Telecom providers are increasingly using OpenStack for NFV, 5G, and IoT. The open source platform offers providers options to alleviate the burdens of migrating to the cloud.
When asked what superhero they want their future network to be associated with, respondents’ No. 1 pick was the Hulk.
Verizon and AT&T have very different viewpoints on offering fixed 5G service. But both operators admit that there are lots of unknowns when it comes to 5G.
CEO Rajeev Suri noted that "longer term, there might be opportunities." Nokia could potentially benefit from the woes of its competitors Huawei and ZTE.
Big Switch’s data center monitoring fabric will add support for public cloud environments including AWS and Azure later this year.
Last week at RSA, more than 30 global companies came together to sign the Cybersecurity Tech Accord “to protect and empower civilians online and to improve the security, stability and resilience of cyberspace.” It is an example of collaboration, which demonstrates the commitment and focus of the signatory companies to take action in order to tackle the significant security threats we are currently facing. It is this type of collective action we have promoted as part of our collaborative security
The Tech Accord is a positive step by large corporations across the globe involved in security to come together in the name of collaboration and make security commitments that resonate with the demands of Internet users everywhere. Per the Accord’s website, there are four main tenets of the Tech Accord:
On this episode of Priority Queue, which is sponsored today by Cisco, we tackle the General Data Protection Regulation, or GDPR.
This new regulation lays out data privacy and protection obligations for organizations that handle data of EU citizens, including loss prevention, breach notification requirements, and serious fines and penalties for violations.
We delve into GDPR requirements with Equilibrium Security and ePlus/IGX Global, two Cisco partners who share practical insight and advice for dealing with GDPR.
Our guests are Anish Chauhan, Director at Equilibrium Security; and Alex Goldstein, Security Architect at ePlus/IGX Global.
We’ll discuss how to break down and understand requirements, the importance of a risk assessment and gap analysis, and how to use security and management tools to comply with the regulations.
General Data Protection Regulation (GDPR) – Cisco
Equilibrium Cyber Security Services
Equilibrium Cyber Security Podcasts – Equilibrium
2017 DBIR: Understand Your Cybersecurity Threats – Verizon Enterprise Solutions
The post PQ 147: Connecting Security And GDPR Compliance (Sponsored) appeared first on Packet Pushers.
Celebrating the work of women who are making a difference in their communities by using the Internet is something that at the Internet Society we care about. Women are building businesses, learning new professions, sharing, and collaborating online. Women are creating new opportunities for themselves and their families by taking advantage of what the Internet has to offer.
And it’s important to continue recognizing the work of these women.
EQUALS in Tech Awards is an opportunity to do so. By providing a platform for outstanding initiatives, the awards are a key piece in increasing the visibility of projects that use the power of technology to empower women and girls all across the globe.
This year’s EQUALS in Tech Awards is looking for initiatives from all stakeholders that improve women’s access to technology, promote female leadership in the tech sector, and build relevant digital skills for women and girls. Research that produces reliable evidence to tackle the digital gender divide will be also recognized.
The awards are organized annually by the EQUALS Global Partnership, an multistakeholder initiative which seeks to achieve gender equality in the digital age.
The Internet Society is proud to be vice-chair of this global movement. As such we work side by side with over 60 other organizations, companies Continue reading
There's a lot of hype about edge computing, but processing data at the edge presents some tough problems. Some solutions are emerging.
I was listening to very interesting Future of Networking with Fred Baker a long while ago and enjoyed Fred’s perspectives and historical insight, until unfortunately Greg Ferro couldn’t possibly resist the usual bashing of traditional routing protocols and praising of intent-based (or flow-based or SDN or…) whatever.
Here’s what I understood he said around 35:17
Read more ...