Archive

Category Archives for "Networking"

Cisco Catches Dozens of IOS Security Bugs

The security vulnerabilities could have allowed attackers to gain remote access and execute...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: VMware’s Gelsinger High on Tech, Software, Cloud

VMware’s Gelsinger rode a tech, software, cloud high; NetApp nabbed Spot; and the coronavirus...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Making Intermediaries Liable for Encrypted Content Breaks Trust and Security

In December 2018, the Indian Ministry of Electronics & Information Technology (MeitY) proposed a significant change to its intermediary rules. The draft Information Technology  [Intermediaries Guidelines (Amendment) Rules] 2018 seeks to tie tech platforms’ (e.g., social media) protections from liability to an obligation to monitor and filter their users’ content. One of the proposed obligations is to ensure the traceability of messages, even if a service is end-to-end encrypted.

India is just one of many countries around the world experimenting with the idea that Internet intermediaries – specifically social media companies, like Facebook and Twitter – should no longer have immunity from liability for the content shared by their users. Other examples include the U.S. Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2020 (the EARN IT Act), and the recent U.S. Executive Order on Preventing Online Censorship.

The motivation for changing the status quo varies, from wanting traceability of messages to counter the spread of disinformation or CSEM, to stopping objectionable content from being spread on social media, to preventing political messages from being labeled (e.g., as “misleading information”). Similarly, the approaches being considered to achieve this vary, ranging from Continue reading

Coronavirus Cleaves SD-WAN Revenue Growth

The SD-WAN market was on track for another year of record revenue growth right up until the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Telecom Gear Sales Dropped During Q1, Dell’Oro Says

Huawei, Nokia, and Cisco all saw their respective market share drop, while Ericsson was flat and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Day Two Cloud 051: Building And Running A Cloud User Group

On Day Two Cloud we talk about how to start and participate in a cloud user group. We explore logistics, money, sponsors, a venue--in other words, the nuts and bolts of running and engaging with a cloud community. Our guest is Chris Williams, an AWS Community Hero and participant in a variety of user groups.

The post Day Two Cloud 051: Building And Running A Cloud User Group appeared first on Packet Pushers.

Interesting: Measuring End-to-End Latency in Web Browser

CloudFlare launched yet another service: transfer speed- and latency measurements done from a web browser. While it’s pretty obvious how you could measure transfer speed (start an asynchronous transfer, register for the JavaScript onreadystatechange event to notice out when it has completed, and compute the transfer rate), measuring latency seems like a bit of black magic. After all, you can’t do a ping from a web browser, can you?

VMware Announces Intent to Acquire Lastline

By Tom Gillis, SVP and GM, Networking and Security Business Unit, VMware

EDITORIAL UPDATE: On June 18, 2020 VMware officially closed its acquisition of Lastline. The blog post below has been amended to reflect that announcement.

VMware announced its intent to acquire Lastline, a pioneer in anti-malware research and AI-powered network detection and response, and on June 18, 2020 the acquisition closed. This is an important step forward for VMware’s vision of Intrinsic Security, as it allows us to further take advantage of the intrinsic attributes of our virtualization platform to yield innovative security capabilities. Our aim is not to replicate that which exists today, but rather to build security solutions that we can uniquely deliver, spanning from the heart of the data center to users in a branch office and all the way to mobile users at home or on the road.

In the security industry, the nature of threats changes so rapidly that security technology is constantly being re-invented. In this context, it is not the algorithms per se that matter; it is the people that make the algorithms. Great people build great products, and great products build great companies. And that’s why we are so Continue reading

Lab Fun with Fish: My Little Lab Setup Gets a Major Overhaul

For digital CiscoLive 2020 I will be creating a number of follow up addendum videos to CLUS 2019’s BRKRST-2414 session “Network Sleuthing with Stealthwatch: The Science of Investigation” . These videos will be uploaded to the www.ciscolive.com on demand library... Read More ›

The post Lab Fun with Fish: My Little Lab Setup Gets a Major Overhaul appeared first on Networking with FISH.

VMware’s Gelsinger: Tech Is Better Than GDP, Software and Cloud Even Stronger

“COVID-19 makes digital transformation more important — not less,” Gelsinger said. “This is...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: SDxCentral Condemns the Murder of George Floyd

SDxCentral condemned the murder of George Floyd; Rakuten tapped NEC for 5G core; and MEF boasted...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Airbus shapes quantum computing’s future role in cybersecurity, aerospace

Airbus expects quantum computing to have major production, performance and efficiency benefits as the technology plays a role in its cybersecurity, aerospace and communications businesses.“We are users of quantum computing and intend to use it to deliver more powerful services and systems,” said Paolo Bianco, global research & technology cooperation manager for Airbus to an online audience at the Inside Quantum Technology virtual event this week.To read this article in full, please click here

Airbus tells quantum-computing developers what it needs from the the technology

Airbus expects quantum computing to have major production, performance and efficiency benefits as the technology plays a role in its cybersecurity, aerospace and communications businesses.“We are users of quantum computing and intend to use it to deliver more powerful services and systems,” said Paolo Bianco, global research & technology cooperation manager for Airbus to an online audience at the Inside Quantum Technology virtual event this week.To read this article in full, please click here

Airbus tells quantum-computing developers what it needs from the technology

Airbus expects quantum computing to have major production, performance and efficiency benefits as the technology plays a role in its cybersecurity, aerospace and communications businesses.“We are users of quantum computing and intend to use it to deliver more powerful services and systems,” said Paolo Bianco, global research & technology cooperation manager for Airbus to an online audience at the Inside Quantum Technology virtual event this week.To read this article in full, please click here

Google Cloud Gains U.K. Gov’t Foothold

The cloud giant signed a deal to provide services to different U.K. government agencies at...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Enabling IPv6 in AWS Deployments

IPv6 is old enough to buy its own beer (in US, not just in Europe), but there are still tons of naysayers explaining how hard it is to deploy. That’s probably true if you’re forced to work with decades-old boxes, or if you handcrafted your environment with a gazillion clicks in a fancy GUI, but if you used Terraform to deploy your application in AWS, it’s as hard as adding a few extra lines in your configuration files.

Nadeem Lughmani did a great job documenting the exact changes needed to get IPv6 working in AWS VPC, including adjusting the IPv6 routing tables, and security groups. Enjoy ;)

Deploying IPv6 is just one of many hands-on exercises you have to solve in our Networking in Public Cloud Deployments online course.

Rakuten Mobile Taps NEC for Homegrown 5G Core

Rakuten Mobile isn’t going far, less than 10 miles in fact, for the procurement of its 5G core.

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.