RightScale report shows Microsoft making headway against AWS.
What can be done to expand the usage of the multistakeholder model for Internet governance?
Collaborative decision making has been at the heart of how the Internet has grown and developed since its earliest days. Multistakeholder approaches are used across the Internet ecosystem and have helped create the opportunities made possible by the Internet today. But as we outlined in our Global Internet Report 2017, more work is needed to expand the use of multistakeholder processes in order to tackle some of the most pressing challenges facing the future of the Internet.
As I wrote last summer, the Internet Society commissioned a feasibility study on expanding the use of the multistakeholder model for Internet governance , including three focus areas:
I would like to thank Larry Strickling and Grace Abuhamad, who have led this work. Their report is based on interviews with a wide range ICT experts from academia, industry, the technical community, civil society and governments. It details a possible framework for such an initiative, as well as the resources required. It also makes clear that any new initiative should support and complement existing initiatives such as the Internet Governance Forum Continue reading
SAN JOSE, California — Quanta Cloud Technology’s (QCT) latest data center technology brings the benefits of disaggregation and composable infrastructure to cloud service providers and telco service providers, said Mike Yang, president of QCT at today’s Q.synergy 2017 event. The Rackgo R portfolio is based on the Intel Rack Scale Design (RSD) software framework, which... Read more →
I had a great time this week recording the first episode of a new series with my co-worker Rich Stroffolino. The Gestalt IT Rundown is hopefully the start of some fun news stories with a hint of snark and humor thrown in.
One of the things I discussed in this episode was my belief that no data is truly secure any more. Thanks to recent attacks like WannaCry and Bad Rabbit and the rise of other state-sponsored hacking and malware attacks, I’m totally behind the idea that soon everyone will know everything about me and there’s nothing that anyone can do about it.
Personal data is important. Some pieces of personal data are sacrificed for the greater good. Anyone who is in IT or works in an area where they deal with spam emails and robocalls has probably paused for a moment before putting contact information down on a form. I have an old Hotmail address I use to catch spam if I’m relative certain that something looks shady. I give out my home phone number freely because I never answer it. These pieces of personal data have been sacrificed in order to provide me Continue reading
Introduction
When Bob Dylan wrote back in the 60’s “times they are a-changin” it’s very possible he knew how true that would be today. Last week, we saw a few things announced in the container technology space during the DockerCon event in Copenhagen – but one thing that I believe came as a surprise to many was Docker’s announcement to begin including Kubernetes in Docker Enterprise edition sometime in early 2018. This doesn’t concede or mark the death of Docker’s own scheduling and orchestration platform, Docker Swarm, but it does underscore what we’ve heard from many of our customers for quite some time now – almost every IT organization that is using/evaluating containers has jumped on the Kubernetes bandwagon. In fact, many of you are probably already familiar with the integration supported today with NSX-T 2.0 and Kubernetes from the post that Yves did earlier in the year…
In the past few years, we’ve heard a lot about this idea of digital transformation and what it means for today’s enterprise. Typically, a part of this transformation is something called infrastructure modernization, and this happens because most IT environments today have some hurdles that need to Continue reading
Introduction When Bob Dylan wrote back in the 60’s “times they are a-changin” it’s very possible he knew how true that would be today. Last week, we saw a few things announced in the container technology space during the DockerCon event in Copenhagen – but one thing that I believe came as a surprise to... Read more →
Fig 1.1- Inter-AS option A |
During Cisco Live Berlin 2017 Peter Jones (chair of several IEEE task forces) and myself went on a journey through 40 years of Ethernet history (and Token Bus and a few other choice technologies).
The sound quality is what you could expect from something recorded on a show floor with pigeons flying around, but I hope you’ll still enjoy our chat.
The recent bug in WPA2 has a worst case outcome that is the same as using a wifi without a password: People can sniff, maybe inject… it’s not great but you connect to open wifi at Starbucks anyway, and you’re fine with that because you visit sites with HTTPS and SSH. Eventually your client will get a fix too, so the whole thing is pretty “meh”.
But there’s a reason I call it “WPA2 bug” and I call the recent issue with Infineon key generation “the Infineon disaster”. It’s much bigger. It seems like the whole of Estonia needs to re-issue ID cards, and several years worth of PC-, smartcard-, Yubikey, and other production have been generating bad keys. And these keys will stick around.
From now until forever when you generate, use, or accept RSA keys you have to check for these weak keys. I assume OpenSSH will if it hasn’t already.
But then what? It’s not like servers can just reject these keys, or it’ll lock people out. And it’s not clear that an adversary even has your public key for SSH. And you can’t crack the key if you don’t have the public half. Maybe a Continue reading
The private-equity firm will purchase Gigamon at a premium of 21 percent.
It needed to tease apart state versus compute.