Interconnection Bandwidth Skyrockets With 5G as an ‘Amplifier,’ Equinix Says
SDN and NFV are contributing to the growth of interconnection because these technologies make it easier for customers to consume more bandwidth.
SDN and NFV are contributing to the growth of interconnection because these technologies make it easier for customers to consume more bandwidth.
The performance monitoring company offers a single SaaS-based monitoring platform that monitors and manages application delivery, experience, and usage.
Monolithic compact DCI boxes are like a race car. But why buy a high-performance race car when all you really need is a flexible, rock-solid daily driver?
The job cuts will impact employees of the former Motorola Solutions infrastructure business that Nokia purchased in 2011.
Join the Docker team, the container ecosystem, contributors and maintainers, developers, IT professionals and executives at DockerCon Barcelona December 3-5. DockerCon is the must attend conference to learn, network and innovate with the container industry.
Besides Barcelona being a beautiful city with delicious food, here are our top 5 reasons to attend DockerCon:
This eBrief from SDxCentral delves into the latest developments in container security and looks at the techniques companies are using to ensure their container environments are secure and not vulnerable to breaches.
Last week was an exceptionally exciting week for the African Regional Bureau as we successfully held, in partnership with the Association for Progressive Community (APC), the 3rd Summit on Community Networks in Africa from 2-7 September 2018, at Wild Lubanzi Trail Lodge, Eastern Cape, South Africa.
The objective of the Summit was to promote the creation and growth of community networks, increase collaboration between community network operators in Africa and to provide an opportunity for them to engage with other stakeholders.
The event was attended by more than 100 participants from at least 18 countries worldwide, 13 from Africa (Kenya, Uganda, South Africa, DRC, Zimbabwe, Zambia, Malawi, Namibia, Cameroon, Tanzania, Sudan, Egypt, and Ethiopia) and 5 from Spain, Germany, Argentina, India, and the U.S. The formal opening of the Summit was addressed by representatives from the Ministry of Telecommunications and Postal Services of South Africa.
This year’s Summit turned out to be very special as 12 established community networks in Africa and 18 other communities (particularly from rural South Africa interested to replicate initiatives) attended and contributed to the discussions held throughout the 6 days.
The week started with 2 days of training, which provided community network operators with clear Continue reading
Continuing on with the theme of previous cheat sheet articles, this article will help decode the format for Amazon Web Services’ Elastic Compute Cloud (EC2) instance types.
An EC2 instance type provides the definition for the size and certain capabilities of the instance:
Some of this information can be gleaned from the instance type name. For the information that can’t, refer to the links below in the references section.
Here is an example of an instance type name: c5d.2xlarge
c | 5 | d | . | 2xlarge |
family | generation | [optional] presence of local storage (aka instance storage) | “t-shirt size”; defines amount of RAM and number of vCPUs |
Cloudflare first started talking about DNSSEC in 2014 and at the time, Nick Sullivan wrote: “DNSSEC is a valuable tool for improving the trust and integrity of DNS, the backbone of the modern Internet.”
Over the past four years, it has become an even more critical part of securing the internet. While HTTPS has gone a long way in preventing user sessions from being hijacked and maliciously (or innocuously) redirected, not all internet traffic is HTTPS. A safer Internet should secure every possible layer between a user and the origin they are intending to visit.
As a quick refresher, DNSSEC allows a user, application, or recursive resolver to trust that the answer to their DNS query is what the domain owner intends it to be. Put another way: DNSSEC proves authenticity and integrity (though not confidentiality) of a response from the authoritative nameserver. Doing so makes it much harder for a bad actor to inject malicious DNS records into the resolution path through BGP Leaks and cache poisoning. Trust in DNS matters even more when a domain is publishing record types that are used to declare trust for other systems. As a specific example, DNSSEC is helpful for preventing Continue reading