Archive

Category Archives for "Networking"

Amazon Braket lets customers try out quantum computing

AWS has announced the availability of a new service that lets customers tap into and experiment with quantum computing simulators and access quantum hardware from D-Wave, IonQ, and Rigetti.The managed service, Amazon Braket, offers customers a development environment where they can explore and build quantum algorithms, test them on quantum circuit simulators, and run them on different quantum hardware technologies, AWS said in a statement about the service. The Braket service includes Jupyter notebooks that come pre-installed with the Amazon Braket SDK and example tutorials.To read this article in full, please click here

Tech Bytes: Protecting Remote Workers With NetMotion’s Software-Defined Perimeter (Sponsored)

Today’s Tech Bytes podcast examines the challenge of securing remote workers with sponsor is NetMotion. We explore the difficulties of getting visibility into what remote workers are up to, and striking a balance between security of the organization and employee privacy. Our guest is Joel Windels, Chief Marketing Officer at NetMotion.

The post Tech Bytes: Protecting Remote Workers With NetMotion’s Software-Defined Perimeter (Sponsored) appeared first on Packet Pushers.

The Week in Internet News: Smart Phones for Online Education

More phones, more access: Chinese smartphone major Xiaomi has announced that its Indian subsidiary will distribute 2,500 phone handsets to support online education of students who are most affected by the COVID-19 pandemic, India Times reports. Teach for India says one smart phone can support the education of up to seven children, if they use the device in shifts.

Tracking the pandemic: The U.K. has launched a limited trial of a COVID-19 tracking app, the BBC reports. The app, which will be available on the Apple and Google online stores, will include an alert system that informs users of the coronavirus risk level close to their home. It also has a QR barcode scanner, allowing users to check in when they visit a venue and be told if others there later tested positive.

Weird pandemic effects: Parent company Facebook is blaming COVID-19 for a lapse in its ability to moderate nudity and other content on Instagram, The Independent writes. Facebook sent content reviewers home in March due to COVID-19, and those employees didn’t have adequate work-from-home systems. Facebook relies “heavily” on human intervention to remove offending content, the company said.

Faking it: One guy decided he’s had too many Continue reading

Election Cybersecurity: Preparing for the 2020 U.S. Elections.

Election Cybersecurity: Preparing for the 2020 U.S. Elections.

At Cloudflare, our mission is to help build a better Internet. As we look to the upcoming 2020 U.S. elections, we are reminded that having the Internet be trusted, secure, reliable, and accessible for campaigns and citizens alike is critical to our democracy. We rely on the Internet to share and discover pertinent information such as how to register to vote, find polling locations, or learn more about candidates.

Due to the spread of COVID-19, we are seeing a number of election environments shift online, to varying degrees, with political parties conducting virtual fundraisers, campaigns moving town halls to online platforms and election officials using online forms to facilitate voting by mail. As the 2020 U.S. elections approach, we want to ensure that players in the election space have the tools they need to stay online to promote trust and confidence in the democratic system.

We’re keeping an eye on how this shift to online activities affect cyberattacks. From April to June 2020, for example, we saw a trend of increasing DDoS attacks, with double the amount of L3/4 attacks observed over our network compared to the first three months of 2020. In the election space, we are Continue reading

How to make sure data that should be backed up gets backed up

There is no sadder moment in the backup world than finding out the file or database you need to restore has never been backed up. Understanding how systems, directories, and databases are included in the backup system is the key to making sure this never happens to you.The first step toward this goal is making sure that servers and services you want backed up are registered with your backup-and-recovery system.[Get regularly scheduled insights by signing up for Network World newsletters.] For example, if you start using a new SaaS such as Salesforce, no backup system will automatically notice that addition and start backing it up for you. If you are fully virtualized on VMware, the systems will automatically notice if you add a new node to the configuration. But if you start using Hyper-V or KVM, no backup system will automatically notice there is a new hypervisor in the data center and start backing it up. And of course your backup system will not notice you installed a new physical server.To read this article in full, please click here

How the network can support zero trust

Simply stated, zero trust calls for verifying every user and device that tries to access the network and enforcing strict access-control and identity management that limits authorized users to accessing only those resources they need to do their jobs.Zero trust is an architecture, so there are many potential solutions available, but this is a look at those that fit in the realm of networking.[Get regularly scheduled insights by signing up for Network World newsletters.] Least privilege One broad principle of zero trust is least privilege, which is granting individuals access to just enough resources to carry out their jobs and nothing more. One way to accomplish this is network segmentation, which breaks the network into unconnected sections based on authentication, trust, user role, and topology. If implemented effectively, it can isolate a host on a segment and minimize its lateral or east–west communications, thereby limiting the "blast radius" of collateral damage if a host is compromised. Because hosts and applications can reach only the limited resources they are authorized to access, segmentation prevents attackers from gaining a foothold into the rest of the network.To read this article in full, please click here

