The tests could break new ground in terms of supporting 5G use cases using very high mmWave spectrum bands.
The operator said it is on track to launch 5G in a handful of markets later this year but is still cagey about the details. Launch cities remain a mystery.
I was over at ipspace to talk to Ivan and several other folks about openfabric. This is one of those situations where… Well, the algorithm openfabric uses to calculate fabric location has changed slightly in the last week. Welcome to the world of networking technology.
Cyber warfare and cryptomining dominated RSA Conference keynotes and talks with technologists, who advocated a back-to-basics approach to network security.
In this SDxCentral eBrief, we look at the types of security threats that are becoming more prevalent and examine some of the latest techniques and tools that enterprises are employing to make sure that their business assets in the cloud are secure.
A deep, comprehensive review of BPF
Encryption is an important technical building block for Internet trust. It secures our infrastructure, enables e-commerce, ensures the confidentiality of our data and communications, and much more. Yet, because bad actors can also use encryption to hide their activities, it can present challenges for law enforcement.
How, or even if, law enforcement should gain access to encrypted content has remained a divisive issue for the last twenty years. Yet, even as encryption tools have grown in variety and use, the public debate has become over-simplified into a battle between those for and against encryption. That public debate often fails to address the nuances of the digital-communications and data-storage landscape, or how it has evolved. With both sides largely talking at each other, rather than listening to one another, there has been little headway towards a solution, or set of solutions, that is acceptable to all.
In October of 2017, the Internet Society and Chatham House convened an experts roundtable under the Chatham House Rule to deconstruct the encryption debate. They explored ways to bridge two important societal objectives: the security of infrastructure, devices, data, and communications; and the needs of law enforcement. The roundtable brought together a diverse set of Continue reading
Thanks to all who joined us for the Dell EMC webinar, Putting NFV Into Production with Ease – A Service Provider Perspective.
New application architectures like microservices and containers will drive new network architectures to enable automation.
Last year Cisco announced that they would revise their certifications more often and in smaller increments instead of doing only major revisions which had problems keeping up with the pace of the industry.
This is exactly what they are now doing to the CCIE Datacenter certification which is being updated from version 2.0 to 2.1.
The full list of changes can be seen in this link.
Some highlights of the change below:
It is clear that ACI and cloud are important going forward and some older technologies had to be removed to make room for the new additions. Seems like a good updated to me. I’m happy to see these minor revisions coming in instead of the major ones which usually only took place every four years or so.
The post CCIE Datacenter Updated to Version 2.1 appeared first on Daniels Networking Blog.
The network automation evangelists love to tell you that automation is more than just device configuration management. They’re absolutely right… but it’s nonetheless amazing how much good you could do with simple tools solving simple problems.
Here’s what I got from Nicky Davey:
Read more ...