Networking giant introduces technologies to automate and secure the enterprise LAN.
Cisco claims it can detect malware threats in encrypted traffic.
CENX recently snagged an NFV assurance deal with Verizon and joined ETSI's OSM project.
Today the OTA released the 9th annual Online Trust Audit and Honor Roll. This year’s Audit is our most comprehensive ever, assessing more than 1000 consumer-facing sites for their adoption of best practices in consumer/brand protection, site security and responsible privacy practices. Each year the audit raises the bar, using criteria that reflect the latest regulatory environment, attack vectors and commonly accepted practices providing users with notice and control regarding their data. The goal is to provide practical advice to organizations to help them move beyond compliance to stewardship, thus protecting their customers and their brand while improving trust in the Internet itself.
The post Worth Reading: Open IPv6 Resolvers appeared first on rule 11 reader.
This Internet-Draft resonates strongly with me: Jon Postel’s famous statement in RFC 1122 of “Be liberal in what you accept, and conservative in what you send” – is a principle that has long guided the design of Internet protocols and implementations of those protocols. The posture this statement advocates might promote interoperability in the short […]
The post IETF: The Harmful Consequences of Postel’s Maxim appeared first on EtherealMind.
Updates target growing demand on metro networks.
New revenue streams from services like video are behind the 5G push.
Juniper purposely borrowed the term ‘slicing’ from 5G.