How the network can support zero trust

Simply stated, zero trust calls for verifying every user and device that tries to access the network and enforcing strict access-control and identity management that limits authorized users to accessing only those resources they need to do their jobs.Zero trust is an architecture, so there are many potential solutions available, but this is a look at those that fit in the realm of networking.[Get regularly scheduled insights by signing up for Network World newsletters.] Least privilege One broad principle of zero trust is least privilege, which is granting individuals access to just enough resources to carry out their jobs and nothing more. One way to accomplish this is network segmentation, which breaks the network into unconnected sections based on authentication, trust, user role, and topology. If implemented effectively, it can isolate a host on a segment and minimize its lateral or east–west communications, thereby limiting the "blast radius" of collateral damage if a host is compromised. Because hosts and applications can reach only the limited resources they are authorized to access, segmentation prevents attackers from gaining a foothold into the rest of the network.To read this article in full, please click here

How to make sure data that should be backed up gets backed up

There is no sadder moment in the backup world than finding out the file or database you need to restore has never been backed up. Understanding how systems, directories, and databases are included in the backup system is the key to making sure this never happens to you.The first step toward this goal is making sure that servers and services you want backed up are registered with your backup-and-recovery system.[Get regularly scheduled insights by signing up for Network World newsletters.] For example, if you start using a new SaaS such as Salesforce, no backup system will automatically notice that addition and start backing it up for you. If you are fully virtualized on VMware, the systems will automatically notice if you add a new node to the configuration. But if you start using Hyper-V or KVM, no backup system will automatically notice there is a new hypervisor in the data center and start backing it up. And of course your backup system will not notice you installed a new physical server.To read this article in full, please click here

What is the World’s Fastest Internet Speed?

If you want to know what is the world’s fastest internet speed, then you have landed in the right place! We are well-informed that technology has evolved along with the evolution of the world. Therefore, in this era of technology, thinking of a life without the internet may seem unimaginable for all of us!

But, the mere presence of the internet is not enough. An internet with speed as fast as light is a necessity. The satisfaction of using high-speed internet that can take you through a series of downloads is unquestionable. 

So, if your internet speed is slow, you might want to shift to one of the following countries. Keep an eye out to find out what is the world’s fastest internet speed!

1. Taiwan:

The first country on our list is Taiwan. It breaks all the records with the speed of 85.02 MB/S. Even though it has the fastest internet speed across the globe, many of its rural areas do not get this facility!

2. Singapore:

Next on our list is none other than Singapore! With the speed of 70.86 MB/S, it is the second-fastest internet provider. Out of the 4.5 million people who Continue reading

Background on Stuxnet

The story of Stuxnet, the first cyber weapon in history. Focus is on the manipulation of machinery at Natanz, with detailed explanations of machine configuration and operation. A few takeaways for myself after watching: The Stuxnet software impacted the Iranian nuclear program by damaging the project budget. Instead of blowing up the centrifuges, they increased […]

The post Background on Stuxnet appeared first on EtherealMind.

Heavy Networking 535: The ‘What’s On Your Mind?’ Roundtable

Today's Heavy Networking is a roundtable show where a group of engineers tell us what's on their minds. Topics include why EVPN/VXLAN is useful even for small data centers, how to get automation going despite internal constraints, the pros and cons of unique network designs, and tales of how working from home has affected projects, teams, and priorities.

The post Heavy Networking 535: The ‘What’s On Your Mind?’ Roundtable appeared first on Packet Pushers.

Is Bandwidth A Precious Resource?

During a recent episode of the Packet Pushers Podcast, Greg and Drew talked about the fact that bandwidth just keeps increasing and we live in a world where the solution to most problems is to just increase the pipeline to the data center or to the Internet. I came into networking after the heady days of ISDN lines everywhere and trying to do traffic shaping on slow frame relay links. But I also believe that we’re going to quickly find ourselves in a pickle when it comes to bandwidth.

Too Depressing

My grandparents were alive during the Great Depression. They remember what it was like to have to struggle to find food or make ends meet. That one singular experience transformed the way they lived their lives. If you have a relative or know of someone that lived through that time, you probably have noticed they have some interesting habits. They may keep lots of cash on hand stored in various places around the house. They may do things like peel labels from jelly jars and use them as cups. They may even go to great lengths to preserve as much as they can for reuse later “just in Continue reading

Why I joined Cloudflare

Why I joined Cloudflare
Why I joined Cloudflare

Customer Service. Business. Growth. While these three make up a large portion of what keeps most enterprise companies operating, they are just the beginning at Cloudflare.

I am excited to share that I have joined Cloudflare as its Chief Customer Officer. Cloudflare has seen explosive growth: we launched only a decade ago and have already amassed nearly 3 million customers and grown from a few 100 enterprise customers to 1000s. Currently, we are at a growth inflection point where more companies are choosing to partner with us and are leveraging our service. We are fortunate to serve these customers with a consistent, high quality experience, no matter where their end-users are located around the world.

But the flare doesn’t stop at performative success

I took this opportunity because Cloudflare serves the world and does what is right over what is easy. Our customers deliver meals to your doors, provide investment and financial advice, produce GPS devices for navigational assistance, and so much more. Our customers span every vertical and industry, as well as every size. By partnering with them, we have a hand in delighting customers everywhere and helping make the Internet better. I am excited to work with them Continue reading