Palo Alto Networks will offer $1.75 billion aggregate principal amount of convertible senior notes...
The security vulnerabilities could have allowed attackers to gain remote access and execute...
VMware’s Gelsinger rode a tech, software, cloud high; NetApp nabbed Spot; and the coronavirus...
In December 2018, the Indian Ministry of Electronics & Information Technology (MeitY) proposed a significant change to its intermediary rules. The draft Information Technology [Intermediaries Guidelines (Amendment) Rules] 2018 seeks to tie tech platforms’ (e.g., social media) protections from liability to an obligation to monitor and filter their users’ content. One of the proposed obligations is to ensure the traceability of messages, even if a service is end-to-end encrypted.
India is just one of many countries around the world experimenting with the idea that Internet intermediaries – specifically social media companies, like Facebook and Twitter – should no longer have immunity from liability for the content shared by their users. Other examples include the U.S. Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2020 (the EARN IT Act), and the recent U.S. Executive Order on Preventing Online Censorship.
The motivation for changing the status quo varies, from wanting traceability of messages to counter the spread of disinformation or CSEM, to stopping objectionable content from being spread on social media, to preventing political messages from being labeled (e.g., as “misleading information”). Similarly, the approaches being considered to achieve this vary, ranging from Continue reading
A few weeks ago I sat down with Keith Townsend from the CTO Advisor and we discussed the future of physical and virtual events.
The post Evolution of Virtual Conferences With Keith Townsend appeared first on EtherealMind.
The SD-WAN market was on track for another year of record revenue growth right up until the...
Huawei, Nokia, and Cisco all saw their respective market share drop, while Ericsson was flat and...
On Day Two Cloud we talk about how to start and participate in a cloud user group. We explore logistics, money, sponsors, a venue--in other words, the nuts and bolts of running and engaging with a cloud community. Our guest is Chris Williams, an AWS Community Hero and participant in a variety of user groups.
The post Day Two Cloud 051: Building And Running A Cloud User Group appeared first on Packet Pushers.
CloudFlare launched yet another service: transfer speed- and latency measurements done from a web browser. While it’s pretty obvious how you could measure transfer speed (start an asynchronous transfer, register for the JavaScript onreadystatechange event to notice out when it has completed, and compute the transfer rate), measuring latency seems like a bit of black magic. After all, you can’t do a ping from a web browser, can you?
By Tom Gillis, SVP and GM, Networking and Security Business Unit, VMware
EDITORIAL UPDATE: On June 18, 2020 VMware officially closed its acquisition of Lastline. The blog post below has been amended to reflect that announcement.
VMware announced its intent to acquire Lastline, a pioneer in anti-malware research and AI-powered network detection and response, and on June 18, 2020 the acquisition closed. This is an important step forward for VMware’s vision of Intrinsic Security, as it allows us to further take advantage of the intrinsic attributes of our virtualization platform to yield innovative security capabilities. Our aim is not to replicate that which exists today, but rather to build security solutions that we can uniquely deliver, spanning from the heart of the data center to users in a branch office and all the way to mobile users at home or on the road.
In the security industry, the nature of threats changes so rapidly that security technology is constantly being re-invented. In this context, it is not the algorithms per se that matter; it is the people that make the algorithms. Great people build great products, and great products build great companies. And that’s why we are so Continue reading
For digital CiscoLive 2020 I will be creating a number of follow up addendum videos to CLUS 2019’s BRKRST-2414 session “Network Sleuthing with Stealthwatch: The Science of Investigation” . These videos will be uploaded to the www.ciscolive.com on demand library... Read More ›
The post Lab Fun with Fish: My Little Lab Setup Gets a Major Overhaul appeared first on Networking with FISH.
“COVID-19 makes digital transformation more important — not less,” Gelsinger said. “This is...
SDxCentral condemned the murder of George Floyd; Rakuten tapped NEC for 5G core; and MEF boasted...