6th Middle East School on Internet Governance: Making the Internet Community Stronger in the Middle East

The 6th Middle East School on Internet Governance (MEAC-SIG) took place this year in Rabat, Morocco, from 8-12 July. First held in 2014 in Kuwait, the school is an annual five days of intensive workshops that aims to inform and strengthen the regional Internet community and ensure active participation in national, local, and global Internet Governance fora. This year, it was hosted by The National Telecommunications Regulatory Agency (ANRT) of Morocco, and jointly organized by the Arab World Internet Institute, the Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Governance Project at Georgia Tech, the Internet Society, and RIPE NCC.

The MEAC-SIG faculty includes experts from academia, civil society, business, the technical community, and government stakeholder groups.

This year’s speakers included Milton Mueller of IGP, Internet Governance expert Hanane Boujemi, Miriam Khuene of RIPE NCC, Fahd Batayneh of ICANN, and many other notables. They covered topics such as the IETF’s standardization, GNSO processes, Regional Registries, IGFs in all their capacities, and the inception and a historical view of Internet Governance.

The discussions were carried out in an open environment where everyone contributed their ideas together with multiple stakeholder groups. These groups mentioned how they started their journey in Continue reading

The Week in Internet News: Google, Mozilla Block Surveillance in Kazakhstan

Root-level spying: Google and Mozilla are blocking surveillance efforts by Kazakhstan’s government, Engadget reports. The two organizations are blocking a root certificate that the Kazakhstan government rolled out, allowing it to monitor the encrypted Internet activity of any users who installed it. The government forced ISPs to require all customers to install the certificate in order to gain Internet access.

Broadband for all: An opinion piece in the New York Daily News calls for citywide municipal broadband service after one city report estimated that 29 percent of city residents have no broadband service. “By virtually all measures, New York City’s system for providing broadband internet service is an abysmal failure,” the piece says.

A new war: The industrial Internet of Things is a new battleground for hackers, Silicon Angle says. Nation states are increasingly targeting these systems, with potentially deadly consequences. “The stage is set for the world to find out what might happen if petrochemical, gas and power plant safety systems designed to prevent catastrophic accidents are disabled by malicious hackers,” the story says.

Regulation isn’t the cure: Meanwhile, regulation alone won’t solve the IoT security problems, says IoT for All. While several governments are considering IoT security regulations, Continue reading

Network Break 249: VMware’s Buying Spree; Big Switch Doubles Down On Cloud Networking

Today's Network Break explores why VMware spent billions on Carbon Black, looks at new cloud networking products from Big Switch Networks, discusses why Google stopped sharing Android data with mobile carriers, and gawks at VMware's jaw-dropping tax break.

The post Network Break 249: VMware’s Buying Spree; Big Switch Doubles Down On Cloud Networking appeared first on Packet Pushers.

IDG Contributor Network: Software-defined perimeter – the essence of trust

Actions speak louder than words. Reliable actions build lasting trust in contrast to unreliable words. Imagine that you had a house with a guarded wall. You would feel safe in the house, correct? Now, what if that wall is dismantled? You might start to feel your security is under threat. Anyone could have easy access to your house.In the same way, with traditional security products: it is as if anyone is allowed to leave their house, knock at your door and pick your locks. Wouldn’t it be more secure if only certain individuals whom you fully trust can even see your house? This is the essence of zero-trust networking and is a core concept discussed in my recent course on SDP (software-defined perimeter).To read this article in full, please click here

VMware Goes All In On Kubernetes With Tanzu

VMware kicked off VMworld with more proof that it’s all in on containers in the form of Tanzu,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Liveblog: VMworld 2019 Day 1 General Session

This is the liveblog from the day 1 general session at VMworld 2019. This year the event is back at Moscone Center in San Francisco, and VMware has already released some juicy news (see here, here, and here) in advance of the keynote this morning, foreshadowing what Pat is expected to talk about.

The keynote kicks off with the usual inspirational video, this one incorporating themes and references from a number of high-tech movies, including “The Matrix” and “Inception,” among others. As the video concludes, Pat Gelsinger takes the stage promptly at 9am.

Gelsingers speaks briefly of his 7 years at VMware (this is his 8th VMworld), then jumps into the content of his presentation with the theme of this morning’s session: “Tech in the Age of Any”. Along those lines, Gelsinger talks about the diversity of the VMworld audience, welcomes the attendees in Klingon, and speaks very quickly to the Pivotal and Carbon Black acquisitions that were announced only a few days ago.

