Archive

Category Archives for "Networking"

Internet and Jobs: What Do Young People Think of the Future of Work?

When we talk about the impact of the Internet and technology on future jobs, is important to bring youth to the center of the discussion: they will live the future of work and can contribute to shaping it.

“The Internet and Jobs: A Youth Conversation,” held in Panama in June 2018, was a side event organized by the Internet Society in coordination with Y20 and the Youth Observatory that brought together a group of young people, students, lawyers, communicators, and entrepreneurs to discuss the topic.

What do young people think about the impact of the Internet on employment? How do they see themselves in this scenario? What tools are necessary to take full advantage of the opportunities that the Internet offers them? These were some of the most challenging questions addressed during the meeting.

While education was the key of the debate, several themes came up from the conversation:

  • Boosting digital skills by scaling initiatives:It was argued that the lack of digital skills is starting to amplify the digital divides as more and more jobs are requiring some level of digital skills. In this context, equipping children and youngsters with the skills required to enter the job market is Continue reading

Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD

As consumer IoT devices inevitably find their way into the workplace, IT pros need to isolate them from the rest of the enterprise network, perhaps on a network of their own, so they don’t become backdoors exploitable by attackers, according to the head of the Online Trust Alliance.Jeff Wilbur, the director of the alliance, which is an initiative within the larger Internet Society, says that it is better to embrace employees’ internet-of-things devices and allow them to be used safely than to ban them and risk their unauthorized, unprotected use that could undermine network security.To read this article in full, please click here

Q&A: Jeff Wilbur of the Online Trust Alliance on why enterprise IoT security is a lot like BYOD

As consumer Internet of Things (IoT) devices inevitably find their way into the workplace, IT pros need to isolate them from the rest of the enterprise network, perhaps on a network of their own, so they don’t become backdoors exploitable by attackers, according to the head of the Online Trust Alliance.Jeff Wilbur, the director of the alliance, which is an initiative within the larger Internet Society, says that it is better to embrace employees’ IoT devices and allow them to be used safely than to ban them and risk their unauthorized, unprotected use that could undermine network security.To read this article in full, please click here

1.1.1.1 for Your Organization

1.1.1.1 for Your Organization

1.1.1.1 for Your Organization

A few months ago, we announced the world’s fastest, privacy-first, recursive DNS resolver, 1.1.1.1. It’s been exciting watching the community reaction to this project, and to be in a position where we can promote new standards around private DNS.

The Cloudflare network helps to make measurable improvements to the Internet by rolling out security updates to millions of websites at once. This allows us to provide free SSL certificates to any website, and to implement state-of-the-art security for our customers.

We saw the same potential impact when deciding to build 1.1.1.1. From launch, we wanted people to be able to connect to their favorite websites faster, and to ensure that no entity between their computer and the origin web server was recording their browsing history. We’re proud to have achieved that goal with the fastest public DNS resolver in the world.

Consumer adoption of the resolver has been strong, and it makes sense: new legislation allows ISPs to track and sell your web history. But, not everyone feels comfortable changing the default DNS resolver on their computer or home network. We want to empower IT departments and network administrators to change the default DNS Continue reading

Episode 31 – Analytics and Security

Security is facing a crisis of well trained engineers. As a result, operators are relying more heavily on analytics to provide security intelligence. In this show, Eric Osterweil joins Network Collective to discuss the use of analytics in security, and the role analytics can play to augment engineering talent.


 

We would like to thank Core BTS for sponsoring this episode of Network Collective. Core BTS focuses on partnering with your company to deliver technical solutions that enhance and drive your business. If you’re looking for a partner to help your technology teams take the next step, you can reach out to Core BTS by emailing them here.

 

We also would also like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus is bringing S.O.U.L. back to the network. Simple. Open. Untethered. Linux. For more information about how you can bring S.O.U.L. to your network, head on over to https://cumulusnetworks.com/ncautomation. There you can find out how Cumulus Networks can help you build a datacenter as efficient and as flexible as the worlds largest data centers and try Cumulus technology absolutely free.

 


Eric Osterweil
Guest

Eyvonne Sharp
Host

Lenovo gets into the on-premises cloud game with ThinkAgile CP

Lenovo has launched a new product line called ThinkAgile CP that consists of Lenovo ThinkSystem hardware and Cloudistics software for what it calls a “composable cloud,” or cloud-in-a-box, where the attributes of cloud multi-tenancy are available to organizations behind their firewall.Basically it’s a hyperconverged system preconfigured to work right out of the box and operate inside a data center much like a cloud service provider. Compute, storage, and networking are designed to connect to the ThinkAgile CP Cloud Controller, which in turn lets an IT administrator spin up multi-tenant provisioning. Software-defined compute, storage, and networking can be achieved in just a few clicks.To read this article in full, please click here

Lenovo gets into the on-premises cloud game with ThinkAgile CP

Lenovo has launched a new product line called ThinkAgile CP that consists of Lenovo ThinkSystem hardware and Cloudistics software for what it calls a “composable cloud,” or cloud-in-a-box, where the attributes of cloud multi-tenancy are available to organizations behind their firewall.Basically it’s a hyperconverged system preconfigured to work right out of the box and operate inside a data center much like a cloud service provider. Compute, storage, and networking are designed to connect to the ThinkAgile CP Cloud Controller, which in turn lets an IT administrator spin up multi-tenant provisioning. Software-defined compute, storage, and networking can be achieved in just a few clicks.To read this article in full, please click here

MPLS and VRFs – Filling the Gaps

A few years ago, I took an SE role covering Higher Education accounts. I quickly realized one of the deficits Cisco has in the CCNA program as it pertains to networks with a certain set of requirements. While the program is jam-packed with great information, there are a few concepts that an administrator may have to deal with that catch them by surprise. Three related topics that aren’t covered in CCNA Routing and Switching are shown below.

This article is meant to serve as a starting point for those who may be very strong with routing and switching but lack the exposure to VRFs, Layer 3 Segmentation, and MPLS. It is a good starting point for new employees that might face this challenge and it will certainly help them gain perspective on these topics.

Introduction to VRFs

Segmenting Layer 3 Networks with VRFs

Going Proactive on Security: Driving Encryption Adoption Intelligently

Going Proactive on Security: Driving Encryption Adoption Intelligently

It's no secret that Cloudflare operates at a huge scale. Cloudflare provides security and performance to over 9 million websites all around the world, from small businesses and WordPress blogs to Fortune 500 companies. That means one in every 10 web requests goes through our network.

However, hidden behind the scenes, we offer support in using our platform to all our customers - whether they're on our free plan or on our Enterprise offering. This blog post dives into some of the technology that helps make this possible and how we're using it to drive encryption and build a better web.

Why Now?

Recently web browser vendors have been working on extending encryption on the internet. Traditionally they would use positive indicators to mark encrypted traffic as secure; when traffic was served securely over HTTPS, a green padlock would indicate in your browser that this was the case. In moving to standardise encryption online, Google Chrome have been leading the charge in marking insecure page loads as "Not Secure". Today, this UI change has been pushed out to all Google Chrome users globally for all websites: any website loaded over HTTP will be marked as insecure.

Going Proactive on Security: Driving Encryption Adoption Intelligently

That's not all though; Continue reading