The RISC-V initiative is creating a free and open instruction set architecture for the next generation of chipsets.
SDxCentral's latest research brief is aimed at providing enterprises contemplating purchasing SD-WAN solutions with a concrete five-step process and a set of core considerations critical to success.
Today the Internet Society published a matrix of issues that will be discussed at the International Telecommunication Union’s (ITU) Plenipotentiary treaty conference (PP-18) in Dubai next month. The matrix reflects common proposals adopted recently at some of the ITU’s regional preparatory meetings. It is intended to aid our community in preparations and serve as a useful guide on where governments stand on some of the issues that are important to the Internet Society community. Note that the matrix will be updated periodically as individual country proposals are submitted closer to the conference date. Based on the input from governments so far, Internet Governance, emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and Over-the-Top (OTT) applications and services will rank high on the agenda at the Plenipotentiary.
While the Plenipotentiary happens every four years, it comes at a time when Internet Governance stakes are particularly high, as governments’ response to the borderless nature of Internet issues such as cybersecurity and data privacy is intensifying, and support for multilateral solutions to deal with them grows. Those that favor a multilateral governance approach might view the ITU’s international cooperation framework for global telecommunications as the natural vector into Continue reading
“If you’ve got mining happening on your network, you probably have other bad stuff happening on your network, and it’s probably much worse than mining,” said CTA’s Neil Jenkins.
The software repository used the news to take a swipe at rival GitHub, which Microsoft purchased for $7.5 billion.
The Sprint T-Mobile combo will have the capacity and coverage to offer fixed 5G wireless to homes in more than 50 percent of the U.S.
On today's Weekly Show podcast we dive into Fabric Connect with sponsor Extreme Networks and a customer. We get a real-world look at how Fabric Connect creates an Ethernet fabric across the network, and what that means for operations, security, and automation.
The post Weekly Show 408: Running Secure Ethernet Fabrics With Extreme Networks (Sponsored) appeared first on Packet Pushers.
Dell EMC brings hardware production in-house, dumps Celestica; Microsoft buys AI firm Lob; and Deutsche Telekom makes updates to Bavaria mobile network.
On 22nd of September Internet Society President and CEO, Andrew Sullivan, will take the stage in New York as part of the 2nd annual Global People’s Summit, an event dedicated to bringing new voices forward on some of the world’s most pressing issues.
We invite you to be a part of it. Here’s how:
Time: 12:20 EST / 18:20 CET
Date: 22nd September 2018
URL: https://www.globalpeoplesummit.org/
As the Internet Society believes that to build a future where the Internet is truly for everyone, everyone needs to be part of it. The Global People’s Summit is a great way make sure some of the voices we never hear can BE heard. Now it’s up to policy and decision makers to listen.
Join us on Saturday and use the hashtag #CountMyVoice along with #GlobalPeople and stand up for a digital future where your voice counts.
The post The Second Annual Global People’s Summit: Imagine a World with Equal Opportunities appeared first on Internet Society.
5G, intelligent connectivity, and shifting networking to the edge were some of the top topics of discussion at last week's Mobile World Congress Americas
This post follows on from a previous article which detailed how to establish a BGP peering session between Juniper QFX and VMware NSX Edge Gateway. This time we’ll take a look at how to configure BGP route policy and BGP filters.
When working with BGP, it’s important to consider how BGP routes are imported and exported. In certain scenarios, you may find that the default BGP import and export behaviour is sufficient. But more often than not, you will want to implement an import and export policy in order to control how traffic flows through your network. Here’s a quick reminder of the default behaviours:-
In the following scenario, we’re going to configure BGP import and export policies on Juniper QFX Switches and VMware NSX Edge Gateways. The Juniper QFX switches will be configured to export a default route (0.0.0.0/0) towards the Continue reading
When Neustar needed to take the next step with orchestration, assurance, and telemetry, they chose Anuta Network’s ATOM. In this Network Collective Short Take, Neustar’s Director of Network Engineering (Matt Wilson) joins us to share the end user perspective about how Anuta has helped them realize operational efficiencies and what they’ve learned along the way.
Thank you to Anuta Networks for sponsoring today’s episode and supporting the content we’re creating here at Network Collective. If you would like to learn more about Anuta’s ATOM platform, you can head to https://anutanetworks.com/collective for lots of great information, white papers, case studies, and to try the ATOM platform out for yourself.
The post [Sponsored] Short Take – Anuta Networks appeared first on Network Collective.
Hi, my name is Gilad Gressel and I’d like to tell you about my new course: Deep Learning with Python.
Deep learning is an old technology that has recently been sweeping through the field of machine learning and artificial intelligence. Deep learning powers many of the cutting edge technologies that appear to be “magic” in the world today. Voice recognition, image detection, facial recognition, AI game playing agents (Dota, Chess, and Go), all of these are examples of deep learning in action.
You might be interested in studying deep learning simply because you want to know what the “magic” is, what the hype is all about. That’s a fine reason to take this course, but I urge you to dig a bit deeper. If you have ever stared at a bunch of data and known “there is a pattern here, but I can’t find it,” then this is the course for you!
In this course you will learn what is going on in a deep learning program, what it can do and what it’s limitations are. If you are wondering if you can apply deep learning to your field Continue reading
When you visit a secure website, it offers you a TLS certificate that asserts its identity. Every certificate has an expiration date, and when it’s passed due, it is no longer valid. The idea is almost as old as the web itself: limiting the lifetime of certificates is meant to reduce the risk in case a TLS server’s secret key is compromised.
Certificates aren’t the only cryptographic artifacts that expire. When you visit a site protected by Cloudflare, we also tell you whether its certificate has been revoked (see our blog post on OCSP stapling) — for example, due to the secret key being compromised — and this value (a so-called OCSP staple) has an expiration date, too.
Thus, to determine if a certificate is valid and hasn’t been revoked, your system needs to know the current time. Indeed, time is crucial for the security of TLS and myriad other protocols. To help keep clocks in sync, we are announcing a free, high-availability, and low-latency authenticated time service called Roughtime, available at roughtime.cloudlare.com on port 2002.
It may surprise you to learn that, in practice, clients’ clocks are heavily skewed. A recent study of Continue reading