Shifting gears, Gelsinger talks about “digital life” and how that translates into millions of applications and billions of devices and billions of users. He talks about how 5G, Edge, and AI are going Continue reading

Snuba: automating weak supervision to label training data

Snuba: automating weak supervision to label training data Varma & Ré, VLDB 2019

This week we’re moving on from ICML to start looking at some of the papers from VLDB 2019. VLDB is a huge conference, and once again I have a problem because my shortlist of “that looks really interesting, I’d love to read it” papers runs to 54 long at the moment! As a special bonus for me, I’m actually going to be at VLDB this year, where no doubt I’ll learn about even more interesting things! By the time you get to read this, it should be the first (workshop) day of the conference…

The conference may have changed, but to bridge from ICML to VLDB I’m going to start with a paper on very much the same theme as we’ve been dipping into over the past couple of weeks: how to combine and learn from multiple noisy sources of data and labels. Snuba is from the same Stanford line as Snorkel which we looked at last year. It’s tackling the same fundamental problem: how to gather enough labeled data to train a model, and how to effectively use it in a weak supervision setting (supervised learning Continue reading

Recently Published: Azure Networking Demo Videos

Remember my rant about the glacial speed of Azure orchestration system? I decided I won’t allow it to derail yet another event and recorded the demos in advance of the first live session. The final videos are just over an hour long; it probably took me at least three hours to record them.

If you plan to attend the live webinar session on September 12th, you might want to watch at least the first few videos before the live session - I will not waste everyone’s time repeating the demos during the live session.

Top 5 IoT networking security mistakes

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things.That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.To read this article in full, please click here

Top 5 IoT networking security mistakes

Even though Brother International is a supplier of many  IT products, from machine tools to head-mounted displays to industrial sewing machines, it’s best known for printers. And in today’s world, those printers are no longer stand-alone devices, but components of the internet of things.That’s why I was interested in this list from Robert Burnett, Brother’s director, B2B product & solution – basically, the company’s point man for large customer implementations. Not surprisingly, Burnett focuses on IoT security mistakes related to printers and also shares Brother’s recommendations for dealing with the top five.To read this article in full, please click here

IBM Drives Quantum-Safe Cryptography Into Its Public Cloud

IBM predicts that due to the rate of progress in quantum computing data protected by current...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Heavy Networking 467: The Journey To SDN

On today's Heavy Networking we look at one organization's journey to SDN, including pitfalls, triumphs, and lessons learned. Guest Sal Rannazzisi, principal network architect at a global pharmaceuticals company, shares details on dealing with vendors, finding and training engineers, developing internal processes, and more.

The post Heavy Networking 467: The Journey To SDN appeared first on Packet Pushers.

Netflix Discovers Severe Kubernetes HTTP/2 Vulnerabilities

Taking a look at how the internet’s HTTP/2 protocol works, Netflix engineers discovered CVE-2019-9512 Ping Flood. This enables an attacker to send continual ping requests to an HTTP/2 peer, causing the peer to create an internal queue of responses. When this happens a server’s CPU and memory can be consumed, which can lead to a denial of service. already issued patches that are found in the following builds: Continue reading

OCP-Certified Storage Revenue Set to Double

Open Compute Project (OCP) certified storage equipment is set to take a bigger bite of the market,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

G7 Leaders: Protect Strong Encryption for a Secure World

Encryption protects us every day. It helps secure web browsing, online banking, and critical public services like electricity, elections, hospitals, transportation, and more.

If the G7 countries are truly committed to building a safer and equal world, then it is crucial to recognize the important role that end-to-end encryption plays in securing the Internet, their economies and their citizens.

The Internet Society and more than 30 organizations have signed an open letter calling on the G7 leaders to do just that – prioritize digital security – and not to require, coerce, or persuade device manufacturers, application, and service providers to:

  • modify their products or services or delay patching a bug or security vulnerability to provide exceptional access to encrypted content;
  • turn off “encryption-on-by-default”;
  • cease offering end-to-end encrypted services; or
  • otherwise undermine the security of encrypted services.

Digital security is the foundation of our connected economies and societies. And digital security is underpinned by strong encryption! It ensures that data – whether that of law enforcement, banks, or everyday citizens – can only be accessed by its intended recipient. Any attempt to insert “exceptional” or “lawful” access to encrypted content provides a way for others, including criminals, to gain access. This weakens Continue reading

Weekly Wrap: Microsoft, Intel, Red Hat Back Confidential Computing

SDxCentral Weekly Wrap for Aug. 26, 2019: Microsoft, Intel, and Red Hat back a confidential...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tibit Raises $25M in Series B Funding

The company is using the funds to support its MicroPlug optical line terminal (OLT), which is a...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.