Intel continues to optimize its products around AI

Normally, this is the time of year when Intel would hold its Intel Developer Forum conference, which would be replete with new product announcements. But with the demise of the show last year, the company instead held an all-day event that it live-streamed over the web.The company’s Data Centric Innovation Summit was the backdrop for a series of processor and memory announcements aimed at the data center and artificial intelligence, in particular. Even though Intel is without a leader, it still has considerable momentum. Navin Shenoy, executive vice president and general manager of the Data Center Group, did the heavy lifting.News about Cascade Lake, the rebranded Xeon server chip First is news around the Xeon Scalable processor, the rebranded Xeon server chip. The next-generation chip, codenamed “Cascade Lake,” will feature a memory controller for Intel’s new Intel Optane DC persistent memory and an embedded AI accelerator that the company claims will speed up deep learning inference workloads by eleven-fold compared with current-generation Intel Xeon Scalable processors.To read this article in full, please click here

Improving Gender Rights Online: Perspectives from the Global South

The Internet has helped to empower communities of across the globe. However, existing gender disparities, discrimination, and inequalities, especially faced by women living in the Global South, including the least developed countries, has had a  considerable impact on the digital gender divide, leading to the digital exclusion of women.

A study “Views & Perspectives on Gender Rights Online, for the Global South”, was undertaken by Amrita Choudhury, CCAOI & Asia Pacific lead for the Internet’s Society SIG Women and Nadira AL Araj, ISOC Palestine and MENA Civil Society activist, to identify the main challenges towards improving the gender access and rights online, especially in the Global South; highlight the best practices which nations or regions have adopted to overcome those challenges; and suggest policy areas which need reforms.

In addition to relying on secondary sources, the opinions of 19 experts from 15 countries and responses of 162 people from 54 countries were sought. The findings were further discussed and validated through a workshop at the Internet Governance Forum (IGF) 2017 “Redefining Rights for a Gender Inclusive Connected Future (WS 102) and then compiled into a report.

The top challenges identified across the Global South hampering the creation Continue reading

IDG Contributor Network: Evolution of IT departments to support IoT and digital transformation

You can’t spell IoT without IT, but that doesn’t mean IT departments are big fans of Internet of Things deployments. In fact, we’ve observed that IoT tends to exacerbate some of the challenges that IT departments face within their organizations.Understanding and anticipating IT’s primary areas of concern can help IoT deployments succeed.Lines are blurring Traditionally, the IT department has operated in a vacuum. The focus of IT departments has been in internal support, network management and managing enterprise applications. IoT deployments have been the traditional focus of operations teams that typically deploy point solutions to solve a business issue.To read this article in full, please click here

Updated: First Set of Building Next-Generation Data Centers Self-Study Materials

When I started the Building Next-Generation Data Centers online course, I didn’t have the automated infrastructure to support it, so I had to go with the next best solution: a reasonably-flexible Content Management System, and Mediawiki turned out to be a pretty good option.

In the meantime, we developed a full-blown course support system, included guided self-paced study (available with most ipSpace.net online course), and progress tracking. It was time to migrate the data center material into the same format.

Read more ...

Measuring ECDSA in DNSSEC – A Final Report

Four years ago we started looking at the level of support for ECDSA in DNSSEC. At the time we concluded that ECDSA was just not supported broadly enough to be usable. Four years later, let's see if we can provide an updated answer to the question of the viability of ECDSA.

NSX Sessions to geek out at VMworld 2018

VMworld 2018 is around the corner and we have an exciting lineup of over 80+ breakout sessions, customer deployment stories and Hands-on Labs for you from the VMware NSX family!

For the tech nerds interested in deep-dives and deployment strategies, we have a list of recommended “geek” NSX VMworld 2018 sessions to choose from in various focus areas.

