Security researchers tied the malware to a Russian group responsible for hacking incidents during the 2016 U.S. presidential campaign.
Newly released SDxCentral 2018 report on the VNF Ecosystem finds SD-WAN and vCPE are top use cases for NFV and the driving force behind service providers virtualizing their networks.
Many companies are looking at ways to accelerate their SDN adoption so they don’t risk falling behind.
Dustin Phillips, Co-Executive Director of ICANNWiki, is traveling across the United States in his red Toyota Corolla, making connections with the people who are making their communities – and the Internet – a better place. He visited the Bay Area, first making a stop at the Redwood National and State Parks, where he learned about redwood communities and how their survival is dependent on interconnection, a metaphor for the Internet itself.
What is the Internet Ecosystem?
The Internet affects nearly every aspect of society, creating an extremely wide range of stakeholders. There is still a community of stakeholders engaged directly with the Internet’s policymaking processes, but increasingly there are Internet-related discussions occurring at what would traditionally be considered unlikely venues.
CITRIS and the Banatao Institute
Meeting with Dr. Brandie Nonnecke at the University of California, Berkley’s Center for Information Technology Research in the Interest of Society (CITRIS) and the Banatao Institute was a fitting way to kick off my time in the Bay Area. We had a great discussion on the important role of civic participation and collaborative processes for informed decision-making in key issue areas.
Like the incredibly diverse plant life that grows in the understory Continue reading
This is a short article on creating a self-signed root certificate which can be used to self-sign certificates for the purposes of treating our telemetry and instrumentation exploration with the security love it deserves. I also cover configuration of mutual SSL for gRPC on Junos. An article of dual purposes!
One of the things I see far too often is clear-text transport being used in demonstrations, labs and even production. This isn’t acceptable. We live in a world where security has to be woven in from the ground up. How do you really know your system works if you leave out all of the security controls?
I hear your teeth grinding. Why do you want to do this? First of all, even though we can bypass security on gRPC with Junos by going for insecure connectivity with clear-text, we shouldn’t. The world we live in is all about the data and the smallest amount of it can give the ‘bad guys’ a lead.
Now we’re done with the why, we need to deal with the how. There are three approaches to PKI that are common:
We often treat security as an absolute, “that which must be done, and done perfectly, or is of no value at all.” It’s time to take this myth head on, and think about how we should really think about security.
The software is targeted at large-scale enterprises looking to make the jump from legacy or proprietary systems like those from Cisco.
Every month for the last year, thousands of people have used Play with Docker and the accompanying hands-on Play with Docker Classroom training site. These sites allow you to use and learn Docker entirely within your own browser, without installing anything. Last summer, we quietly launched the companion site Play with Kubernetes, to give people a full command line while learning Kubernetes. And today we’re launching a new Kubernetes training site, the Play with Kubernetes Classroom.
The Play with Kubernetes Classroom is a workshop environment just like the Play with Docker Classroom. We currently have an extensive Kubernetes workshop originally based on Jérôme Petazzoni’s Container Training Kubernetes workshop. But instead of doing it all locally or setting up VMs in the cloud, you can now run through the workshop entirely in the browser.
Like the Play with Docker Classroom, we’ll be curating contributions of additional labs from the community. So give Kubernetes in your browser a try, and then come on over to the Play with Kubernetes repository to share your own tutorials with the community.
Check out the Play with Kubernetes Classroom
Try Kubernetes in Docker Enterprise Edition
Try Kubernetes in the browser with https://training.play-with-kubernetes.com
Click To Continue reading
Every month for the last year, thousands of people have used Play with Docker and the accompanying hands-on Play with Docker Classroom training site. These sites allow you to use and learn Docker entirely within your own browser, without installing anything. Last summer, we quietly launched the companion site Play with Kubernetes, to give people a full command line while learning Kubernetes on the command line. And today we’re launching a new Kubernetes training site, the Play with Kubernetes Classroom.
The Play with Kubernetes Classroom is a workshop environment just like the Play with Docker Classroom. We currently have an extensive Kubernetes workshop originally based on Jérôme Petazzoni’s Container Training Kubernetes workshop. But instead of doing it all locally or setting up VMs in the cloud, you can now run through the workshop entirely in the browser.
Like the Play with Docker Classroom, we’ll be curating contributions of additional labs from the community. So give Kubernetes in your browser a try, and then come on over to the Play with Kubernetes repository to share your own tutorials with the community.
Try Kubernetes in the browser Continue reading
AT&T rebranded its AIC. And 5G will be the first new use case to run on its evolved network cloud.
It turns out you can t do it all in the cloud. And thus, we have the rise of edge computing, in which data is collected, processed, and analyzed close to the source of its creation and close to where people and systems need it.
The goals of edge computing include improving performance, reducing the costs and time of data transmission, and creating new applications to take advantage of that data.
Our guide to edge computing is Alex Marcham. Alex is a technologist, writer and researcher. You can find his work at NetworkArchitecture2020.com.
We level-set with a working definition of edge computing, examine the notion of locality and what it means for edge computing, and discuss latency issues.
We explore edge computing use cases such as industrial processes and video surveillance, and dive into the infrastructure that drives this technology.
The post Datanauts 135: An Introduction To Edge Computing appeared first on Packet Pushers.
In the United Kingdom, there is a topical BBC Radio 4 comedy panel show called I’m Sorry I Haven’t A Clue. …
Intel AI VP Gadi Singer On One Song To The Tune Of Another was written by James Cuff at .
Any new and powerful technology always cuts both ways.
The rapid rise of the machine learning flavor of artificial intelligence is due to the fact that, unlike prior approaches, it actually works and therefore can be embraced by a wide swath of businesses, research and educational institutions, and technology companies. …
Making AI Users Accountable For Their Algorithms was written by Jeffrey Burt at .
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Martin Casado – Software Defined Networking appeared first on Network Collective.
On May 14, a group of young people who are currently working on or are studying tech, politics, computer science, and the Internet of Things (IoT) met for a two-hour Youth Advocates for IoT Security round table. This event was a part of the Internet Society’s year-long initiative, the Canadian Multistakeholder Process – Enhancing IoT Security in partnership with Innovation, Science and Economic Development, the Canadian Internet Registration Authority, CANARIE, and CIPPIC. It serves as just one of several workshops that will be held during the process to develop recommendations for a set of norms and policies to secure the IoT in Canada.
The round table offered an opportunity for young people in school or their early careers to voice their opinions and provide unique inputs for consideration on the following aspects of IoT security:
The group discussed the ways in which IoT devices have become seemingly ubiquitous in youth’s lives. IoT devices have also become integral, and often required, parts of classroom learning and workplaces. Now, the lines Continue reading
The company’s cloud-based SD-WAN platform upgraded its security offering by adding a threat hunting system that eliminates enterprises’ need to deploy data collection infrastructure and analyze raw data.
Cisco Live is just around the corner and what better time to talk about the social aspect of the event. …
The post Cisco Live – Coming out of your shell! (Be Social!) appeared first on Fryguy's Blog.