A recent survey on mobile security confirms what most suspect. Most enterprises still have much work to do to bring mobile security up to par, especially for devices that spend most of their time connecting to data and applications on third-party networks.
You’ve been running your Cumulus Linux network for a while, and everything has been running perfectly. Cumulus Linux has sliced your bread, you’ve gotten a promotion because your boss can’t believe how successful the project was, and the cost savings being felt by the organization. Your company has even been able to fire the accountant because Cumulus Linux has surprisingly also done your taxes for the coming year, and in general everything is going swimmingly with your open networking.
So what now, is our story over? Well not exactly, enterprise networks have long lifespans. Hyperscalers typically operate on a refresh cycle of 3-5 years. For them, anything over 3/yrs old is considered tech debt. Anything over 5/yrs old is considered a critical fault point. Your typical enterprise network may be around even longer than that. It is very common in this timespan for the needs of the applications to change requiring the network to change too. This often requires support for newer features at some point in the lifecycle of the equipment.
While the scenario above is quite rosey, (Hey – this is our blog after all!) the reasons for wanting to upgrade are many and varied. New features, Continue reading
During VMworld 2018, the Packet Pushers team girded themselves with an array of video gear. We conducted a live deployment to validate some ideas we had about producing video. Our starting idea is to asking a single question “What do customers not know about your company/product/technology?” In the end, we did about 30 videos of […]
The post More Videos By Us appeared first on EtherealMind.
Arista strengthened its campus networking portfolio of products through its acquisition of Mojo Networks.
Last week, we have had a busy two days (11-12 October 2018) in Dakar participating in a mutlistakeholder workshop on Privacy and Personal Data Protection in Senegal co-organized by the Personal Data Protection Commission (CDP), the Ministry in charge of Digital Economy (MCTPEN), the Internet Society Senegal Chapter, and supported by the African Regional Bureau of the Internet Society. This workshop was recommended in the Personal Data Protection Guidelines for Africa launched in May 2018 during #AISDakar by the African Union and the Internet Society.
Senegal stands out as the first African Union member to act on that recommendation and run such a workshop, bringing together policy makers, law enforcement, data protection authorities, lawyers, academics, entrepreneurs, and actors of the private sector, civil society, and technologists to debate the issues and build a shared vocabulary and shared understanding.
The discussion was wide-ranging, informed, and mature…
Wide-ranging, because the organizers did a great job of attracting a diverse and engaged set of stakeholders and giving them the time and space to contribute.
Informed, because the participants were asking all the right questions (about privacy, innovation, cybercrime, threats to information, reputation and Continue reading
Altiostar, Mavenir, and Parallel Wireless were picked by TIP’s OpenRAN project for having the most compliant platforms.
These devices will be open, disaggregated, interoperable, and supplier-neutral, and they target mobile operators’ 5G deployments.
SendGrid sells an email marketing platform to businesses. The purchase will enable Twilio to bring all of its customers' communications channels under a single platform and company.
Neoverse represents a new unifying brand identity for ARM-based technology for high performance computing, cloud, storage, network infrastructure, and edge computing.
In this interview, IBM’s Brian O’Connell, Distinguished Engineer and Master Inventor, and Steve Currie, Distinguished Engineer, talk about IBM’s networking approach.
What if future generations in 2030 learned about gender inequality in their history class and not in their lived realities? What can rural women achieve when included in digital society? What can we do now to ensure a future without a gender digital gap?
Many women and girls are being left behind in digital development. Women are 12% less likely to use the Internet globally than men, while in low and middle-income countries, the gap between women’s use and that of men is 26%. This is not only a question of connectivity, but about using the Internet in a meaningful way.
These were some of the critical issues the W20 Summit tackled in Buenos Aires last week.
W20 Argentina, a step forward in the right direction
Women20 (W20) is one of the key G20 engagement groups which supports the promotion of gender inclusive economic growth.
Its recent summit was an opportunity for leaders to make progress on several fronts ranging from digital inclusion to labor inclusion, financial inclusion, and rural development.
In the final Comuniqué, 146 delegates from all sectors of the economy committed to “[Improving] access, affordability, safety, and security of digital services, broadband, and connectivity plans, and the Continue reading