Cisco goes deeper into photonic, optical technology with $2.6B Acacia buy

Looking to bulk-up its optical systems portfolio, Cisco says it intends to buy Acacia Communications for approximately $2.6 billion.  The deal is Cisco’s largest since it laid out $3.7B for AppDynamics in 2017.Acacia develops, manufactures and sells high-speed coherent optical interconnect products that are designed to transform networks linking data centers, cloud and service providers. Cisco is familiar with Acacia as it has been a “significant” customer of the optical firm for about five years, Cisco said.To read this article in full, please click here

Cisco goes deeper into photonic, optical technology with $2.6B Acacia buy

Looking to bulk-up its optical systems portfolio, Cisco says it intends to buy Acacia Communications for approximately $2.6 billion.  The deal is Cisco’s largest since it laid out $3.7B for AppDynamics in 2017.Acacia develops, manufactures and sells high-speed coherent optical interconnect products that are designed to transform networks linking data centers, cloud and service providers. Cisco is familiar with Acacia as it has been a “significant” customer of the optical firm for about five years, Cisco said.To read this article in full, please click here

Internet Society’s Online Trust Alliance 2018 Cyber Incidents & Breach Trends Report

On Tuesday July 9, 2019 the Internet Society’s Online Trust Alliance (OTA) released its 11th Cyber Incident & Breach Trends report, which provides an overview of cyber incidents – and offers steps organizations can take to prevent and mitigate the potential damage. This year’s report found a shifting landscape of cyber incidents. As the growth of some attack types levels off, others increase.

Adding it all up, OTA estimates that there were more than 2 million cyber incidents in 2018, and it is likely that even this number significantly underestimates the actual problem. OTA estimates an overall financial impact of at least $45 billion worldwide. The lead categories of attacks are cryptojacking (1.3 million) and ransomware (500,000), followed by breaches (60,000), supply chain (at least 60,000 infected websites), and Business Email Compromise (20,000).

There are many organizations that track data breaches overall. For example, Risk Based Security Reported the highest number at 6,515 breaches and 5 billion exposed records, both down from 2017. These estimates vary depending on their methodologies – see our full report for all of the breach estimates and our methodology.

One well-established attack type, ransomware, saw a decline in 2018. However, the total dollar Continue reading

BrandPost: Improving IT Operations – Key to Business Success in Digital Transformation

Forty seven percent of CEOs say they are being “challenged” by their board of directors to show progress in shifting toward a digital business model according to the Gartner 2018 CIO Agenda Industry Insights Report. By improving IT operations, organizations can progress and even accelerate their digital transformation initiatives efficiently and successfully. The biggest barrier to success is that IT currently spends around 78 percent of their budget and 80 percent of their time just maintaining IT operations, leaving little time and resource left for innovation according to ZK Research*.To read this article in full, please click here

Colocation facilities buck the cloud-data-center trend

Data center workloads are moving but not only to the cloud. Increasingly, they are shifting to colocation facilities as an alternative to privately owned data centers.What is colocation? A colocation facility or colo is a data center in which a business can rent space for servers and other computing hardware that they purchase but that the colo provider manages.Read about IPv6 and cloud-access security brokers The colo company provides the building, cooling, power, bandwidth and physical security. Space is leased by the rack, cabinet, cage or room. Many colos started out as managed services and continue  to offer those specialized services.To read this article in full, please click here

Colocation facilities buck the cloud-data-center trend

Data center workloads are moving but not only to the cloud. Increasingly, they are shifting to colocation facilities as an alternative to privately owned data centers.What is colocation? A colocation facility or colo is a data center in which a business can rent space for servers and other computing hardware that they purchase but that the colo provider manages.Read about IPv6 and cloud-access security brokers The colo company provides the building, cooling, power, bandwidth and physical security. Space is leased by the rack, cabinet, cage or room. Many colos started out as managed services and continue  to offer those specialized services.To read this article in full, please click here

Network Break 242: Cloudflare Burned By Firewall Update; Ex-Equifax Exec Goes To Jail

Today's Network Break examines the causes of Cloudflare's outage, analyzes Broadcom's motivation for buying Symantec, discusses why big tech companies are considering manufacturing locations outside of China, and more tech news.

