Trump vs. Twitter: U.S. President Donald Trump, one of Twitter’s most prolific users, has signed an executive order directing government agencies to target social media sites after Twitter fact-checked one of his tweets about voting by mail. The executive order argues social media platforms should lose their lawsuit protections for content posted by users, by directing the Federal Communications Commission to begin a rule-making proceeding to determine when those protections should be stripped away, NPR reports.
Internet freedom? Meanwhile, Business Insider notes that Trump said he’d shut down Twitter if he could, even as he tried to emphasize his “commitment to free and open debate on the Internet.” Trump, with more than 80 million followers on Twitter, complained about social media platforms stifling conservative voices.
Robots vs. COVID-19: A shopping center in Thailand is deploying artificial intelligence-powered robots to fight COVID-19, Euronews.com reports. The mall has thermal scanners to check shoppers’ temperatures, and robots carry public health messages and hand sanitizer.
AI on the beach: In Israel, startup Sightbit is using AI and video cameras to help lifeguards on busy beaches, NoCamels reports. The company is running a pilot program at one of Israel’s most popular beaches. Continue reading
If I asked you to summarize the great works of literature in a few paragraphs, how would you do it? Would you read over the whole thing and try to give a play-by-play of the book? Would it be more like Cliff’s Notes, summarizing the major themes but skipping over the details? Maybe you’d offer up the conclusion only and leave it as an exercise to the reader to find out? There are a lot of ways to do it and almost all of them seem insurmountable.
What if there was an easy way to jump right into starting to discuss a topic or summarize something? What if you could find a way to easily get people interested in your ideas? Believe or not, it’s not as hard as you might think. People usually freak out because they feel like there are too many places to start when they want to write something. They decide to try and figure out the perfect way to get going and, more often than not, they paralyze themselves with inaction.
So how do you get things moving? You have to find the hook.
What’s the hook? Most people think it’s Continue reading
Like many people, I have spent a lot more time at home in the last several weeks. I use the free version of Cloudflare Gateway, part of Cloudflare for Teams, to secure the Internet-connected devices on my WiFi network. In the last week, Gateway has processed about 114,000 DNS queries from those devices and blocked nearly 100 as potential security risks.
I can search those requests in the Cloudflare for Teams UI. The logs capture the hostname requested, the time of the request, and Gateway’s decision to allow or block. This works fine for one-off investigations into a block, but does not help if I want to analyze the data more thoroughly. The last thing I want to do is click through hundreds or thousands of pages.
That problem is even more difficult for organizations attempting to keep hundreds or thousands of users and their devices secure. Whether they secure roaming devices with DoH or a static IP address, or keep users safe as they return to offices, deployments at that scale need a better option for auditing tens or hundreds of millions of queries each week.
Starting today, you can configure the automatic export of logs from Cloudflare Gateway Continue reading
Here is another post of the series on basic network troubleshooting and tools under Linux. In this post, I will talk about the cURL command. Others posts of the series This post is part of a series about basic Linux Networking tips and tricks. The others posts of this series are: The ip and nmcli commands The mtr command The ss and netstat commands The curl command What is cURL? cURL is a Linux command-line tool for getting or sending data and files, using an URL syntax. Since cURL…
The post Basic Linux Networking tips and tricks part-4: curl command appeared first on AboutNetworks.net.
Pete Lumbis started his Cumulus Linux 4.0 update with an overview of differences between Cumulus Linux on hardware switches and Cumulus VX, and continued with an in-depth list of ASIC families supported by Cumulus Linux.
You can watch his presentation, as well as the more in-depth overview of Cumulus Linux concepts by Dinesh Dutt, in the recently-updated What Is Cumulus Linux All About video.
“We have seen that COVID-19 is not stopping customers from their cloud migration projects with...
“This is a big step in removing the delineation between private and public networks," analyst...
Today's IPv6 Buzz podcast examines key topics network engineers should know when working with v6, including the complexities of auto-addressing, network security and dual-stack environments, address plans, and more. Our guest is engineer and consultant Andres Taudte.
The post IPv6 Buzz 052: What Do Network Engineers Need To Know About IPv6? appeared first on Packet Pushers.
Cisco got SASE; Nutanix Q3 revenue jumped 11%; and Docker cozied up to Microsoft Azure.
I’ve been getting into the twitter poll thing lately and its producing some interesting polling by asking questions. Yesterday I asked are you eager to go back to the office ? With 129 responses we have statistical significance because the sample is large. What conclusions might we draw from this survey ? Reminder: Twitter […]
The post Who wants to work in an office ? appeared first on EtherealMind.
Using these APIs the vendor claims to be able to more efficiently correlate traces, identify root...
"We are confident that the demand for our products and services will be strong as we emerge from...
Securing workloads across an entire environment is the fundamental goal of a policy. But workloads come in a variety of form factors: virtual machines, containers, and bare metal servers. In order to protect every workload, experts recommend isolating workloads wherever possible — avoiding dependency on the host operating system and its firewall. Relying on the host firewall creates the dependency of a host to defend itself.
Securing virtual workloads is a task best handled by the hypervisor. Offering security via inspection of traffic on the virtual network interfaces of the virtual workload achieves the security you want. It also delivers isolation for security enforcement. Workloads to secure bare metal servers come in many form factors and a variety of means to achieve policy enforcement.
Bare metal servers remain in use for a variety of reasons. Securing these servers remains a necessary task in today’s virtualized data center. Reasons we still use bare metal servers:
If your household is anything like mine, your Internet connection has experienced a significant increase in usage over these last several months. We’re streaming more and more media each day, and we’re on seemingly endless hours of videoconferences for work and for school. While all of that streaming media consumes downstream capacity, those videoconferences can generate a significant amount of upstream traffic. I’m fortunate enough to have fiber-based broadband connectivity that can easily handle this traffic, but I know others aren’t as lucky. They’re stuck with copper-based connections or satellite links that struggle to deliver streaming media or video calls with any sort of viewable quality.
Across this spectrum of “last mile” Internet connections, I looked at the impact from both a provider and user perspective. What kind of traffic growth have last mile network providers experienced? What steps have these providers taken to ensure they have sufficient capacity? And most importantly for end users, how has increased traffic impacted last mile connection speeds?
The network connections from customer- and subscriber-facing Internet service providers are often referred to as last mile networks. These are Internet services delivered over a notional distance – the “last mile” – to subscriber premises, such Continue reading
For any network that provides routing services to customers it is important to segregate them in different virtual topologies that don’t interfere with each other.
This post is not about NFV, but it is important to understand …
It’s amazing how sometimes people fond of sharing their opinions and buzzwords on various social media can’t answer simple questions. Today’s blog post is based on a true story… a “senior network architect” fully engaged in a recent hype cycle couldn’t answer a simple question:
Why exactly would you need VXLAN and EVPN?
We could spend a day (or a week) discussing the nuances of that simple question, but all I have at the moment is a single web page, so here we go…