Archive

Category Archives for "Networking"

What’s Ahead at the 2018 Plenipotentiary Conference

Today the Internet Society published a matrix of issues that will be discussed at the International Telecommunication Union’s (ITU) Plenipotentiary treaty conference (PP-18) in Dubai next month.  The matrix reflects common proposals adopted recently at some of the ITU’s regional preparatory meetings. It is intended to aid our community in preparations and serve as a useful guide on where governments stand on some of the issues that are important to the Internet Society community. Note that the matrix will be updated periodically as individual country proposals are submitted closer to the conference date. Based on the input from governments so far, Internet Governance, emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), and Over-the-Top (OTT) applications and services will rank high on the agenda at the Plenipotentiary.

While the Plenipotentiary happens every four years, it comes at a time when Internet Governance stakes are particularly high, as governments’ response to the borderless nature of Internet issues such as cybersecurity and data privacy is intensifying, and support for multilateral solutions to deal with them grows. Those that favor a multilateral governance approach might view the ITU’s international cooperation framework for global telecommunications as the natural vector into Continue reading

Weekly Show 408: Running Secure Ethernet Fabrics With Extreme Networks (Sponsored)

On today's Weekly Show podcast we dive into Fabric Connect with sponsor Extreme Networks and a customer. We get a real-world look at how Fabric Connect creates an Ethernet fabric across the network, and what that means for operations, security, and automation.

The post Weekly Show 408: Running Secure Ethernet Fabrics With Extreme Networks (Sponsored) appeared first on Packet Pushers.

The Second Annual Global People’s Summit: Imagine a World with Equal Opportunities

On 22nd of September Internet Society President and CEO, Andrew Sullivan, will take the stage in New York as part of the 2nd annual Global People’s Summit, an event dedicated to bringing new voices forward on some of the world’s most pressing issues.

We invite you to be a part of it. Here’s how:

Time: 12:20 EST / 18:20 CET
Date: 22nd September 2018
URL: https://www.globalpeoplesummit.org/

As the Internet Society believes that to build a future where the Internet is truly for everyone, everyone needs to be part of it.  The Global People’s Summit is a great way make sure some of the voices we never hear can BE heard. Now it’s up to policy and decision makers to listen.

Join us on Saturday and use the hashtag #CountMyVoice along with #GlobalPeople and stand up for a digital future where your voice counts.

The post The Second Annual Global People’s Summit: Imagine a World with Equal Opportunities appeared first on Internet Society.

A new ARM-based server processor challenges for the data center

Former Intel executive Renee James, who could have been the CEO following the ouster of Brian Krzanich last June, has instead launched a broadside attack against her former employer in the form of Ampere Computing, a startup company that develops ARM-based chips for the data center.Sound familiar? It’s what Cavium has been doing for some time — and gaining a good bit of momentum. However, the fields are still very green, and Ampere has more than enough room to grow.[ Now read: What is quantum computing (and why enterprises should care) ] Ampere is based in the Silicon Valley but has an office in Portland, Oregon, not far from Intel’s primary development facility in Hillsboro, and apparently Ampere has been picking up Intel employees left and right.To read this article in full, please click here

A new ARM-based server processor challenges for the data center

Former Intel executive Renee James, who could have been the CEO following the ouster of Brian Krzanich last June, has instead launched a broadside attack against her former employer in the form of Ampere Computing, a startup company that develops ARM-based chips for the data center.Sound familiar? It’s what Cavium has been doing for some time — and gaining a good bit of momentum. However, the fields are still very green, and Ampere has more than enough room to grow.[ Now read: What is quantum computing (and why enterprises should care) ] Ampere is based in the Silicon Valley but has an office in Portland, Oregon, not far from Intel’s primary development facility in Hillsboro, and apparently Ampere has been picking up Intel employees left and right.To read this article in full, please click here

Juniper QFX5110 | VMware NSX ESG | BGP Route Policy

This post follows on from a previous article which detailed how to establish a BGP peering session between Juniper QFX and VMware NSX Edge Gateway. This time we’ll take a look at how to configure BGP route policy and BGP filters.

Overview

When working with BGP, it’s important to consider how BGP routes are imported and exported. In certain scenarios, you may find that the default BGP import and export behaviour is sufficient. But more often than not, you will want to implement an import and export policy in order to control how traffic flows through your network. Here’s a quick reminder of the default behaviours:-

Default Import Policy

  • Accept all BGP routes learned from configured BGP neighbors and import them into the relevant routing table.

Default Export Policy

  • Do not advertise routes learned from IBGP neighbors to any other configured IBGP neighbor. Unless acting as a route reflector.
  • Readvertise all active BGP routes to all configured BGP neighbors.

In the following scenario, we’re going to configure BGP import and export policies on Juniper QFX Switches and VMware NSX Edge Gateways. The Juniper QFX switches will be configured to export a default route (0.0.0.0/0) towards the Continue reading

Apple’s dropping Back To My Mac Remote Access. Here’s an Alternative, Currently Discounted.

