A bunch of service providers from around the world are starting to implement ONAP code into their networks.
In September, the European Commission presented a legislative proposal to address the removal of terrorist content online. There has been significant political pressure, particularly as the EU elections of 2019 approach, towards internet companies taking on increased responsibility in the area of terrorist propaganda online. This proposal would be a marked move from various voluntary initiatives taken up by some social media companies in recent times towards a legal responsibility framework for many.
While appreciating the concerns around terrorism, Cloudflare is not only troubled by the late presentation of this proposal – which leaves inadequate time for a thorough review before this EU legislative term expires – but also much of the substance. Along with others such as CDT, GSMA/ETNO and Mozilla, we have significant concerns around the legal implications, practical application and possible unintended consequences of the proposal, some of which we outline below. Furthermore, we believe that little evidence has been presented as to the necessity of the proposed measures.
The Commission’s proposal does not account for the complexity and range of information society services having a storage component - not all services have the same Continue reading
South Korea is the first nation in Asia to launch commercial 5G networks as KT, LG UPlus, and SK Telecom, switch on services.
“If you have an IoT device and it has any vulnerability and it’s visible from the Internet, it will be attacked in a number of minutes,” said Kevin McNamee, director of Nokia’s Threat Intelligence Lab and lead author of the report.
How do we coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won’t survive for long as the network of networks grows ever larger. But it’s not just the technology, it’s also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create.
One such challenge is unwanted traffic, ranging from spam and other forms of messaging-related abuse to multi-gigabit distributed denial of service attacks. Numerous incident response efforts exist to mitigate the effects of these attacks. Some are focused on specific attack types, while others are closed analysis and sharing groups spanning many attack types.
We are helping to bring together operators, researchers, CSIRT team members, service providers, vendors, information sharing and analysis centre members to discuss approaches to coordinating attack response at Internet scale. The Internet Society is sponsoring a two-day “Coordinating Attack Response at Internet Scale (CARIS) Workshop” intended to help build bridges between the many communities working on attack response on the Internet and to foster dialogue about how we can better collaborate.
The workshop will take place on February 28 Continue reading
Attending conferences has always been expensive, time consuming and tiring. Most people don’t talk about this but prefer to highlight the positives of meeting people, sitting in high quality sessions and enjoy some time off from the repetitive activities of the $dayjob. If you have questions that you want answered but can’t attend, head over […]
The post Virtual Design Clinic 3 at Packet Pushers appeared first on EtherealMind.
Kyrgyzstan’s transition to post-Soviet renovation toward a free market economy has had severe effects on the nation’s educational system. Having limited resources, schools in Kyrgyzstan desperately need more teachers. Currently, there are over 2500 teaching positions not being covered, most of them in the fields of natural science and mathematics.
Aiming to cover the need of affordable education, the Internet Society Kyrgyzstan Chapter developed Spring of Knowledge, a project supported by the Internet Society Beyond the Net Funding Programme, to provide new learning opportunities via digital self-study materials, such as offline access to Wikipedia, the Khan Academy online courses, as well as eBooks and video lessons in local languages.
Isabek Asanbaev,
Project Manager
“The provision of textbooks in schools during the 2013-2014 academic year was only 73%.” explains the project manager Isabek Asanbaev. “The Kyrgyz Republic was ranked last in mathematics, science and reading among nations that participated in the 2006 and 2009 rounds of the Program for International Student Assessment (PISA). The National Sample-Based Achievement Test (NSBA) showed the same trend of underachievement. Our project aims to provide an opportunity for children to continue learning through self study in schools that don’t have enough teachers and Continue reading
How quickly did this blog post load? Did you happen to notice?
Most website visitors do notice that sort of thing, even if they don't realize it consciously. In fact, virtually all visitors have strong opinions about how quickly a website should load, how responsive it should be, and how often it should go down (preferably, never). Most users strongly prefer webpages that take under 5 seconds to load, and they're much more likely to leave without buying products or reading content if a page takes too long to render.
Part of the Cloudflare mission is to make the Internet better by helping it perform better. One way we are delivering on our mission is by sharing easy-to-read educational content to assist anyone with a web property.
We recently launched a performance-themed Learning Center: a series of educational articles on why performance matters, the factors affecting performance, and some of the best practices for making websites faster. Check out the Performance Learning Center!
This Learning Center is for anyone who wants to really do a deep dive into the complex topic of website performance, no matter what their technical background Continue reading
New capabilities allow security teams to create custom data collectors in the appliance using threat data from any Juniper or third-party firewall. This eliminates the need for custom code or pre-defined integrations.
Today’s enterprises use many different clouds, which makes monitoring and management more difficult than ever.
Whether through a purchase or demo gear, you have your hands on an Aerohive AP. If you have never dealt with Aerohive before from a wireless perspective, you might be asking yourself how to configure the AP. This post is meant to serve as a starting point to take that AP and put some configuration on it so that you can start connecting clients.
This post is not meant to be an exhaustive reference, as there are MANY things that can be configured. Rather, it is meant to be a starting point in which the reader is introduced to the overall configuration mechanisms within HiveManager at a high level. At the time of publishing(December 2018), these are the steps needed to put in AP into operation. However, the nature of the rapid pace at which HiveManager is updated means that things could change that alter the configuration flow. It is also worth noting that this post utilizes the public cloud/Internet option for HiveManager. Although there are 3 different deployment options for HiveManager(public cloud, private cloud, single VM), this post utilizes the public cloud option. Configuration between the 3 different models is relatively the same.
Before You Plug That AP Continue reading
My friend Andrea Dainese (of the Route Reflector Labs fame) sent me this observation:
Because of lack of fundamental skills, I see two groups forming: junior guys with low salary (the bigger group), and a few experts (hopefully with higher salary). The middle group is disappearing. Intermediate-level engineers are either moving to the entry level (because the complexity is increasing and they are not keeping up with it) or to the upper level.
I call this phenomenon bifurcation of knowledge (I’m positive it has a formal name – would appreciate a comment with a set of pointers), and it’s a direct result of commoditization and the changing shape of the learning curve.
Read more ... Cisco slashes jobs in new round of layoffs; what top Cisco executives make; and Germany joins in on Huawei bans.
In this Tech Bytes episode we talk with sponsor VIAVI about performance management and the essential role that end user experience metrics play in turning piles of data into actionable insights.
The post Tech Bytes: How VIAVI Measures End User Experience To Improve Performance Management (Sponsored) appeared first on Packet Pushers.