Vodafone UK Activates 5G Multi-Operator RAN
5G network sharing deals have gained momentum as carriers look to decrease the cost of deploying...
5G network sharing deals have gained momentum as carriers look to decrease the cost of deploying...
Unomaly's technology will allow users to proactively take action before network disruptions impact...
The group will share its work on 5G and MEC including working toward international MEC standards to...
Samsung has earned 5G RAN contracts in the U.S. with Verizon, AT&T, and Sprint, but is behind...
Over the weekend two groups released proof-of-concept (PoC) exploit codes for this vulnerability on...
On today's Tech Bytes podcast, sponsored by Silver Peak, we talk with Cushman & Wakefield about how the global real estate company is using SD-WAN to enable its cloud-first goals. Our guest is Chris Butcher, Platform Architect, Global Networks, Cloud and Perimeter Security at Cushman & Wakefield.
The post Tech Bytes: Cushman & Wakefield Taps Silver Peak SD-WAN For Cloud-First Goals (Sponsored) appeared first on Packet Pushers.
Everyone’s invited: Politicians in Mexico and New York City announced plans for universal Internet access in recent days. Mexican President Andres Manuel Lopez Obrador announced a plan to bring access to the large swaths of the country that don’t have it, including a government investment of more than $500,000, according to AA News. Meanwhile, New York City Major Bill de Blasio is pushing an “Internet master plan” to improve access. About 18 percent of the city’s residents have neither mobile nor home Internet connections, and about 40 percent have one or the other, but not both, the New York Daily News reports.
New pressure campaign: The U.S. FBI is asking Apple for help to access encrypted communications on an iPhone that belonged to the Saudi military student who killed three people last month at a naval base in Pensacola, Fla., the Washington Post reports. It’s unclear what information the FBI is looking for, given that the shooter is dead, but the request is a new step in the long-running fight between the U.S. government and large tech vendors over the use of encryption on smartphones and other devices.
Cyber retaliation: Many cybersecurity experts expect Iran to retaliate with cyberattacks Continue reading
The choice of processors available for high performance computing has been on growing for a number of years. …
HPC In 2020: Compute Engine Diversity Gets Real was written by Michael Feldman at The Next Platform.
Best of breed and vertical integration are two opposing forces that have been part of the datacenter since mainframes first fired up six decades ago in a room with a glass windows in it so companies could show off their technical prowess and financial might. …
Vertical Integration Is Eating The Datacenter, Part One was written by Paul Teich at The Next Platform.
What is Human Permafrost in IT Infrastructure ?
The post Dictionary: Human Permafrost appeared first on EtherealMind.
Here’s an interesting tidbit from “Last Week in AWS” blog:
From a philosophical point of view, AWS fundamentally considers an API to be a promise. Services that aren’t promoted anymore are still available […] Think about that for a second - a service launched 13 years ago is still actively supported to the point where you can use it today.
Compare that to Killed By Google graveyard, and you might understand why I’m a bit reluctant to cover GCP in my webinars.
Read more ...Challenges of real-world reinforcement learning, Dulac-Arnold et al., ICML’19
Last week we looked at some of the challenges inherent in automation and in building systems where humans and software agents collaborate. When we start talking about agents, policies, and modelling the environment, my thoughts naturally turn to reinforcement learning (RL). Today’s paper choice sets out some of the current (additional) challenges we face getting reinforcement learning to work well in many real-world systems.
We consider control systems grounded in the physical world, optimization of software systems, and systems that interact with users such as recommender systems and smart phones. … RL methods have been shown to be effective on a large set of simulated environments, but uptake in real-world problems has been much slower.
Why is this? The authors posit that there’s a meaningful gap between the tightly-controlled and amenable to simulation research settings where many RL systems do well, and the messy realities and constraints of real-world systems. For example, there may be no good simulator available, exploration may be curtailed by strong safety constraints, and feedback cycles for learning may be slow.
This lack of available simulators means learning must be done using Continue reading
Yesterday, Citrix sent an updated notification to customers warning of a vulnerability in their Application Delivery Controller (ADC) product. If exploited, malicious attackers can bypass the login page of the administrator portal, without authentication, to perform arbitrary code execution.
No patch is available yet. Citrix expects to have a fix for certain versions on January 20 and others at the end of the month.
In the interim, Citrix has asked customers to attempt to mitigate the vulnerability. The recommended steps involve running a number of commands from an administrator command line interface.
The vulnerability relied on by attackers requires that they first be able to reach a login portal hosted by the ADC. Cloudflare can help teams secure that page and the resources protected by the ADC. Teams can place the login page, as well as the administration interface, behind Cloudflare Access’ identity proxy to prevent unauthenticated users from making requests to the portal.
Citrix ADC, also known as Citrix NetScaler, is an application delivery controller that provides Layer 3 through Layer 7 security for applications and APIs. Once deployed, administrators manage the installation of the ADC through a portal available at a dedicated URL on Continue reading
Stumbled upon a 35-year-old article describing the ironies of automation (HT: The Morning Paper). Here’s a teaser…
Unfortunately automatic control can ‘camouflage’ system failure by controlling against the variable changes, so that trends do not become apparent until they are beyond control.
In simpler words: when things fail, they fail really badly because the intermittent failures were kept hidden. Keep that in mind the next time someone tells you how wonderful software-defined AI-assisted networking is going to be.