BiB 070: Cisco Calls for US Privacy Laws
What would be Cisco's motivation to call for social justice publicly. Logically there must be reasons.
The post BiB 070: Cisco Calls for US Privacy Laws appeared first on Packet Pushers.
What would be Cisco's motivation to call for social justice publicly. Logically there must be reasons.
The post BiB 070: Cisco Calls for US Privacy Laws appeared first on Packet Pushers.
I am performing some site maintenance in conjunction with a move to a new VPS server. (Thank you Hetzner (some irony may be involved)).
Hopefully everything should be reachable, but some minor UI tweaks may occur.
Thanks for understanding.
/Kim
Last week Howard Marks completed the Hyperconverged Infrastructure Deep Dive trilogy covering smaller HCI players (including Cisco’s Hyperflex) and explaining the intricacies of costing and licensing HCI solutions.
On Thursday I finally managed to start the long-overdue Data Center Interconnects update. The original webinar was recorded in 2011, and while the layer-3 technologies haven’t changed much (with LISP still being mostly a solution in search of a problem), most of the layer-2 technologies I described at that time vanished, with OTV being a notable exception. Keep that in mind the next time your favorite $vendor starts promoting another wonderful technology.
You can get access to both webinars with standard ipSpace.net subscription.
ExFaKT: a framework for explaining facts over knowledge graphs and text Gad-Elrab et al., WSDM’19
Last week we took a look at Graph Neural Networks for learning with structured representations. Another kind of graph of interest for learning and inference is the knowledge graph.
Knowledge Graphs (KGs) are large collections of factual triples of the form
(SPO) about people, companies, places etc.
Today’s paper choice focuses on the topical area of fact-checking : how do we know whether a candidate fact, which might for example be harvested from a news article or social media post, is likely to be true? For the first generation of knowledge graphs, fact checking was performed manually by human reviewers, but this clearly doesn’t scale to the volume of information published daily. Automated fact checking methods typically produce a numerical score (probability the fact is true), but these scores are hard to understand and justify without a corresponding explanation.
To better support KG curators in deciding the correctness of candidate facts, we propose a novel framework for finding semantically related evidence in Web sources and the underlying KG, and for computing human—comprehensible explanations for facts. We refer to our framework as ExFaKT (Ex Continue reading
In this post we’re going to talk about how to run the amazing stunnel program on your Android device, and do so properly!
Later, this would allow us to setup a lot of cool things like:
For this, we’re not going to use the old and very limited SSLDroid. It’s a bad idea, I don’t know why different sites still keep pushing it. It almost certainly has unpatched vulnerabilities. Please don’t use it.
Instead, we are going to use the official stunnel program, with the help of a proper wrapper.
stunnel already supports Android devices and even the compiled version of it is available in it’s download page.
Since we’ll be using the compiled binary, you may need to compile stunnel yourself for your specific Android architecture before continuing1. Chances are though, that your device is running on ARM and you are ready Continue reading
6 steps to configure eBGP. Configure a router-id Configure an autonomous system number Configure a BGP group and define the peer type Add neighbors to the peer group Define a routing policy to export routes Assign the routing policy to the BGP group Configuration ...continue reading
In our last post we covered the basic setup and configuration of ExaBGP. While we were able to make use of ExaBGP for dynamic route advertisement, it wasn’t able to help us when it came to actually programming the servers routing table. In this post, I want to show you how you can leverage ExaBGP from a more programatic perspective. We’ll start by handling route advertisement to our peer and then tackle reading and processing received route updates. We’ll also start using another Python module (pyroute2) to program the routing table of the bgp_server host so that it begins acting more like a normal router. Enough talk – let’s dive in!
Im going to assume you’re starting off at the end of the last post. So the first thing we need to do is clean up a couple of items. We’re not going to rely on the static route we provisioned so to clean that up we can simply reapply the netplan network configuration using the command sudo netplan apply…
user@bgp_peer:~$ ip route default via 192.168.127.100 dev ens3 proto static 10.10.10.0/30 dev ens7 proto kernel scope link src 10.10.10.1 10. Continue reading
History and economics – as if you could separate the two – are burgeoning with examples of products being developed for one task and then being used, perhaps after some tweaking, for an entirely new and usually unexpected task. …
Will The Harmonic Convergence Of HPC And AI Last? was written by Timothy Prickett Morgan at .
7 steps to configure VRRP. Enable VRRPv3 Define a VRRP group number Configure a virtual IP address Configure a virtual link-local address (IPv6 only) Configure a priority Configure preempt (optional) Configure router advertisement properties (IPv6 only) ...continue reading
SDxCentral Weekly Wrap for Feb. 8, 2019: Verizon found significantly lower latency when using MEC...
Company CTO Neville Ray explained that the carrier was using just 10 megahertz of its 600 MHz and...
Vendors including Cisco, Juniper, and Arista all recently introduced merchant silicon chips into...