Archive

Category Archives for "Networking"

IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out for many machine learning applications in networking, it has the potential to be one of those rare technologies that comes along every few decades and fundamentally transforms how networks run.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out for many machine learning applications in networking, it has the potential to be one of those rare technologies that comes along every few decades and fundamentally transforms how networks run.To read this article in full or to leave a comment, please click here

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles.The attack is not in the wild, since Check Point developed the proof of concept attack vector; however, with news of the attack vector and an estimated 200 million video players and streaming apps running vulnerable software, attackers might jump on the malicious subtitle wagon to gain remote access to victims’ systems.To read this article in full or to leave a comment, please click here

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles.The attack is not in the wild, since Check Point developed the proof of concept attack vector; however, with news of the attack vector and an estimated 200 million video players and streaming apps running vulnerable software, attackers might jump on the malicious subtitle wagon to gain remote access to victims’ systems.To read this article in full or to leave a comment, please click here

Internet Society Deeply Concerned About Internet Blocking in Venezuela

The Internet Society is deeply concerned with the increase of Internet blocking and recent reports of growing content surveillance on the Internet in Venezuela. 

On May 13th, Venezuela issued the Presidential Decree no. 2849, which has declared an State of Exception and Emergency, enforced immediately for the period of 60 days, extending a pre existing State of Exception and Emergency in the country. 

According to the Official Gazette publication, the purpose of this decree is to adopt urgent, severe, exceptional and needed measures to ensure people's rights, to preserve the internal order and access to goods, services, food, medicine and other essentials for life.  

Sebastian Bellagamba

IDG Contributor Network: PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

IDG Contributor Network: PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

IDG Contributor Network: PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

Episode 4 – The Impact Of Increasing Encrypted Traffic

In episode 4 the panel discusses the ever increasing pervasiveness of encrypted traffic on our networks and how that encrypted traffic impacts the services that we run today.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Katherine McNamara
Guest
Brandon Carroll
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 4 – The Impact Of Increasing Encrypted Traffic appeared first on Network Collective.

Episode 4 – The Impact Of Increasing Encrypted Traffic

In episode 4 the panel discusses the ever increasing pervasiveness of encrypted traffic on our networks and how that encrypted traffic impacts the services that we run today.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Katherine McNamara
Guest
Brandon Carroll
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 4 – The Impact Of Increasing Encrypted Traffic appeared first on Network Collective.

Escuela Nacional de Lambaré

Lambaré es una ciudad paraguaya ubicada en el Departamento Central, hoy es una de las ciudades metropolitanas más pobladas e importantes del Área Metropolitana de Asunción.

El Colegio Nacional de Lambaré (CNL), es la más importante institución educativa de la ciudad, contando con 1300 alumnos de nivel socio económico bajo y Medio-bajo comprendidos entre los 12 y 18 años de edad, desarrolla una tarea estratégica en la superación de las barreras sociales para las clases carenciadas.
El año 2015 algunas aulas del CNL se derrumbaron y varias más fueron demolidas por problemas estructurales en su construcción, entre ellas las destinadas al laboratorio de informática, uno punto de contacto de los jóvenes con la internet real libre y abierta. 

Ilda Simao

The AI fight is escalating: This is the IT giants’ next move

Artificial intelligence is where the competition is in IT, with Microsoft and Google both parading powerful, always-available AI tools for the enterprise at their respective developer conferences, Build and I/O, in May. It's not just about work: AI software can now play chess, go, and some retro video games better than any human -- and even drive a car better than many of us. These superhuman performances, albeit in narrow fields, are all possible thanks to the application of decades of AI research -- research that is increasingly, as at Build and I/O, making it out of the lab and into the real world.Meanwhile, the AI-powered voice technologies behind virtual assistants like Apple's Siri, Microsoft's Cortana, Amazon.com's Alexa and Samsung Electronics' Bixby may offer less-than-superhuman performance, but they also require vastly less power than a supercomputer to run. Businesses can dabble on the edges of these, for example developing Alexa "skills" that allow Amazon Echo owners to interact with a company without having to dial its call center, or jump right in, using the various cloud-based speech recognition and text-to-speech "-as-a-service" offerings to develop full-fledged automated call centers of their own.To read this article in full Continue reading

Use Your Networking Knowledge to Design Automation Solution

I’m getting plenty of emails from not-so-very-young networking engineers trying to make career transitions. I got this one from a CCIE in his mid-40s:

Would you think the SDN and Data Center paths would be suitable for a long standing engineer?

Absolutely. It's just networking, although it's sometimes disguised a bit.

This article was initially sent to my Network Automation mailing list.

Read more ...

BrandPost: How Close Are We To The Self-Driving WAN?

In my last few blogs I’ve talked about the journey from the Software Defined WAN to the Self-Driving WAN. Applying artificial intelligence and machine learning to the WAN might seem futuristic, but it’s already happening with our Unity EdgeConnect SD-WAN solution. A great example is our revolutionary First-packet iQ application classification technology which we announced at the end of March.Traditional Application ClassificationTo read this article in full or to leave a comment, please click here