CA Technologies and Ixia extended an existing partnership to resolve scale and complexity hurdles introduced by software-defined infrastructures.
On June 12, 2018, the Internet Society hosted a briefing for Congressional staff on encryption and lawful access. Considerations Regarding Encryption and Exceptional Access offered an opportunity for participants to learn more about the technical aspects of encryption, risks associated with creating back doors, and other technical means for lawful access.
Before beginning the conversation, participants were given a primer on encryption, which offered high-level explanation of different kinds of encryption and exceptional access, and shown a video on end-to-end encryption, which used colors to explain how encryption keys are exchanged. Encryption experts, including Christine Runnegar (Senior Director, Internet Trust, Internet Society), Robyn Greene (Policy Counsel and Government Affairs Lead, Open Technology Institute), and Maurice Turner (Senior Technologist, Center for Democracy and Technology), then engaged in a two-hour, in-depth conversation with participants, answering questions and discussing global norms and policies.
The panelists emphasized that encryption is currently the most robust security tool in existence, but just as it gets more sophisticated, so too do hackers. Sooner or later this security tool will likely be bypassed and new tools will need to be created. Weakening encryption by creating keys for “backdoor” access that can evade its security measures makes any Continue reading
The visibility tool is part of the company’s Internet Intelligence initiative and uses technology acquired from Dyn, a cloud-based domain name service provider Oracle bought in 2016.
The expanded management capabilities use an application management plane that can work across different cloud providers and in on-premises locations.
Today at DockerCon, we demonstrated new application management capabilities for Docker Enterprise Edition that will allow organizations to federate applications across Docker Enterprise Edition environments deployed on-premises and in the cloud as well as across cloud-hosted Kubernetes. This includes Azure Kubernetes Service (AKS), AWS Elastic Container Service for Kubernetes (EKS), and Google Kubernetes Engine (GKE).
Most enterprise organizations have a hybrid or multi-cloud strategy and the rise of containers has helped to make applications more portable. However, when organizations start to adopt containers as their default application format, they start to run into the challenges of managing multiple container environments, especially when each of them has a different set of access controls, governance policies, content repositories and operational models. For common hybrid and multi-cloud use cases like bursting applications to the cloud for additional capacity or migrating them from one site to another for availability or compliance reasons, organizations start to realize the need for a singular control plane for all containerized applications – no matter where it will be deployed.
Docker Enterprise Edition is the only enterprise-ready container platform that can deliver federated application management with a secure supply chain. Not only Continue reading
Docker and Microsoft have been working together since 2014 to bring containers to Windows and .NET applications. Today at DockerCon, we share the next step in this partnership with the preview and demonstration of Kubernetes on Windows Server with Docker Enterprise Edition.
Docker and Microsoft brought container technology into Windows Server 2016, ensuring consistency for the same Docker Compose file and CLI commands across both Linux and Windows. Windows Server ships with a Docker Enterprise Edition engine, meaning all Windows containers today are based on Docker. Recognizing that most enterprise organizations have both Windows and Linux applications in their environment, we followed that up in 2017 with the ability to manage mixed Windows and Linux clusters in the same Docker Enterprise Edition environment, enabling support for hybrid applications and driving higher efficiencies and lower overhead for organizations. Using Swarm orchestration, operations teams could support different application teams with secure isolation between them, while also allowing Windows and Linux containers to communicate over a common overlay network.
Since then, Docker has seen the rapid rise of Windows containers as organizations recognize the benefits of containerization and want to apply them across their entire application Continue reading
Cisco plans to add intent-based networking functionality to its SD-WAN offering in the next 12 to 18 months.
Today, we are proud to announce a new website we’re calling the Internet Intelligence Map. This free site will help to democratize Internet analysis by exposing some of our internal capabilities to the general public in a single tool.
For over a decade, the members of Oracle’s Internet Intelligence team (first born as Renesys, more recently as Dyn Research, and now reborn with David Belson, former author of Akamai’s State of the Internet report) have helped to break some of the biggest stories about the Internet. From the Internet shutdowns of the Arab Spring to the impacts of the latest submarine cable cut, our continuing mission is to help inform the public by reporting on the technical underpinnings of the Internet and its intersection with, and impact on, geopolitics and e-Commerce.
And since major Internet outages (whether intentional or accidental) will be with us for the foreseeable future, we believe offering a self-serve capability for some of the insights we produce is a great way to move towards a healthier and more accountable Internet.
The website has two sections: Country Statistics and Traffic Shifts. The Country Statistics section reports any potential Internet disruptions Continue reading
Ryan Windham is the network management company’s second CEO this year. Anand Purusothaman became CEO after Manuel Rivelo left in January, and while Windham dealt with the acquisition of Cedexis.
The Alta 4.2 release supports Amazon Web Services EC2 cloud-native workloads and traditional IBM AIX and Oracle Solaris environments.
With a shared vision of putting people at the center of the Internet, the Internet Society and Consumers International have formed a new working partnership aimed at creating a safer, more trusted Internet for everyone.
As stated in a joint letter to G20 leaders, both organizations share the view that the unwritten future of the Internet is full of endless opportunity, but that if we want everyone to benefit from its potential we need to make sure it is fair, open, safe and secure.
Only by prioritizing the needs of people in an increasingly-connected world, can we make this possible. Consumers should be confident in their use of Internet-connected devices, and have the right to know how their personal data is collected, protected, shared and stored.
Our organizations plan to work together on a wide range of initiatives including to make sure individuals have access to secure Internet-connected devices, understand what online privacy and security means for them, and are empowered to make informed choices about the technology they use in their daily lives.
The Internet of Things (or IoT) offers the promise of convenience, efficiency and more personalized services. It’s a phenomenon that’s being seen all around the Continue reading
The MANRS initiative’s set of Best Current Operational Practices has received recognition from the RIPE community by being published as RIPE-706.
Mutually Agreed Norms for Routing Security (MANRS) – which is supported by the Internet Society – aims to help network operators around the world to improve the security and resilience of the global routing system through four actions that include filtering, anti-spoofing, coordination and support for global validation. It currently involves over 85 organisations encompassing nearly 200 Autonomous Systems around the world, including some of the largest ISPs.
The MANRS BCOP offers guidance on how to practically implement each of the MANRS actions, based on the operational experiences of numerous network operators around the world. It’s a must read for those working with the global routing system, as routing security is a shared responsibility and needs commitment to good practices from all its participants.
The RIPE documents are developed and approved by the RIPE community, having been published since 1989. They include technical and operational recommendations, as well as policy, procedural and organisational documents. The publication of RIPE-706 represents community recognition of the MANRS principles and the importance of a commitment to routing security.
The MANRS initiative would like to thank David Freedman, Brian Continue reading