MEF President Nan Chen said the organization has transformed from a pure-play standards group to a software and specification development organization.
Both carriers posted increased revenues and earnings for their most recent quarters, and their pending merger received approval from T-Mobile's shareholders.
The end of October means it’s time to start carving pumpkins and picking the perfect Halloween costume. This is also a good time to scare yourself silly with horror stories from your data center.
Happy Halloween! In some parts of the world, people are celebrating this holiday of horror by dressing up as monsters or other frights and watching scary movies. But sometimes these tales can be just a little boring. Pod people? Headless horsemen? Replicant children? Whatever.
I present the real horror stories of Halloween – and every other day of the year. These tales are inspired by real-life events and are guaranteed to give you a chill. (And not just because your smart thermostat is being controlled by a shapeshifting clown who lives in the sewer!)
I(o)T
In the fall of 2018, a group of kids work together to destroy an evil malware, which infects connected toys and preys on the children of their small town.
Inspired by the terrifying vulnerabilities found in everyday connected toys.
Night of the Living Devices
There’s panic across the Internet as connected devices suddenly begin attacking critical Internet infrastructure. The film follows a group of network operators as they frantically work to protect the Internet from these packet spewing, infected devices.
Inspired by the harrowing events of the 2016 Dyn attack.
Rosemary’s Baby Monitor
A young family moves into a house billed as the “smart Continue reading
With the 5G Core Emulator added to its product mix, Viavi can provide complete, end-to-end 5G base station testing and validation.
NVM-Express has been creating a quiet revolution in servers for several years now, providing a way for flash storage to bypass the traditional storage stack and the limitations of interfaces such as SATA and SAS, and instead pipe data directly into and out of the CPU through the high-speed PCI Express bus. …
Broadening The Appeal Of Distributed NVM-Express Storage was written by Daniel Robinson at .
I am giving my network troubleshooting class over at Safari Books Online on the 6th of December for those who are interested. I consider this a foundational session, covering the time components of an outage, a taxonomy of reactions to outages, the half-split method of searching for the root cause, and how models can help you understand the right questions to ask to narrow a problem down quickly. A lot of this course is based on formal methods of troubleshooting I learned in electronic engineering, adapted for the networking world.
This is one of three webinars I give at Safari Books on a periodic basis; I hope to be adding a fourth in the near future.
Computing power and big data are fundamental to the bioinformatic research being carried out by the Leadership Computing Facility at the Oak Ridge National Laboratory’s (ORNL) in Tennessee. …
How NVIDIA’s Tensor Core GPUs Power Pioneering Biometric Discoveries was written by Nicole Hemsoth at .
Bonjour and mDNS are discovery mechanisms that generally work effortlessly within a single VLAN. Those attempting to implement these protocols in a multi subnet environment often run into some significant challenges. The typical use of CAPWAP in an enterprise wireless network adds to the segmentation between wired and wireless domains and requires special attention with devices like Applet TVs and Bonjour based printers. In this article, I will address the use case of allowing a wired Apple TV to be seen and used by a wireless client. We will also do some basic filtering to contain those advertisements to a single building.
Operating with a baseline configuration, users on the BigU SSID are complaining that they cannot access the Apple TV in BLDG – 3. The first task is to make that device available to those users. While the underlying infrastructure is irrelevant to this configuration method, it is MPLS and cannot be changed in our process. All APs are running in LOCAL mode. This mode creates a compulsory CAPWAP tunnel for the data plane through the controller. In the above diagram, VLAN 110 is trunked out of the controller on to the network in Continue reading
It’s no surprise that buying behaviors have seen significant change over the past several years. Global online e-commerce sales are expected to double between 2016 and 2020. According to the U.S. Bureau of Economic Analysis (BEA), personal income increased $54.8 billion (0.3%) in July of 2018, while disposable personal income (DPI) increased $52.5 billion (0.3%) and personal consumption expenditures (PCE) increased $49.3 billion (0.4%). July’s increase in personal income was a result of salary increases, rental income, and personal dividend income. The $29.6 billion increase in PCE in July led to an increase of $10.9 billion in spending for goods and a $18.9 billion increase in spending for services.
Online shoppers are experiencing a new wave of e-commerce, one that’s highly personalized to that individual’s shopping interests and behaviors. Brands are putting more dollars behind personalization, where they capture customer data points and present those customers with relevant content and products to encourage an online sale. By capturing search queries, shopping cart, geographic location, purchase history, social behavior, and customer segments, brands are able to alter their site’s content to best serve each individual customer. More than ever, e-commerce companies Continue reading
Advancing your IT career means getting outside your comfort zone. The Datanauts and guest Ken Nalbone talk about overcoming tech inertia, taking technology and career risks, and why it's essential to go out into the real world and interact with people, even when you're an introvert.
The post Datanauts 150: Living Outside Your Technology Comfort Zone appeared first on Packet Pushers.
In this Community Roundtable episode of Network Collective, Roland Dobbins and Nick Buraglio join us to talk about the current state of DDoS on the Internet and some strategies you can use to mitigate these risks on your network.
We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 38 – DDoS Mitigation appeared first on Network Collective.
Asylbek Sanarbekov, a social worker in the village of Suusamyr, Kyrgyzstan, can often be seen standing outside of his office building, phone in hand. He goes there to connect to the new Suusamyr Community Network, which has antennas on a nearby water tower. The Suusamyr Community Network officially launches today at the Community Network Xchange (CNX) in New Delhi. It’s a big improvement over Sanarbekov‘s connection at home, where he uses expensive and sometimes unreliable mobile data.
The village of Suusamyr is located in the Suusamyr Valley, a remote region in the Tian Shan Mountains. It’s a popular tourist destination thanks to its breathtaking landscape and its sparse population, with just over 3,000 residents. During the warmer months, they’re employed in agriculture, but by winter, thanks to heavy snowfall and subfreezing temperatures, many are unemployed.
“We are a small, landlocked mountainous country, so the traditional economic models do not necessarily work for us,” says Talant Sultanov, chair of the Internet Society‘s Kyrgyz Chapter. “We decided that digital development is the way forward.”
There’s a mobile connection in the village of Suusamyr, but according to Mairambek Ismailov, deputy head of the local self-government body, it’s not necessarily fast, reliable, or Continue reading