
Cisco took FOUR YEARS to patch disclosed vulnerabilities in NX-OS.
It uses Intel and Fortanix software.
Girls in Technology is a community-based initiative to help increase schoolgirls’ participation in emerging Internet technology careers. The pilot project, lead by the Internet Society Sri Lanka Chapter and supported by Beyond the Net Funding Programme, will provide grade 9 girls with coding lessons and extracurricular activities to help them select ICT subjects at grade 10. Niranjan Meegammana, project leader and director of the Shilpa Sayura Foundation, explains how this initiative will contribute to gender equality in STEM education and help the young women reach for the stars.
Internet Society: What motivated the Chapter to take this initiative?
Niranjan Meegammana: Sri Lanka is fast becoming a hub for technology and innovation, offering a wide range of careers in technology fields. However, girls pursuing a career in technology still remain a limited number. Girls are representing 50.28% of school population, but only 20% are actually studying ICT. The gender gap keeps on growing and generating a labor surplus. The root cause of this problem is the scarcity of opportunities for girls and teachers in the Internet sector.
Which innovative solutions will the project attempt to solve this problem?
Girls in Technology is implemented by Sri Lanka Chapter with Continue reading
The President's order cited "credible evidence" that the takeover would be a security risk to the U.S.
In this short take, recently posted over at the Network Collective, I discuss what a side channel attack is, and why they are important.
AOS is the first automation software in the Yahoo Japan data center that it didn’t build itself.
The France-based provider enhanced its WAN capabilities with Versa's Cloud IP platform.
You can't stop the spread of Kubernetes, you can only hope to contain it.
The platform monitors more than 5 billion transactions per month, and generates real-time alerts when it detects behavioral anomalies.
Every time you see “Login with Facebook” or “Login with Twitter” etc. on a website or use login credentials issued by your employer or school, you’re using Identity and Access Management (IAM) technologies in the background. IAM has become central to our online interactions, but like a lot of infrastructure it’s largely invisible to users (at least when it’s well designed and implemented). IAM is evolving rapidly, the stakes are high, and enterprises face an increasingly complex and puzzling digital identity landscape. There is also growing concern that businesses know too much about us, and therefore end users should reclaim control over their own identities. IAM is a hot topic in the technology world, with new architectures, business models, and philosophies all in play.
Blockchain technology (sometimes also called distributed ledger technology – DLT) is also gaining attention. Proponents advocate it for a wide variety of use cases, including IAM. Blockchain is a broad class of relatively new data security methods, with certain properties of potential value in IAM. Many IAM companies have launched identity registration solutions “on the blockchain,” while others are developing new blockchain-inspired infrastructure for distributing information about users (called “attributes” and used to inform decisions about Continue reading
The Container Monitoring Essentials hub page discusses the importance of containers in today’s datacenter environment, predicting that containers will—in time—be the means by which all workloads are deployed on server platforms.
The post BGP / MPLS Layer3 VPNs appeared first on Noction.


Exactly one year ago today, Cloudflare gave me a mission: Make it so people can run code on Cloudflare's edge. At the time, we didn't yet know what that would mean. Would it be container-based? A new Turing-incomplete domain-specific language? Lua? "Functions"? There were lots of ideas.
Eventually, we settled on what now seems the obvious choice: JavaScript, using the standard Service Workers API, running in a new environment built on V8. Five months ago, we gave you a preview of what we were building, and started the beta.
Today, with thousands of scripts deployed and many billions of requests served, Cloudflare Workers is now ready for everyone.
"Moving away from VCL and adopting Cloudflare Workers will allow us to do some creative routing that will let us deliver JavaScript to npm's millions of users even faster than we do now. We will be building our next generation of services on Cloudflare's platform and we get to do it in JavaScript!"
— CJ Silverio, CTO, npm, Inc.
Historically, web application code has been split between servers and browsers. Between them lies a vast but fundamentally dumb network which merely ferries data from point to Continue reading
Our colleague Jan Žorž will be promoting RIPE-690 “Best Current Operational Practice: IPv6 prefix assignment for end-users – persistent vs non-persistent, and what size to choose” as the opening keynote at the forthcoming Netnod Meeting on 14-15 March 2018 in the Sheraton Hotel, Stockholm, Sweden.
RIPE-690 outlines best current operational practices for the assignment of IPv6 prefixes (i.e. a block of IPv6 addresses) for end-users, as making wrong choices when designing an IPv6 network will eventually have negative implications for deployment and require further effort such as renumbering when the network is already in operation. This was published in late 2017 after a year of intensive work by IPv6 experts around the world, supported by the Internet Society’s Deploy360 programme.
Netnod is a neutral, not-for-profit Internet infrastructure organisation based in Sweden that operates six Internet exchange points (IXPs) in five different cities where network operators can connect and exchange traffic.
There’s also several other interesting talks on the agenda, including trends in Internet-of-Things Distributed-Denial-of-Service botnets, prudent TLS, how to practically deploy IPv6 in the mass-market, how clouds are making new demands for connectivity and hyperconnected datacentres, and establishing research networks in Arctic environments, plus a panel session on the future of peering Continue reading