This week on Tuesday, 26 June, the Internet Society and NIC.BR signed a Memorandum of Understanding (MoU) to work together to increase routing security in Brazil, including the MANRS initiative. Mutually Agreed Norms for Routing Security is a global initiative that provides crucial fixes to reduce the most common routing threats.
We are excited to strengthen our efforts to work together with NIC.br, and in fact this MoU only formalizes an existing long-term relationship between the two organizations. Our goal is to help increase the number of Brazilian Internet Service Providers and Internet Exchange Points joining efforts for a more secure and resilient Internet.
Not a single day goes by without dozens of incidents affecting the Internet’s routing system. Route hijacking, route leaks, IP address spoofing, and other harmful activities can lead to Denial of Service (DoS) attacks, traffic inspection and surveillance, lost revenue, reputational damage, and more. As one of the biggest countries with high access rates, Brazil is also facing these incidents on a daily basis.
NIC.BR is responsible for the coordination and integration of all Internet service initiatives in Brazil, including long-standing activities related to Internet security. They are also responsible for many projects that Continue reading
On Tuesday, 17 July, during IETF 102 in Montreal, the Global Commission on the Stability of Cyberspace (GCSC) will host a lunch panel on “Cyber Diplomacy Meets InfoSec and Technology.” During this session, the Commission wants to inform and engage with the IETF community on its work so far and the work that is in the pipeline.
The Global Commission on the Stability of Cyberspace is developing norms and policy initiatives that intend to counter the risk to the overall security and stability of cyberspace due to rise of offensive cyber-activities, and especially those by states.
In this global environment we see conflict between states takes new forms, and cyber-activities are playing a leading role. There is an increasing risk of undermining the peaceful use of cyberspace and a growing for need norms and policies to enhance international security and stability.
The Global Commission on the Stability of Cyberspace, with commissioners from diverse backgrounds, sets out to develop proposals for norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace.
During this lunch panel we want to engage with the IETF community to discuss the norms the commission Continue reading
As a part of some content development and revision on MPLS, I was trying to capture some MPLS Pcap Files from the Vmx Router. The problem was that every time I capture a file, I had to first scp or sftp into the device and then after successful import, I had to run Wireshark on it.
The Aim of the post is to fetch the pcap file and run Wireshark on it. Am not a decent programmer by any stretch of the imagination, anyone can see that from my code but the point that matters is that it works and you should give it a try too.
https://github.com/yukthr/auts/blob/master/junos_pyez/getfile_executewireshark.py– Is the file
When I run this program to fetch a non-existent Pcap file
And when I query for an existent file
-Rakesh
Silver Peak differentiates itself from other SD-WAN vendors with its Unity EdgeConnect SD-WAN physical or virtual appliance.
Users weigh in on pros and cons of Dell EMC ScaleIO, HPE StoreVirtual, IBM Spectrum Virtualize, Red Hat Ceph, and StorPool.
The EVPN in the Data Center book by Dinesh Dutt, the author of EVPN Technical Deep Dive webinar and member of ipSpace.net ExpertExpress team has finally been published. It’s currently kept safe behind Cumulus Networks regwall, but as O’Reilly published it, I would expect it to be available through other channels in the future.
Deep code search Gu et al., ICSE’18
The problem with searching for code is that the query, e.g. “read an object from xml,” doesn’t look very much like the source code snippets that are the intended results, e.g.:
*
That’s why we have Stack Overflow! Stack Overflow can help with ‘how to’ style queries, but it can’t help with searches inside codebases you care about. For example, “where in this codebase are events queued on a thread?”
…an effective code search engine should be able to understand the semantic meanings of natural language queries and source code in order to improve the accuracy of code search.
DeepCS is just such a search engine for code, based on the CODEnn (Code-Description Embedding Neural Network) network model. During training, it takes code snippets (methods) and corresponding natural language descriptions (from the method comments) and learns a joint-embedding. I.e., it learns embeddings such that a method description and its corresponding code snippet are both mapped to a similar point in the same shared embedding space. Then given a natural language query, it can embed the query in vector space and look for nearby code snippets. Compared Continue reading
Most companies in the HPC space have made the natural transition to moving into the deep learning and AI space over the last couple of years. …
Cray Bolsters HPC to AI Crossover Appeal was written by Nicole Hemsoth at .
If everything had played out as planned, then the original “Aurora” supercomputer planned by Intel and built by Cray for Argonne National Laboratory under contract from the US Department of Energy would probably have been at or near the top of the Top 500 charts this week at the International Supercomputing 2018 conference in Frankfurt, Germany. …
Intel Opens Up About Next Generation Omni-Path Interconnect was written by Timothy Prickett Morgan at .
Authored by:
Roie Ben-haim (Twitter: @roie9876)
Niran Even-chen (Twitter: @niranec)
In our job as System engineers in the networking and security for Cloud native applications (CNA) space we get to work with many customers on their implementation of CNA platforms. The fun part of that is that we get to hear the “DevOps” drivers and needs of many enterprise customers. Developers using CNA platforms such as Kubernetes (k8s) and Pivotal Application Service (Formerly known as PCF) don’t always have security and networking first in mind; they are focused on speed and innovation. A developer doesn’t want to wait for the networking team to provision service (e.g. load balancing, switching, etc.), or for the security team to whitelist a new app capability. This is especially true in enterprises where “Change management” is manual and long process. On the other hand, when it comes to those same enterprises, there are regulations and security requirements that can slow down the innovation process. To strike a balance, networking and security platforms for CNA need to operate in as seamless a manner as possible to maximize speed and efficiency for both IT and developers. NSX Data Center is a platform built just for Continue reading
The drafting of the new EU Copyright Directive was never going to be an easy task. As has been seen over the years, policy discussions involving digital service providers and the intellectual property rights community are often polarizing, and middle ground can be difficult to find. However, the existing legal framework – which dates from 2001 - needed a refresh, in order to take account of the new online environment in which user-generated content is a key feature, while acknowledging the challenges that authors face and their need for fair remuneration.
Unfortunately, as is now so often the case in Brussels, the new law is being drafted with a small set of large Internet companies in mind. This blinkered approach to rule-making frequently results in unintended and negative consequences for other parts of the Internet ecosystem, and indeed for end users, many of whom are often unaware that such policies are being created.
The draft copyright proposal has been undergoing EU Parliamentary and Council scrutiny since it was tabled by the European Commission in 2016, and it has been heavily criticised by civil society organisations, numerous industry associations, renowned academics and Continue reading
While Microsoft’s growth continues to surge, AWS remains the prominent cloud provider in the public IaaS and PaaS market segments.