5 reasons the IoT needs its own networks

Last week, AT&T said it would launch a Narrow Band-IoT (NB-IoT) network in the United States and Mexico. And this isn’t the first network dedicated to the Internet of Things that AT&T is working on. The carrier had previously announced an IoT network using the LTE-M standard to cover some 400 million people in the U.S. and Mexico by the end of last year.Just as important, many other U.S. carriers also have various flavors of low-power IoT networks in the works, including Verizon, T-Mobile, Sprint, and even Dish Network.To read this article in full, please click here

5 reasons the IoT needs its own networks

Last week, AT&T said it would launch a Narrow Band-IoT (NB-IoT) network in the United States and Mexico. And this isn’t the first network dedicated to the Internet of Things that AT&T is working on. The carrier had previously announced an IoT network using the LTE-M standard to cover some 400 million people in the U.S. and Mexico by the end of last year.Just as important, many other U.S. carriers also have various flavors of low-power IoT networks in the works, including Verizon, T-Mobile, Sprint, and even Dish Network.To read this article in full, please click here

NIC.BR and the Internet Society Work Together to Increase Routing Security in Brazil

This week on Tuesday, 26 June, the Internet Society and NIC.BR signed a Memorandum of Understanding (MoU) to work together to increase routing security in Brazil, including the MANRS initiative. Mutually Agreed Norms for Routing Security is a global initiative that provides crucial fixes to reduce the most common routing threats.

We are excited to strengthen our efforts to work together with NIC.br, and in fact this MoU only formalizes an existing long-term relationship between the two organizations. Our goal is to help increase the number of Brazilian Internet Service Providers and Internet Exchange Points joining efforts for a more secure and resilient Internet.

Not a single day goes by without dozens of incidents affecting the Internet’s routing system. Route hijacking, route leaks, IP address spoofing, and other harmful activities can lead to Denial of Service (DoS) attacks, traffic inspection and surveillance, lost revenue, reputational damage, and more. As one of the biggest countries with high access rates, Brazil is also facing these incidents on a daily basis.

NIC.BR is responsible for the coordination and integration of all Internet service initiatives in Brazil, including long-standing activities related to Internet security. They are also responsible for many projects that Continue reading

At IETF 102: The Global Commission on the Stability of Cyberspace – Cyber diplomacy meets InfoSec and Technology

On Tuesday, 17 July, during IETF 102 in Montreal, the Global Commission on the Stability of Cyberspace (GCSC) will host a lunch panel on “Cyber Diplomacy Meets InfoSec and Technology.” During this session, the Commission wants to inform and engage with the IETF community on its work so far and the work that is in the pipeline.

The Global Commission on the Stability of Cyberspace is developing norms and policy initiatives that intend to counter the risk to the overall security and stability of cyberspace due to rise of offensive cyber-activities, and especially those by states.

Session Abstract

In this global environment we see conflict between states takes new forms, and cyber-activities are playing a leading role. There is an increasing risk of undermining the peaceful use of cyberspace and a growing for need norms and policies to enhance international security and stability.

The Global Commission on the Stability of Cyberspace, with commissioners from diverse backgrounds, sets out to develop proposals for norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace.

During this lunch panel we want to engage with the IETF community to discuss the norms the commission Continue reading

Fetching Pcap Files and running Wireshark – Junos Pyez

As a part of some content development and revision on MPLS, I was trying to capture some MPLS Pcap Files from the Vmx Router. The problem was that every time I capture a file, I had to first scp or sftp into the device and then after successful import, I had to run Wireshark on it.

The Aim of the post is to fetch the pcap file and run Wireshark on it. Am not a decent programmer by any stretch of the imagination, anyone can see that from my code ? but the point that matters is that it works and you should give it a try too.

https://github.com/yukthr/auts/blob/master/junos_pyez/getfile_executewireshark.py– Is the file

 

 

When I run this program to fetch a non-existent Pcap file

 

And when I query for an existent file

 

 

-Rakesh

 

10 hot SD-WAN startups to watch

The SD-WAN market is hot, with all of the usual networking suspects (Cisco, VMware, AT&T, Citrix, etc.) staking a claim. But make no mistake, this is a market sector that was built, defined, and refined by startups.A few early movers have already been taken off the table, snatched up by incumbents seeking to modernize their networking portfolios: Cisco acquired Viptela for $610 million; VMware bought VeloCloud for an estimated $449 million; NTT purchased Virtela for $525 million, and Riverbed, which was a leader in the precursor WAN optimization space, acquired Ocedo (price undisclosed) to help it manage its transition to a software-defined future.To read this article in full, please click here

