Almost every network operator agrees on the edge’s importance, but how each gets there and the...
The combination will lower costs and improve communications performance across NEC's communications...
Umm, yeah I know that Cisco Live was like two months ago (ok three now) and I am finally getting …
The post Cisco Live 2019 – Recap appeared first on Fryguy's Blog.
Umm, yeah I know that Cisco Live was like two months ago (ok three now) and I am finally getting …
The post Cisco Live 2019 – Recap appeared first on Fryguy's Blog.
I’m excited to announce that Joseph Lorenzo Hall will join us as our Senior Vice President for a Strong Internet. He will start in October and be based in our Reston, VA, office.
Many of you may know Joe from his work at the Center for Democracy and Technology, where he has been Chief Technologist for about six years. He has a unique ability to put together policy and technical issues, particularly but not only with respect to security. He’s the Vice-Chair of the Board of the California Voter Foundation and a Board member of the Verified Voting Foundation. He went to school at UC Berkeley and received his PhD in Information Systems from there in 2008. A former astrophysicist, he has been working on a monograph about sand clocks, which you may know by the term “hourglass”. I am not kidding even a little when I say you should ask about it, because you will be fascinated. He brings additional strength to our already great group of people who work to make the Internet stronger.
The post Announcing Joseph Hall as SVP for a Strong Internet appeared first on Internet Society.
The March 2019 Packet Pushers Virtual Design Clinic had to deal with an interesting question:
Our server team is nervous about full-scale DR testing. So they have asked us to stretch L2 between sites. Is this a good idea?
The design clinic participants were a bit more diplomatic (watch the video) than my TL&DR answer which would be: **** NO!
Let’s step back and try to understand what’s really going on:
Read more ...SD-WAN is the most disruptive network technology of 2019, but it has yet to supplant MPLS for most...
A tier-one operator deployed Trellis, an open source SDN-based platform, said AT&T’s Andre...
Oracle released earnings a day earlier than expected and announced that Co-CEO Mark Hurd is taking...
Kubernetes becomes the de facto management plane for Apache Spark jobs running on YARN and...
If you ask an ordinary person about information security, they’ll probably talk to you about endpoints. Most people are aware of virus scanners for notebooks or PCs, and may have encountered some kind of mobile device management on a work-provided phone. These endpoint solutions naturally come to mind if someone mentions cyber security. However, this is backward from the way that infosec professionals think about the issue.
Someone who works in infosec will tell you that the endpoint should be the absolute last line of defense. If a virus scanner finds malware on your work notebook, the malware should have had to defeat a long list of other security precautions in order to get that far. This layered approach to security is known as defense in depth.
The term “defense in depth” originally was applied to military strategy. It described the practice of trying to slow an enemy down, disperse their attack, and cause casualties; rather than trying to stop their attack at a single, heavily fortified point. The enemy might breach the first layer of defenses, but would find additional layers beyond. While they struggled to advance, they could be surrounded and then counter-attacked.
The information Continue reading
The carrier's network virtualization journey reached a landmark this week with 75% of data running...