Alphabet’s Chronicle Exec Talks IoT Security
The security company that spun out of Alphabet’s secretive X research lab in January still hasn’t set a release date for its analytics platform.
The security company that spun out of Alphabet’s secretive X research lab in January still hasn’t set a release date for its analytics platform.
In this Network Collective Short Take, Russ White takes a look at the impact of abstraction, complexity, and scale as they relate to the size and scope of attack surfaces presented to attackers.
The post Short Take – Give The Monkey A Smaller Club appeared first on Network Collective.
Globally, significant progress has been made in recent years with respect to Internet access, however, much more needs to be done. Presently, 54% of the global community is not connected to the Internet. In the Caribbean region, big disparities can be noted. As measured by Internet penetration rates, while countries such as Barbados (80%), Trinidad & Tobago (70%) are well connected, this is not the case in others such as Haiti (12%) and Guyana (40%).
The challenge in less-connected countries is mainly in their large rural communities. This is where the Internet Society’s ongoing work related to Community Networks (CNs) hopes to have some impact.
Smart strategies, utilizing the skills, knowledge, and authority of all stakeholders such as government, policy makers, the business community, operators, academia, and civil society entities need to be explored. While governments can play a key role, especially with respect to policies that foster network deployment in rural and underserved areas, telecoms operators are also very important. These operators have well-developed transport networks that can be used as backhaul for community networks developers, to get Internet access to rural communities. Conversations with members of the Internet ecosystem often do not include the operators that are Continue reading
You may have seen a tweet from me last week referencing a news story that Fortinet was now in the SD-WAN market:
It came as a shock to me because Fortinet wasn’t even on my radar as an SD-WAN vendor. I knew they were doing brisk business in the firewall and security space, but SD-WAN? What does it really mean?
Fortinet’s claim to be a player in the SD-WAN space brings the number of vendors doing SD-WAN to well over 50. That’s a lot of players. But how did the come out of left field to land a deal rumored to be over a million dollars for a space that they weren’t even really playing in six months ago?
Fortinet makes edge firewalls. They make decent edge firewalls. When I used to work for a VAR we used them quite a bit. We even used their smaller units as remote appliances to allow us to connect to remote networks and do managed maintenance services. At no time during that whole engagement Continue reading
The problems are behind us. Here is some self-abuse with a postmortem. As usual, RSS feeds fail to migrate cleanly.
The internet of things offers many potential benefits for a business, but companies need to consider deployment and management issues before taking the plunge.
Bounding data races in space and time Dolan et al., PLDI’18
Yesterday we looked at the case for memory models supporting local data-race-freedom (local DRF). In today’s post we’ll push deeper into the paper and look at a memory model which does just that.
Consider a memory store which maps locations to values. For non-atomic locations it’s not enough just to store a single memory value at the location. Instead non-atomic locations are mapped to histories H, where a history is a finite map from timestamps to values, and timestamps are totally ordered.
Every thread has a frontier, F, which is a map from non-atomic locations to timestamps.
Intuitively, each thread’s frontier records, for each nonatomic location, the latest write known to the thread. More recent writes may have occurred, but are not guaranteed to be visible.
For atomic locations, the memory store records a pair (F,x), with a single data value x rather than a history. F is a frontier, which will be merged with the frontiers of threads that operate on the location. This is expressed in the rules READ-AT and WRITE-AT in the operational semantics below. The READ-AT rule, for example, should be Continue reading
Extreme had predicted the Brocade assets would generate over $230 million in annual revenue and that the Avaya assets would generate a minimum of $200 million in revenue in fiscal 2018.
Fortinet bragged today that it was the only vendor with security capabilities to receive an SD-WAN recommended rating in the first NSS Labs software-defined wide area networking test report.
The platform will be integrated into VMware's Telco NFV portfolio. This will add automated service assurance capabilities to support virtual network function deployments.
On the sidelines at Black Hat, a Microsoft exec said the Tech Accord is an example of how the company works with other technology vendors to advance security.
EIGRP in the Service Provider Networks. If you are wondering whether EIGRP (Enhanced Interior Gateway Routing Protocol) is used in the Service Provider networks, then continue to read this post. EIGRP is very uncommon in the Service Provider networks. As I teach network design training to thousands of students and through my …
Continue reading "EIGRP in the Service Provider Networks"
The post EIGRP in the Service Provider Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.