Cybersecurity, as defined by Merriam-Webster, is “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.”
—
The true importance of cybersecurity can only be understood if our dependence on “computer systems” is understood. It is difficult to imagine a day using nothing that is actively dependent on technology. We depend on connected systems to purchase groceries, perform medical procedures, manage the delivery of utilities and facilitate communications. These systems facilitate safe travel and alert us of impending dangers. It is conceivable that a cyberattack could take the power grid offline making it difficult or impossible to fill a car with fuel, purchase groceries, receive healthcare and even gain access to the typical procedures to restore the grid itself.
In our world today, unless we are primitive camping, we are using products of computer systems continually. To state it differently, our lives would change drastically if these systems became under widespread compromise. Considering Maslow’s hierarchy of needs, most individuals in a civilized society depend on computer systems for most of the elements defined in the critical first two layers. Since we have built this dependence, we must also protect these systems Continue reading
Africa has made considerable gains with regards to the Internet in the last decades. It’s Internet penetration grew by more than 400%; its international bandwidth has been multiplied by 20 just in just 5 years between 2009 and 2014; during the same period Africa’s terrestrial backbone has doubled (Internet Society, Internet Development and Internet Governance in Africa, 2015). This achievement required considerable private and public investment and brought hope for Africans, particularly its youth.
The post Worth Reading: Tolerance appeared first on rule 11 reader.
A couple weeks ago, our co-founder, JR Rivers, sat down with the guys at Packet Pushers, in order to discuss how to build a better network with web-scale networking. We were so excited to be featured, that we decided to use this opportunity to launch a giveaway!
The podcast goes into detail covering the benefits of web-scale networking, but we want to hear your thoughts on it. We’ve put together a quick survey to hear what you think of web-scale principles and how you may have incorporated them into your organization. Simply fill out the survey to enter for a chance to win a free Apple Watch!
The podcast covers:
Sound interesting? Grab your headphones and take a listen! You can hear the podcast now by visiting PacketPushers.com
And don’t forget to enter to win an Apple Watch!
The post Cumulus co-founder featured on Packet Pushers! appeared first on Cumulus Networks Blog.
According to this article, we now have a new Internet being developed: Ethereum (thanks to Chase Mitchell, one of my regular readers, for pointing this new development out). In fact, it’s called “web 3.0,” in a bid to become “The Next New Internet.” Given I tend to be a little concerned about the future of the Internet, I thought I’d look into this new one a bit to discover what it’s all about… Pardon the length of the ensuing investigation.
To begin to understand Ethereum, you have to understand block chainsbecause Ethereum is a type of block chain. To understand block chains, you must begin with the hash. A has is a simple concept that is actually quite difficult to implement in a useful way: a hash takes any a string of numbers of any size and returns a fixed length number, or hash, that (more or less) uniquely represents the original string. The simple to implement part is this—one rather naive hash is it simply add the numbers in a set of numbers until you reach a single digit, calling the result the hash. For instance…
23523 2 + 3 + 5 + 2 + 3 == Continue reading
BT cuts 4,000 jobs; CenturyLink's new CEO plan; Intel's new DCG leader.
It controls others’ IP and optical SDN controllers.
Adds Slack to list of CASB Cloud Service-supported applications.