skewed. A recent study of Continue reading
DevOps projects fall under infrastructure management but need to be treated as internal application development. With adequate planning, workflow code can be updated rapidly as part of an operational role.
Hardware vendors are always making their silicon more complex and feature-rich. Is that a great idea or a disaster waiting to happen? We asked Luke Gorrie, the lead developer of Snabb Switch (an open-source user-land virtual switch written in Lua) about his opinions on the topic.
TL&DL version: Give me a dumb NIC, software can do everything else.
If you want to know more, listen to Episode 93 of Software Gone Wild.
Both companies were focused on infrastructure, and yet there was very little overlap in their product lines.
Some of the best things in life are at our fingertips: grocery delivery, the ability to schedule a cleaner with just a few clicks, hailing and tracking drivers from your phone – and now we’d like to add instantly and conveniently accessing information that can completely transform your organization’s IT infrastructure – all from the comfort of your own laptop, from wherever you happen to be.
That’s right – this year, VMware is delighted to present an online event designed to give you all the information you’ll need to help inspire serious changes to IT infrastructure within your organization. This half-day virtual IT event will feature incredible insight from vExperts that’s sure to inspire and educate IT professionals who are itching to deliver serious digital transformation around how to modernize data centers, integrate public clouds, transform networks and security, and secure digital workplaces.
Tuesday, October 9, 2018
9:00 am – 2:00 pm PDT / 12:00 pm – 3:00 pm EDT
The robust agenda and stellar lineup boasts everything from education and inspiration to actual implementation, including:
Under the partnership, Alibaba Cloud will offer VMware’s hybrid cloud software on its cloud infrastructure.
By removing Alphabet and Facebook from the technology index, investors will be more likely to pay attention to small tech companies like Cisco, Intel, and Oracle.
“To expect just one project to oversee all of the edge use cases is not practical,” said Aricent's Shamik Mishra.
Moving the security perimeter into the cloud helps companies that are struggling with the budget and talent needed to keep security in-house.