Internet Society and UNESCO Offer a Capacity Building Program for Judges

Trust is vital to the future of the Internet. The best way to build it is to let a diverse group of people and interested organizations contribute their experience and knowledge. For this reason, the Internet Society and the UNESCO Regional Office has developed a capacity-building program for judges, prosecutors, public defenders, and other judicial operators in Latin America and the Caribbean.

This program shares our vision for an open, globally-connected, trustworthy, and secure Internet for everyone. We allied with UNESCO to incorporate a plan related to freedom of expression, privacy, encryption, and access to public information. In this way the program responds to the needs of judicial operators facing real cases related to the use of the Internet.

For Raquel Gatto, Senior Policy Advisor of the Internet Society, the program represents an unprecedented opportunity: “The technical foundations of the Internet show us that collaboration is a fundamental factor for the functioning of the network. The Internet is a network of networks that trust each other, allowing interconnection. The Internet can not exist without such collaboration”.

Guilherme Canela, Regional Councilor for Communication and Information of UNESCO, says, “For 5 years, UNESCO, in cooperation with the Special Rapporteur for Freedom of Continue reading

The real challenge to achieving 5G: the networks

Everyone seems focused on whether major device makers can ship 5G-ready phones. And indeed they are coming forward with devices (e.g., Samsung, Huawei) based on chip designs from major manufacturers (e.g., Qualcomm, Huawei, Intel).But while many are focused on the device challenges (such as will Apple’s iPhones use Qualcomm or Intel modems, or design their own?) and the potentially billions of connected “things” expected in the next few years, the devices are just the tip of the iceberg when it comes to 5G. The real “below the water line” challenges, the more than 80% of the challenges in making 5G real, are in updating and creating networks that can truly provide all of the variety of services and capabilities that we expect.To read this article in full, please click here

Heavy Networking 440: A Wireless Deployment Crash Course

Today's Heavy Networking is a crash course in executing a new wireless deployment for engineers who are wired, not wireless, experts. We explore how and why to gather user and technical requirements, understanding the RF environment, channel management, and more. Our guest is Robert Boardman.

The post Heavy Networking 440: A Wireless Deployment Crash Course appeared first on Packet Pushers.

Juniper opens SD-WAN service for the cloud

Juniper has taken the wraps off a cloud-based SD-WAN service it says will ease the management and bolster the security of wired and wireless-connected branch office networks.The Contrail SD-WAN cloud offering expands on the company’s existing on-premise (SRX-based) and virtual (NFX-based) SD-WAN offerings to include greater expansion possibilities – up to 10,000 spoke-attached sites and support for more variants of passive redundant hybrid WAN links – and topologies such as hub and spoke, partial, and dynamic full mesh, Juniper stated. To read this article in full, please click here

Working with variables on Linux

A lot of important values are stored on Linux systems in what we call “variables,” but there are actually several types of variables and some interesting commands that can help you work with them. In a previous post, we looked at environment variables and where they are defined. In this post, we're going to look at variables that are used on the command line and within scripts.User variables While it's quite easy to set up a variable on the command line, there are a few interesting tricks. To set up a variable, all you need to do is something like this:To read this article in full, please click here

BrandPost: AI Ops: Let the data talk

Marie Fiala, Director of Portfolio Marketing for Blue Planet at Ciena The catalysts and ROI of AI-powered network analytics for automated operations were the focus of discussion for service providers at the recent FutureNet conference in London. Blue Planet’s Marie Fiala details the conversation.Do we need perfect data? Or is ‘good enough’ data good enough? Certainly, there is a need to find a pragmatic approach or else one could get stalled in analysis-paralysis. Is closed-loop automation the end goal? Or is human-guided open loop automation desired? If the quality of data defines the quality of the process, then for closed-loop automation of critical business processes, one needs near-perfect data. Is that achievable?To read this article in full, please click here

The Microsoft/BMW IoT Open Manufacturing Platform might not be so open

Last week at Hannover Messe, Microsoft and German carmaker BMW announced a partnership to build a hardware and software technology framework and reference architecture for the industrial internet of things (IoT), and foster a community to spread these smart-factory solutions across the automotive and manufacturing industries.The stated goal of the Open Manufacturing Platform (OMP)? According to the press release, it's “to drive open industrial IoT development and help grow a community to build future Industry 4.0 solutions.” To make that a reality, the companies said that by the end of 2019, they plan to attract four to six partners — including manufacturers and suppliers from both inside and outside the automotive industry — and to have rolled out at least 15 use cases operating in actual production environments.To read this article in full, please click here

Guest Introspection Re-introduction for NSX-T 2.4

(Re-)Introduction to Guest Introspection

The Guest Introspection platform has been included in NSX Data Center for vSphere for several years, mostly as a replacement for the VMware vShield Endpoint product and providing customers the ability to plug in their VMware certified partner solutions to allow agent-less anti-virus and anti-malware protections for a variety of data center workloads.