The post Network Break 242: Cloudflare Burned By Firewall Update; Ex-Equifax Exec Goes To Jail appeared first on Packet Pushers.

vlog. Episode 4. Discussion about RPKI OV (protecting routing in Internet)

Hello my friend,

In the era when Internet plays more and more crucial role in the global business, the security and the stability of Internet become to be an enormously important. So we need to protect it!

CY2019 Episode 4 // RPKI OV with Greg Hankins

In this episode, together with Greg Hankins from Nokia we discuss the protection of the BGP routing in Internet with the new framework called RPKI Origin Validation, which is one of the most tending topics these days.

Don’t forget to subscribe for the channel, put likes and repost the video if you like that! ?

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,
Anton Karneliuk

The Week in Internet News: Balloon-based Internet Service Passes a Big Test

The sky’s the limit: An Internet connectivity balloon, operated by Google sister company Loon, has spent 223 days in the air and circled the globe in an effort to demonstrate the feasibility of balloon mesh networks, CNET reports. The P-496 spent 140 days testing flight algorithms off South America.

Bad for business: A recent law that forces Australian communications firms to give the government access to encrypted messages has hurt business there, the government says. The public perception about the downsides of the law has “had a material impact on the Australian market and the ability for Australian companies to compete globally,” Computerworld Australia reports.

Weak security: D-Link, a maker of routers, IP cameras and other Internet-connected devices, would be required to stand up a new comprehensive security program in a proposed cybersecurity settlement with the U.S. Federal Trade Commission, GovInfoSecurity says. In early 2017, the FTC alleged that D-Link “failed to take reasonable software testing and remediation measures to protect their routers and IP cameras against well-known and easily preventable software security flaws.” The company allegedly left default usernames and passwords on devices and stored login credentials insecurely, and it left a private code-signing key on a Continue reading

Software engineering for machine learning: a case study

Software engineering for machine learning: a case study Amershi et al., ICSE’19

Previously on The Morning Paper we’ve looked at the spread of machine learning through Facebook and Google and some of the lessons learned together with processes and tools to address the challenges arising. Today it’s the turn of Microsoft. More specifically, we’ll be looking at the results of an internal study with over 500 participants designed to figure out how product development and software engineering is changing at Microsoft with the rise of AI and ML.

… integration of machine learning components is happening all over the company, not just on teams historically known for it.

A list of application areas includes search, advertising, machine translation, predicting customer purchases, voice recognition, image recognition, identifying customer leads, providing design advice for presentations and word processing documents, creating unique drawing features, healthcare, improving gameplay, sales forecasting, decision optimisation, incident reporting, bug analysis, fraud detection, and security monitoring.

As you might imagine, these are underpinned by a wide variety of different ML models. The teams doing the work are also varied in their make-up, some containing data scientists with many years of experience, and others just starting out. In a Continue reading

Building Jsonnet from Source

I recently decided to start working with jsonnet, a data templating language and associated command-line interface (CLI) tool for manipulating and/or generating various data formats (like JSON, YAML, or other formats; see the Jsonnet web site for more information). However, I found that there are no prebuilt binaries for jsonnet (at least, not that I could find), and so I thought I’d share here the process for building jsonnet from source. It’s not hard or complicated, but hopefully sharing this information will streamline the process for others.

As some readers may already know, my primary OS is Fedora. Thus, the process I share here will be specific to Fedora (and/or CentOS and possibly RHEL).

To keep my Fedora installation clean of any unnecessary packages, I decided to use a CentOS 7 VM—instantiated and managed by Vagrant—for the build process. If you don’t want to use a build VM, you can omit the steps involving Vagrant. You’ll also need to modify the commands used to install the necessary packages (on Fedora, you’d use dnf instead of yum, for example). Different distributions may also use different package names for some of the dependencies, so keep that in mind.

  1. Run Continue reading