Edge-chips could render some networks unnecessary

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks unnecessary

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks useless

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks useless

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power and resilience are behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.[ Now read: What is quantum computing (and why enterprises should care) ] But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do on the machine the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Edge-chips could render some networks useless

Hardware processing should replace a device’s dependency on networks, some scientists say. Making machines more efficient, saving power, and resilience is behind the reasoning.“Devices like drones depend on a constant Wi-Fi signal. If the Wi-Fi stops, the drone crashes,” an article about researchers at Binghamton University in Binghamton, New York, says.But if you make a device independent of any linking, it could become more resilient, the researchers say. Plus, the more processing work one can do at the source — in other words on the machine — the more energy you’ll save because you won’t have to come up with power to communicate.To read this article in full, please click here

Jason Donenfeld Honored with the ISRG’s Radiant Award

Earlier this week Jason Donenfeld received the Radiant Award from the Internet Security Research Group. Jason is an accomplished engineer and a creative thinker, which makes his work clean, simple, and takes it a step beyond – most notably in WireGuard, an open-source secure VPN tunnel.

We are proud to have enabled this award. Let me explain why.

At the Internet Society we care a great deal about the technologies that help to establish trust between people around the globe, while those people may have never interacted before.

One of the groups we proudly partner with is the Internet Security Research Group, the non-profit behind the Let’s Encrypt initiative. In the 4 years since Let’s Encrypt was launched, it has changed the landscape of web traffic encryption. Whereas in 2014 around 30% of pages loaded by Firefox where loaded over a secure channel, that number has increased to over 75% by now. I believe that rise in secure web traffic is in large part the result of the work by Let’s Encrypt.

Before 2014 it was somewhat costly to get a web certificate, a critical piece of authentication material that is the basis of establishing global trust. Both Continue reading

PQ 160: Inside ArcOS®: The Internet-Scale, Carrier-Grade Network OS (Sponsored)

On today's Priority Queue we dive into ArcOS®, a new network OS designed for whitebox routing and switching from our sponsor Arrcus. We examine how the OS was designed, how it differentiates itself from competitors, and explore key use cases.

The post PQ 160: Inside ArcOS®: The Internet-Scale, Carrier-Grade Network OS (Sponsored) appeared first on Packet Pushers.

Last Month in Internet Intelligence: November 2018

In November, we saw fewer significant Internet disruptions in the Oracle Internet Intelligence Map as compared to prior months. As usual, there were hundreds of brief issues with limited impact and generally unknown causes, but the most notable issues last month were due to reported DDoS attacks, problems with terrestrial and submarine cables, and general network issues.

DDoS Attacks

On November 4 and 5, several Cambodian ISPs were targeted by DDoS attacks described as the “biggest attacks in Cambodian history.” Published reports indicated that ISPs including EZECOM, SINET, Telcotech, and Digi were targeted by DDoS attacks totaling nearly 150 Gbps, causing subscriber downtime lasting as much as half a day. Disruption from the attacks was visible in the Country Statistics view for Cambodia in the Internet Intelligence Map, as shown in the figure below. However, because Internet connectivity remained generally available (albeit impaired) across the country, the impact appears nominal in the graphs.

However, when viewed at a network level, the impact of the attacks appears to be more significant. SINET, one of the ISPs targeted by the DDoS attacks, posted a Tweet on November 5 letting users know that they were under attack, and followed up Continue reading

Is an SD-WAN managed service right for you?

For enterprises considering an SD-WAN solution, one of the key choices will be who will implement and manage it.For some enterprises this is a relatively straightforward decision; for others the choice may require more deliberation. In either case, best-practice sourcing dictates that this decision be made up front – to achieve exceptional results, the sourcing strategy, approach and execution following must be tailored to the desired self-managed or fully-managed solution. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ] If you have a strong and sufficiently sized internal networking team with associated software/routing and other engineering competencies, taking on the implementation of SD-WAN is more than feasible. There may still need to be development of new skill-sets to take advantage of the technology and fully understand the flavor of SD-WAN chosen.To read this article in full, please click here

Is an SD-WAN managed service right for you?

For enterprises considering an SD-WAN solution, one of the key choices will be who will implement and manage it.For some enterprises this is a relatively straightforward decision; for others the choice may require more deliberation. In either case, best-practice sourcing dictates that this decision be made up front – to achieve exceptional results, the sourcing strategy, approach and execution following must be tailored to the desired self-managed or fully-managed solution. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ] If you have a strong and sufficiently sized internal networking team with associated software/routing and other engineering competencies, taking on the implementation of SD-WAN is more than feasible. There may still need to be development of new skill-sets to take advantage of the technology and fully understand the flavor of SD-WAN chosen.To read this article in full, please click here

A New Voice Joins the Chorus: Welcome to the Colombia Chapter!

A new Internet Society Chapter has been founded within the Regional Bureau in Latin America & Caribbean. The creation of the Colombia Chapter is today officially announced at Universidad del Rosario, in Bogotá.

Our desire is to extend a gracious and inclusive welcome to all the 67 founding members that have been active members of the Internet Society for several years, and to the ones that have recently joined the community to be part of the Chapter.

The Chapter invites you to join the live broadcasting starting at 8:00 AM (UTC-5) with eminent guests speakers such as Juanita Rodriguez Kattah, Former Vice Minister of Digital Economy, Hugo Sin Triana, Director of Innovation in Info Projects, Valérie Gauthier, Director of the Department of Applied Mathematics and Computer Science (MACC) at the University of Rosario, Nancy Quiros, the Internet Society’s Chapter Development Manager for Latin America and Caribbean Region, and Javier Pinzon, Member of the Colombian Internet Governance Forum.

The large attendance (approximately 120 participants) at the launching event, speaks to the need for a Chapter to join the Colombian community’s efforts to ensure an open, globally connected, trustworthy and secure Internet for everyone.

The Chapter will encourage the Continue reading

Video: What Problem Are We Solving with SDDC?

Remember the Software-Defined Data Centers hype? While I covered SDDC concepts and technologies for years in my webinars and workshops, I never created an introductory webinar on the topic.

That omission has been fixed in late August – SDDC 101 webinar is available as part of free subscription, and as always I started with the seemingly simple question: What problem are we trying to solve?

Intelligent Network, Intelligent Operator

Maybe I’m old school, but I’m just not into black box networking.  Especially if critical services are dependent on my network infrastructure.  I wore those shoes for 19 years, so this feeling has burned into my psyche through many real world experiences.  I don’t think I’m alone in this thinking.  

When bad things happen to network users, all eyes are on the physical network team, even when it’s not a physical network problem.  The physical network is guilty until it can be proven otherwise.  So it’s only fair that physical network operators are skeptical of technology whose inner workings are unknowable.  Waiting on your network vendor’s technical support team isn’t an option when the CIO is breathing down your neck.  Especially if a mitigation exists that can be acted on immediately.  

That said, there is indeed a limit to the human ability.  It is increasingly lossy as the number of data points grow.  Moreover, the levels of ability are inconsistent across individuals.  Box level operations leaves it up to the operator to conceptualize the physical network state as a whole in his/her head and this generally results in Continue reading