 

The Benefit of the Guest Introspection Platform

The Guest Introspection platform provides customers several outcomes.

Simplified AV management – Manual installation of agents into the guest operating system requires massive operational overhead just getting the agents deployed out on every virtual workload, managing the agent life-cycle post deployment, and for troubleshooting issues with the in-guest agents in day 2 operations.

Guest Introspection provides a centralized management interface for deploying the agentless components to the vSphere hosts, including the security policies, all while using vSphere objects and grouping of those objects to associate the endpoint policy.  This provides granular policy creation and association in the workload environments.

Improved endpoint performance – When several or all of the virtual workloads kick off a scheduled AV scan, this can produce a massive resource drain from host resources where workloads might suffer performance concerns during Continue reading

Recovering from Network Automation Failures

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

One of my readers sent me this question:

Would you write about methods for reverting from expected new state to old state in the case automation went wrong due to (un)predictable events that left a node or network in a limbo state betwixt and between.

Like always, there’s the easy and the really hard part.

Read more ...

Not Your First DockerCon? Join Docker Pals As A Guide

The Docker Pals program matches groups of attendees who are newer to DockerCon (the “Pals”) with an attendee who has been to one or more DockerCons (the “Guide”). Our goal is to help everyone at DockerCon feel comfortable and see what this amazing community has to offer. Both Pals and Guides find the experience rewarding! The first step in being a Guide is registering for DockerCon so if you haven’t yet, register here now!

Here’s what some of our Guides have said about the program:

“Conferences can be lonely if you don’t know anyone, or are the only person from your company. Docker Pals provides stress free opportunity to connect with people and get to know them.”    

 

“A fantastic experience to meet new people and help them to enjoy DockerCon as much as I do.”

 

It was great meeting the Pals assigned to me. For me it was interesting to learn about the different people and use cases. I also enjoyed walking everyone through the vendor area explaining all the technologies.”

 

“Last DockerCon was my third in a row and the third time I’ve been involved with Docker Pals as a Guide. Continue reading

BrandPost: SD-WAN and Multi-Cloud Digital Transformation, Part 1: Enterprise Reality Check

This is the first in a 3-part blog series that will detail how deploying a business-driven SD-WAN edge platform can help enterprises successfully accelerate multi-cloud digital transformation initiatives.For a growing number of enterprises, a migration to the cloud is not a simple matter of deploying an application or two onto Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure or some other hosted service. It’s now a multi-cloud strategy that’s a key part of a digital transformation initiative aimed at modernizing business processes. Using multiple cloud computing services such as infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) in a single unified cloud strategy offers the ability to reduce dependence on any single vendor.To read this article in full, please click here

The Week in Internet News: Facebook Calls for New Internet Regulations

More regulation, please: Facebook CEO Mark Zuckerberg, in an op-ed in the Washington Post, called on governments to get more involved in Internet regulation, including defining harmful content and making rules on how sites should handle it. Governments should also look at new laws to protect elections, to improve consumer privacy, and to guarantee data portability, Zuckerberg said. His ideas weren’t universally embraced, however. The Electronic Frontier Foundation, in a blog post, said there were “fundamental problems” with governments policing harmful content, particularly in defining what’s harmful.

Hold my beer: Australia’s parliament didn’t take long to look at new regulations, with lawmakers passing legislation that would create three-year jail terms for social media executives and operators of other websites that do not remove violent content in an “expeditious” manner, NPR reports. Web-based services could also be fined up to 10 percent of their annual revenue for not complying with the law.

Even more laws: Singapore is the latest country to consider legislation attacking fake news. A proposed law there would require online news sites to publish corrections or warnings about stories the government decides are fake news and remove articles in extreme cases, the Straits Times reports. The Continue reading