Apple is dropping the Back To My Mac remote access feature, and in a recent support document they urge you to be prepared by looking for alternatives.RemotePC by iDrive is a full-featured remote access solution that lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now, their 50 computer package is 90% off or just $6.95 for your 1st year. So if you need an alternative to Back To My Mac, or have been thinking about remote access, now is a good time to consider RemotePC. Learn more about it here.To read this article in full, please click here

Apple’s dropping Back To My Mac Remote Access. Here’s an Alternative, Currently Discounted.

Apple is dropping the Back To My Mac remote access feature, and in a recent support document they urge you to be prepared by looking for alternatives.RemotePC by iDrive is a full-featured remote access solution that lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now, their 50 computer package is 90% off or just $6.95 for your 1st year. So if you need an alternative to Back To My Mac, or have been thinking about remote access, now is a good time to consider RemotePC. Learn more about it here.To read this article in full, please click here

[Sponsored] Short Take – Anuta Networks

When Neustar needed to take the next step with orchestration, assurance, and telemetry, they chose Anuta Network’s ATOM. In this Network Collective Short Take, Neustar’s Director of Network Engineering (Matt Wilson) joins us to share the end user perspective about how Anuta has helped them realize operational efficiencies and what they’ve learned along the way.

Thank you to Anuta Networks for sponsoring today’s episode and supporting the content we’re creating here at Network Collective. If you would like to learn more about Anuta’s ATOM platform, you can head to https://anutanetworks.com/collective for lots of great information, white papers, case studies, and to try the ATOM platform out for yourself.

 

Matt Wilson
Neustar - Director Of Network Engineering
Jordan Martin
Host
Eyvonne Sharp
Host

The post [Sponsored] Short Take – Anuta Networks appeared first on Network Collective.

Gilad Gressel On Why You Should Watch His Newest Course: Deep Learning With Python

Hi, my name is Gilad Gressel and I’d like to tell you about my new course: Deep Learning with Python.

Deep learning is an old technology that has recently been sweeping through the field of machine learning and artificial intelligence. Deep learning powers many of the cutting edge technologies that appear to be “magic” in the world today. Voice recognition, image detection, facial recognition, AI game playing agents (Dota, Chess, and Go), all of these are examples of deep learning in action.

Why Would You Be Interested in Deep Learning?

You might be interested in studying deep learning simply because you want to know what the “magic” is, what the hype is all about. That’s a fine reason to take this course, but I urge you to dig a bit deeper. If you have ever stared at a bunch of data and known “there is a pattern here, but I can’t find it,” then this is the course for you!

About The Course

In this course you will learn what is going on in a deep learning program, what it can do and what it’s limitations are. If you are wondering if you can apply deep learning to your field Continue reading

New Case Study: The Impact of a Community Network on Improving Education in Pakistan

Two years ago, the Internet Society and COMSATS Internet Services, a local Internet service provider in Pakistan, ventured into Chak-5 Faiz, a rural village in the Punjab province, 25 kilometres from the city of Multan. At that time, some of the villagers had to walk two kilometres to access the Internet. Little did we know, tucked away in this village was a hidden treasure at the Government Girls High School in Chak-5 Faiz. At the school, we discovered a fully-equipped computer lab with nework facilities that was locked up and unused. It was unused because no one knew how to set up and use the equipment in the lab.
As part of a pilot initiative of the Wireless for Communities Programme, we worked with the local community to establish an Internet connection at the school, and there has been no turning back since. Teachers and students have been making full use of the Internet by accessing information, developing their digital literacy and finding innovative ways to use the Internet. The school connected with Tele Taleem, a local organisation based in Islamabad that specialises in online education, to improve the quality of teaching as well as students’ learning experience. This Continue reading

Roughtime: Securing Time with Digital Signatures

Roughtime: Securing Time with Digital Signatures
Roughtime: Securing Time with Digital Signatures

When you visit a secure website, it offers you a TLS certificate that asserts its identity. Every certificate has an expiration date, and when it’s passed due, it is no longer valid. The idea is almost as old as the web itself: limiting the lifetime of certificates is meant to reduce the risk in case a TLS server’s secret key is compromised.

Certificates aren’t the only cryptographic artifacts that expire. When you visit a site protected by Cloudflare, we also tell you whether its certificate has been revoked (see our blog post on OCSP stapling) — for example, due to the secret key being compromised — and this value (a so-called OCSP staple) has an expiration date, too.

Thus, to determine if a certificate is valid and hasn’t been revoked, your system needs to know the current time. Indeed, time is crucial for the security of TLS and myriad other protocols. To help keep clocks in sync, we are announcing a free, high-availability, and low-latency authenticated time service called Roughtime, available at roughtime.cloudlare.com on port 2002.

Time is tricky

It may surprise you to learn that, in practice, clients’ clocks are heavily skewed. A recent study of Continue reading