Many Chinese service providers are reliant upon ZTE’s optical gear for their transport networks and backhaul. And switching to another vendor is not that easy.
With service-mesh technologies, such as Envoy and Istio, web services can effectively talk to each other and become building blocks to create applications.
One analyst said Ciena was the source of the current price war in the optical networking space.
The telecom will cut costs and employees as it attempts to evolve its legacy networks and fend off regulatory impact.
The software moves workloads between on-premises data centers and the cloud and allows customers to automate where their data lives.
Creating a safer and trusted Internet MUST involve education building and awareness raising. This is one message that came up at the women’s event during the 2018 Africa Internet Summit held in Dakar.
“Education should target mothers who do not always believe that they can have an important role in the Internet world and who are the ones educating the future generation of women in tech. Also, we should educate developers of applications used on the Internet to consciously include safety by design, as well as governments to enact cyber laws that protect their citizens,” one of the participants stated during her presentation. With this, they meant that not only individuals, but also companies and governments have an important role in building a safer and trusted Internet.
Raising awareness of Internet safety was another point raised by many of the participants. “In school, we are taught to use computers and the Internet, but we are not taught about how to use the Internet safely,” one participant stressed. The attendees called for educational systems to change. They also suggested addressing online privacy and safety concerns so girls can be aware from the very beginning.
Privacy of personal data was another important Continue reading
In January 2018, the Internet Society Nepal Chapter organized the first Nepal School on Internet Governance (npSIG) in collaboration with the Forum for Digital Equality. The initiative offered an intensive two-day learning course covering a wide list of topics at the Institute of Engineering Pulchowk in Kathmandu. The initiative helped participants to identify global and regional issues and facilitate the understanding of several aspects of Internet Governance, including access, diversity, security, privacy, IoT, and human rights within the Nepalese policy framework. The schedule included theoretical sessions, roleplays, and attendee engagement activities. All brilliant speakers presentations are available on sig.org.np for further consultation.
One of the major objectives of npSIG was to raise awareness among young people about Internet Governance issues and to promote their participation in the discussion. The speakers inspired analysis, critical thinking and motivated the audience to design effective questions and take action.
The opening speech delivered by Baburam Aryal, Chairperson at the Forum for Digital Equality, enhanced the understanding of the Internet Governance concept, which in Nepal is in the very early stages of development. The establishment of a proper ecosystem is complex as Continue reading
The post BGP and Traffic Engineering Mechanisms for WISPs appeared first on Noction.
A colleague just received an “Urgent Security Alert – Action Requested” email from Nest. At first glance it looked like either a phishing attempt or one of the way-too-often breach notifications we all receive these days. Instead, it was a real alert notifying him that the password he uses for his Nest account had been compromised in a data breach – not at Nest but somewhere else. Nest encouraged him to update to a unique password and enable two-step verification (additional authentication beyond a password, usually referred to as multi-factor authentication).
While it’s not clear exactly how Nest determined that the password was compromised, it could have come from security researcher Troy Hunt’s recently updated Pwned Passwords service (part of his “have i been pwned?” site). Via this service, you can enter a password to see if it matches more than half a billion passwords that have been compromised in data breaches. A hashed version of the full list of passwords can also be downloaded to do local or batch processing. (“Pwned” is video gamer talk for “utterly defeated,” as in “Last time we played, I pwned him.”)
Hunt created this service in response to the National Continue reading
Experts at Interop ITX discussed how cloud, containers, open source, and other trends are transforming IT infrastructure.