Video: What Is SDWAN?
Pradosh Mohapatra, the author of last week’s SD-WAN Overview webinar started his presentation with a seemingly simple question: What Is SD-WAN?
You need at least free ipSpace.net subscription to watch his answer.
Pradosh Mohapatra, the author of last week’s SD-WAN Overview webinar started his presentation with a seemingly simple question: What Is SD-WAN?
You need at least free ipSpace.net subscription to watch his answer.
An empirical analysis of anonymity in Zcash Kappos et al., USENIX Security’18
As we’ve seen before, in practice Bitcoin offers little in the way of anonymity. Zcash on the other hand was carefully designed with privacy in mind. It offers strong theoretical guarantees concerning privacy. So in theory users of Zcash can remain anonymous. In practice though it depends on the way those users interact with Zcash. Today’s paper choice, ‘An empirical analysis of anonymity in Zcash’ studies how identifiable transaction participants are in practice based on the 2,242,847 transactions in the blockchain at the time of the study.
We conclude that while it is possible to use Zcash in a private way, it is also possible to shrink its anonymity set considerably by developing simple heuristics based on identifiable patterns of usage.
The analysis also provides some interesting insights into who is using Zcash and for what as well. Founders and miners combined account for around 66% of the value drawn from the shielded pool.
The code for the analysis is available online at https://github.com/manganese/zcash-empirical-analysis
Zcash is based on highly regarded research including a cryptographic proof of the main privacy feature Continue reading
The GSMA Mobile Economy report predicts that there will be 200 million 5G mobile connections in the U.S. and Canada by 2025, putting it ahead of Europe and key Asian markets.
A few times over the last week or two I’ve had a need to use the gcloud command-line tool to access or interact with Google Cloud Platform (GCP). Because working with GCP is something I don’t do very often, I prefer to not install the Google Cloud SDK; instead, I run it in a Docker container. However, there is a trick to doing this, and so to make it easier for others I’m documenting it here.
The gcloud tool stores some authentication data that it needs every time it runs. As a result, when you run it in a Docker container, you must take care to store this authentication data outside the container. Most of the tutorials I’ve seen, like this one, suggest the use of a named Docker container. For future invocations after the first, you would then use the --volumes-from parameter to access this named container.
There’s only one small problem with this approach: what if you’re using another tool that also needs access to these GCP credentials? In my case, I needed to be able to run Packer against GCP as well. If the authentication information is stored inside a named Docker container (and then accessed Continue reading
The service is targeted to mobile virtual network operators, cable operators that want to provide a mobile service, and traditional mobile operators that want to expand outside of their footprint.
Gentlemen (and women), start your inference engines.
One of the world’s largest buyers of systems is entering evaluation mode for deep learning accelerators to speed services based on trained models. …
Facebook Sounds Opening Bell for AI Inference Hardware Makers was written by Nicole Hemsoth at .
The vendor is taking advantage of OpenStack and virtualization platforms like containers and the container environment.
In this briefing, Meta Networks discussed their new partnership with Talari. Talari is an SD-WAN provider for enterprises. Meta is providing remote access. Therefore, what you’ve got with the Talari/Meta partnership is a full-featured WAN solution.
The post BiB 055: Meta Networks Brings SD-Perimeter To Talari’s SD-WAN appeared first on Packet Pushers.
Metamako provides 4 nanoseconds of latency, advancing the “race to zero.” The acquisition will boost Arista's product line targeted at financial services.
Datrium says its software simplifies hybrid cloud compared to traditional storage systems and hyperconverged infrastructure.
The new Lenovo-branded products will combine NetApp’s all-flash data management and storage software with Lenovo’s servers.
Securing hyperconverged infrastructures requires a policy-based approach that intertwines security with applications.