 

Security:

Deep Dive into NSX Data Center Security for Clouds, Containers, and More [SAI1527BU]
Speakers: Ganapathi Bhatt
This technical session will focus on key security features and use cases for VMware NSX-T Data Center in a multi-hypervisor, heterogeneous workload environment (VMs, containers, bare metal), the architecture and implementation of NSX-T distributed firewalls and edge firewalls, and the grouping/policy model for NSX-T Data Center. You will also find out how VMware NSX Data Center extends a uniform security policy model to VMware NSX Cloud and VMware Cloud on AWS environments.

Securing Horizon and Citrix End-User Computing with NSX Data Center [SAI1851BU]
Speakers: Geoff Wilmington
Organizations deploying virtual desktop infrastructures are tasked with designing for security, networking, and network services for this infrastructure. This can be a complex design process and include multiple products to meet the requirements. When coupling VMware NSX Data Continue reading

Instructor Spotlight: Keith Bogart

Keith Bogart is one of INE’s most esteemed and experienced instructors. Keith has been with INE for 4 years designing and instructing videos and bootcamps, as well as hosting live web-series, designing workbooks, and contributing to our IEOC Forum and INE Blog. Keith has a CCNA in Routing and Switching, CCIE in Dial-ISP, CWNA and is currently working towards his CCNA Security certification.

Before he was with INE, Keith worked as a service representative, technical assistance engineer and network consulting engineer at Cisco Systems. After 17 years at Cisco and a short time with a small start-up, Keith brought his talents to INE and became our #1 CCNA Routing & Switching instructor.


So what has Keith been up to?

On a typical day you can find Keith in our North Carolina office working on his latest project – a new CCNA Security Bootcamp. This bootcamp is still in its early stages of design, however, according to Keith, it’s shaping up to be a 5-day Bootcamp that will be offered online at least twice in the first half of 2019.

PrettyTable – Printing anything in Table

Hi,

As the scripting and programming deals in logging into the device and fetching data, there will be a time where presentability of Data matters. PrettyTable is one such package which greatly helps in reading things

A simple example, re-visiting the code to get the list of routes from the Device

PrettyTable will help in tabulating the Data, the installation and usage can be found here

Pip Package  – https://pypi.org/project/PrettyTable/

Usage – http://zetcode.com/python/prettytable/

Once we have the code, let take a look at how the program looks

The Table form looks something like this

 

Hope this help for anyone who gets started with presentability of Data, honestly, there was one time I got crazy with the print statement just to make the data presentable.

 

 

 

Research: Are We There Yet? RPKI Deployment Considered

The Resource Public Key Infrastructure (RPKI) system is designed to prevent hijacking of routes at their origin AS. If you don’t know how this system works (and it is likely you don’t, because there are only a few deployments in the world), you can review the way the system works by reading through this post here on rule11.tech.

Gilad, Yossi & Cohen, Avichai & Herzberg, Amir & Schapira, Michael & Shulman, Haya. (2017). Are We There Yet? On RPKI’s Deployment and Security. 10.14722/ndss.2017.23123.

The paper under review today examines how widely Route Origin Validation (ROV) based on the RPKI system has been deployed. The authors began by determining which Autonomous Systems (AS’) are definitely not deploying route origin validation. They did this by comparing the routes in the global RPKI database, which is synchronized among all the AS’ deploying the RPKI, to the routes in the global Default Free Zone (DFZ), as seen from 44 different route servers located throughout the world. In comparing these two, they found a set of routes which the RPKI system indicated should be originated from one AS, but were actually being originated from another AS in the default free zone.

Continue reading

Finally, a smart way for insurers to leverage IoT in smart homes

Like many consumers, I tend to be automatically suspicious of insurance companies’ plans to track my behavior. And like many tech journalists, I’m also skeptical of clever new smart home automation schemes. But painful personal experience has me all excited about a new pilot program involving Travelers insurance and Notion smart home sensors.According to a post in Coverager: “Travelers has tapped Notion, the home awareness solution and smart home sensor, to offer smart home monitoring systems to Travelers customers in California. Travelers is working with Notion to provide data-driven insights to customers through Notion’s home monitoring system in order to prevent and mitigate threats such as water leaks, fire damage, and thefts.To read this article in full, please click here