Last week I had the opportunity to participate in the first edition of the International Internet and Entrepreneurship Forum (FIIE), in Monterrey, Mexico. The event was convened by NIC Mexico and other organizations of the Internet community of Latin America and the Caribbean as part of the activities of INCmty, an entrepreneurial festival with several years of tradition. The intersection between both topics is a fertile ground for reflection, especially in relation to the security of Internet of Things (IoT) devices.
IoT for Innovation and Entrepreneurship
The Internet has been known as a technology for facilitating innovation and entrepreneurship. The pace of technological development, together with the evolution of the Internet, has given rise to new solutions that seek to make life easier. Such is the case of the various devices connected to the Internet, which form the Internet of Things ecosystem.
Therefore, one of the issues addressed during the Forum was the role of IoT devices in the entrepreneurial ecosystem in the LAC region. There I took the opportunity to share the Internet Society’s vision of IoT security: we want people to benefit from the use of these devices in a trustworthy environment. The issue is particularly Continue reading
We held our annual Cloudflare Retreat last week. Over 750 team members from nearly a dozen offices spent three days learning, bonding and some of them got to smash a VPN piñata on stage with a baseball bat. Yes, you read that right.
The latest feature added to Cloudflare Access let us celebrate the replacement of our clunky VPN with a faster, safer way to reach our internal applications. You can now place applications that require SSH connections, like your source control repository, behind Cloudflare Access. We’re excited to release that same feature so that your team can also destroy your own VPN (piñata not included).
We built Access to replace our corporate VPN. We started with browser-based applications, moved to CLI operations, and then began adding a growing list of single sign-on integrations. Our teammates added single sign-on support to the Cloudflare dashboard by combining Access and our serverless product, Workers. We improved the daily workflow of every team member each time we moved another application behind Access. However, SSH connections held us back. Whenever we needed to push code or review a pull request, we had to fall back to our Continue reading
Organizations need to build the necessary intelligence into their SD-WAN to anticipate problems and take corrective action. Only then will SD-WANs continue to work when outages come.
MPLS VPN and Segment Routing. Many people have been asking what are the differences between MPLS VPN and Segment Routing. In fact, this is a wrong question, because Segment Routing provides transport, MPLS VPN provides Service. They are not mutually exclusive but they are complementary. In order to create end to …
Continue reading "Segment Routing and MPLS VPN"
The post Segment Routing and MPLS VPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
MPLS VPN and Segment Routing. Many people have been asking what are the differences between MPLS VPN and Segment Routing. In fact, this is a wrong question, because Segment Routing provides transport, MPLS VPN provides Service. They are not mutually exclusive but they are complementary. In order to create end to …
Continue reading "Segment Routing and MPLS VPN"
The post Segment Routing and MPLS VPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
MPLS VPN and Segment Routing. Many people have been asking what are the differences between MPLS VPN and Segment Routing. In fact, this is a wrong question, because Segment Routing provides transport, MPLS VPN provides Service. They are not mutually exclusive but they are complementary. In order to create end to […]
The post Segment Routing and MPLS VPN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
You know that time of year when snowflakes mean more than description of uniqueness of your networking infrastructure? Some people love to complain about that season and how the weather hinders them, others put on sturdy winter boots and down jackets, change tires on their car, and have tons of fun.
Network automation is no different. Sometimes you can persuade your peers that it makes sense to simplify and standardize the infrastructure to make it easier to abstract and automate (consider that an equivalent of going to a tropic island with shiny beaches and everlasting summer), other times you have to take out your winter boots and make the best out of what you got.
Read more ... Despite saying VMware should be worth $300 per share, and filing a lawsuit against Dell to stop the deal, Icahn late today issued a statement that essentially says he’s done fighting.
For all of the excitement about the coming 5G mobile networks, there are a few words of caution from security experts.
It was the company's second quarter of 50 percent-plus growth in India.
The Data Lakes Analytics service helps customers that need cloud-native analytics and need to turn raw data into real-time insights.
In today's IPv6 Buzz episode we dive into the challenges of IPv6 adoption in the enterprise. We discuss how and why to set up an internal IPv6 working group, why you need more than the networking team involved, and other key issues. Our guest is Silvia Hagen.
The post IPv6 Buzz 013: Enterprise IPv6 Adoption Challenges And Solutions appeared first on Packet Pushers.
The collaboration will initially use IBM’s Blockchain Platform to improve reliability and transparency of information collected by different networks when routing international calls.
At a recent investor conference both AT&T and Verizon said that 5G won’t have an impact on their revenues until at least 2020.