10 hot SD-WAN startups to watch

The SD-WAN market is hot, with all of the usual networking suspects (Cisco, VMware, AT&T, Citrix, etc.) staking a claim. But make no mistake, this is a market sector that was built, defined, and refined by startups.A few early movers have already been taken off the table, snatched up by incumbents seeking to modernize their networking portfolios: Cisco acquired Viptela for $610 million; VMware bought VeloCloud for an estimated $449 million; NTT purchased Virtela for $525 million, and Riverbed, which was a leader in the precursor WAN optimization space, acquired Ocedo (price undisclosed) to help it manage its transition to a software-defined future.To read this article in full, please click here

Deep code search

Deep code search Gu et al., ICSE’18

The problem with searching for code is that the query, e.g. “read an object from xml,” doesn’t look very much like the source code snippets that are the intended results, e.g.:

*

That’s why we have Stack Overflow! Stack Overflow can help with ‘how to’ style queries, but it can’t help with searches inside codebases you care about. For example, “where in this codebase are events queued on a thread?”

…an effective code search engine should be able to understand the semantic meanings of natural language queries and source code in order to improve the accuracy of code search.

DeepCS is just such a search engine for code, based on the CODEnn (Code-Description Embedding Neural Network) network model. During training, it takes code snippets (methods) and corresponding natural language descriptions (from the method comments) and learns a joint-embedding. I.e., it learns embeddings such that a method description and its corresponding code snippet are both mapped to a similar point in the same shared embedding space. Then given a natural language query, it can embed the query in vector space and look for nearby code snippets. Compared Continue reading

Intel Opens Up About Next Generation Omni-Path Interconnect

If everything had played out as planned, then the original “Aurora” supercomputer planned by Intel and built by Cray for Argonne National Laboratory under contract from the US Department of Energy would probably have been at or near the top of the Top 500 charts this week at the International Supercomputing 2018 conference in Frankfurt, Germany.

Intel Opens Up About Next Generation Omni-Path Interconnect was written by Timothy Prickett Morgan at .

The value-add of NSX Data Center Compared To Open Source Solutions For Cloud Native Apps

Authored by:

Roie Ben-haim (Twitter: @roie9876)

Niran Even-chen (Twitter: @niranec)

In our job as System engineers in the networking and security for Cloud native applications (CNA) space we get to work with many customers on their implementation of CNA platforms. The fun part of that is that we get to hear the “DevOps” drivers and needs of many enterprise customers. Developers using CNA platforms such as Kubernetes (k8s) and Pivotal Application Service (Formerly known as PCF) don’t always have security and networking first in mind; they are focused on speed and innovation. A developer doesn’t want to wait for the networking team to provision service (e.g. load balancing, switching, etc.), or for the security team to whitelist a new app capability. This is especially true in enterprises where “Change management” is manual and long process. On the other hand, when it comes to those same enterprises, there are regulations and security requirements that can slow down the innovation process. To strike a balance, networking and security platforms for CNA need to operate in as seamless a manner as possible to maximize speed and efficiency for both IT and developers. NSX Data Center is a platform built just for Continue reading

Copyright? Copywrong!

Copyright? Copywrong!

The drafting of the new EU Copyright Directive was never going to be an easy task. As has been seen over the years, policy discussions involving digital service providers and the intellectual property rights community are often polarizing, and middle ground can be difficult to find. However, the existing legal framework – which dates from 2001 - needed a refresh, in order to take account of the new online environment in which user-generated content is a key feature, while acknowledging the challenges that authors face and their need for fair remuneration.

Unfortunately, as is now so often the case in Brussels, the new law is being drafted with a small set of large Internet companies in mind. This blinkered approach to rule-making frequently results in unintended and negative consequences for other parts of the Internet ecosystem, and indeed for end users, many of whom are often unaware that such policies are being created.

Monitoring and Filtering User-Generated Content - A Flawed Approach

The draft copyright proposal has been undergoing EU Parliamentary and Council scrutiny since it was tabled by the European Commission in 2016, and it has been heavily criticised by civil society organisations, numerous industry associations, renowned academics and Continue reading