Opanga Streamlines Traffic by Using Machine Learning in the Network Core
5G technologies are great, says Opanga's CEO. But why aren't network operators doing more to manage traffic by leveraging the vEPC?
5G technologies are great, says Opanga's CEO. But why aren't network operators doing more to manage traffic by leveraging the vEPC?
This is the second part of our chat with Dave Crocker about the fascinating history of email.
Remember to come by the Network Collective home page to find all the great video content we have been working on, and check out our membership options for even more content and to become a part of our awesome community of network engineers.
DevSecOps automates core security tasks by embedding security controls and processes into DevOps, thus baking security into the code.
One organization that is using OpenSwitch is Verizon Connect — Verizon’s business unit that provides fleet management and mobile workforce management.
The Seattle-based company was founded by former Microsoft and Amazon Web Services execs and pulled in $5 million of seed funding.
Take a Network Break! Aruba Networks rolls out a new SD-WAN platform plus a grand strategy for branch management, Cisco acquires July Systems for its wireless location services technology, and AT&T sells dozens of data centers for $1.1 billion.
But AT&T may take that cash and pour it into the acquisition of a digital ad exchange company, Deutsche Telecom announces big layoffs in its T-Systems unit, and Australian telco Telstra splits off its legacy infrastructure unit into a standalone business.
A Web Application Firewall (WAF) vendor lifts the curtain on why WAFs get bought but rarely used, HPE pledges $4 billion for edge computing, and Intel bids a terse goodbye to its CEO.
Stay tuned after the news for a sponsored conversation with Mellanox, where Greg and guests dive into data center fabrics using VXLAN and EVPN. For more information, head over to Mellanox.com/packetpushers. And check out these links:
Performance Report by The Tolly Group – Mellanox
Controllerless VXLAN With BGP EVPN – Mellanox (PDF)
Is it Time to Upgrade to VXLAN – Mellanox blog
VXLAN Eye on Mellanox – Mellanox via YouTube
The Packet Pushers have launched a brand new Continue reading
DNS is fundamental to how the web works, and for most of the population it’s completely transparent. Everything on the web is accessed by a DNS name.
Since DNS is an old protocol ([November 1987 in fact](http
A new white paper from Zscaler discusses the importance of beginning your branch transformation journey with a solution designed and built to support a cloud-first enterprise
A brief introduction to bundling your Service Worker scripts.
Photo by Joyce Romero / Unsplash
// The simplest Service Worker: A passthrough script
addEventListener('fetch', event => {
event.respondWith(fetch(event.request))
})
The code above is simple and sweet: when a request comes into one of Cloudflare’s data centers, passthrough to the origin server. There is absolutely no need for us to introduce any complex tooling or dependencies. Nevertheless, introduce we will! The problem is, once your script grows even just a little bit, you’ll be tempted to use JavaScript’s fancy new module system. However, in doing so, you’ll have a little bit of trouble uploading your script via our API (we only accept a single JS file).
Throughout this post, we’ll use contrived examples, shaky metaphors, and questionably accurate weather predictions to explain how to bundle your Service Worker with Webpack.
Let’s just say Webpack is a module bundler. That is, if you have code in multiple files, and you tie them together like this:
// Import the CoolSocks class from dresser.js
import { CoolSocks } from './dresser'
import { FancyShoes } from './closet'
Then you can tell webpack to follow all of those Continue reading
Successful microservices adoption require a thoughtful approach. Here are three tips any organization can use in its migration journey.
Whether it’s playing dungeons and dragons over voice chat with my college friends hundreds of miles away, reading the latest movie reviews for summer blockbusters I’ll watch once they come out on video, or simply paying electrical bills, the Internet has become an important part of my life.
Yet, while I have come to rely on the Internet, I don’t always do what is best for it.
I don’t always patch my connected devices or applications, leaving them vulnerable to compromise and use in a botnet. I don’t look for security when buying an app or a device, let alone look at the privacy policies.
While I know I am hurting the overall security of the Internet, I find myself thinking, “I’m just one person, how much damage could I do?”
Unfortunately, according to one recent survey, there are a lot of people who act just like me.
The results from the 2018 CIGI-Ipsos Global Survey on Internet Security and Trust* suggest that many users fail to make security a priority as they shop for Internet of Things (IoT) devices. (IoT refers to “scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human Continue reading
Companies can't overlook the critical role of the network in adopting new tech like AI and IoT. Here are some ways to begin tackling the challenges of next-generation networking.
Couldn’t you just take their phones away? The government of Algeria told telecom carriers to shut down Internet service for several hours a day during high school testing season, according to several news reports. The government is trying to prevent the repeat of a situation in 2016, when exam questions were leaked online, reports Al Jazeera. The government of Iraq has taken similar action, the news agency says. It’s unclear how a short shutdown each day will prevent leaks.
Why IoT security is terrible: The headline is certainly catchy, but the IEEE Spectrum suggests that the Internet of things has some special security challenges including nation state hackers that are targeting the systems (although that’s true of other IT systems as well). Another of the six reasons: Many IoT systems, like your connected refrigerator, don’t have dedicated IT security workers looking out for them.
Score one for encryption: Using the encrypted WhatsApp, Syrian school girls banned from attending school in Islamic State-controlled territory, are taking pictures of school work and sharing it with each other, notes NakedSecurity, referencing a report on the BBC. “Education is everything, and it’s our weapon,” one of the girls says.
Not so fast, WhatsApp: Continue reading
These positions are in high demand and will be strategically significant to companies’ digital transformation efforts, according to IDC/Cisco report.