Verizon to Migrate 1,000 Biz Apps and Backend Systems to AWS
The deal bolsters Verizon’s overall operations, but it also boosts AWS’ position among the country’s largest telecom operators.
The deal bolsters Verizon’s overall operations, but it also boosts AWS’ position among the country’s largest telecom operators.
Thanks to all who joined us for the Talari Networks DemoFriday, Tap the Full Potential of Failsafe SD-WAN. During the webinar, Talari Networks demonstrated the latest innovations, product feature updates and UI enhancements to its award-winning SD-WAN platform. After the demo, we took questions from the audience. Below is the full Tap the Full Potential of Failsafe SD-WAN Q&A.
Virtualizing the RAN is a goal for operators but it won’t happen overnight.
Top Internet, mobile, and telecom companies across the globe still have many steps they could take to better protect their users’ freedom of expression and privacy, a new report says.
The 2018 Corporate Accountability Index, released recently by Ranking Digital Rights, gave Google a top score of 63 among 22 companies rated for protecting freedom of expression and privacy. But with a perfect score being 100, all the companies rated fell far short, with most receiving failing grades, the group said.
The good news for users is that 17 of the 22 companies evaluated for the 2018 Index improved scores from last year in at least one area, and many had improvements in multiple areas. Ranking Digital Rights, a nonprofit research center tied to the New America Foundation’s Open Technology Institute, rates the companies on 35 indicators.
“We’ve seen some improvement, but there’s a long way to go,” said Rebecca MacKinnon, director of the Ranking Digital Rights project. “At the same time, some of the improvements we’ve seen have been genuinely meaningful.”
A second piece of good news for users: Some of the companies, particularly the rank-and-file employees, seem to pay attention to their rankings in consumer-focused studies, Continue reading
A handful of OEMs are already building products based on the new reference architecture for uCPE.
Encryption is a critical building block for online trust, but it’s never perfect. Any encryption you use is the product of many steps. Encryption methods have to be defined; protocols for implementation have to be specified; and then the protocols have to be implemented. Each step is handled by different people and potentially introduces vulnerabilities along the way. Even with the best lock design in the world, if someone builds the lock with variations in the design (either intentionally or accidentally), it might be easily picked.
When you own a broken lock, you have it fixed or use a different one – encryption is no different.
Yesterday (14 May 2018), the Internet security community was alerted to newly discovered vulnerabilities in the secure email ecosystem, dubbed “EFAIL”. EFAIL can make the content of emails encrypted with PGP and S/MIME readable to an attacker. While there are some fixes users and companies can make to mitigate EFAIL, cases like this underscore the importance of choice when it comes to secure communications.
EFAIL abuses a combination of vulnerabilities in the OpenPGP and S/MIME specifications and the way that many email clients render remote content in Continue reading
Mozilla recently released version 60 of Firefox, which contains a number of pretty important enhancements (as outlined here). However, the Fedora repositories don’t (yet) contain Firefox 60 (at least not for Fedora 27), so you can’t just do a dnf update
to get the latest release. With that in mind, here are some instructions for manually installing Firefox 60 on Fedora 27.
These instructions assume you have a dnf
-installed version of Firefox (typically Firefox 59) already installed on your Fedora system. These steps should allow you to upgrade your Fedora system to Firefox 60:
firefox-60.0.tar.bz2
or similar) onto your Fedora system. You can do this with your already-installed version of Firefox, but be sure to close/quit Firefox before proceeding with the rest of the instructions./usr/share/applications/firefox.desktop
; you’ll use this later.dnf remove firefox
. This will remove the firefox.desktop
file you copied in the previous step (which is why you copied it somewhere else).Use bunzip2
to decompress the downloaded Firefox 60 archive. This will leave you with a plain . Continue reading
With cloud and automation upending traditional data storage management, how does a storage admin remain relevant? Here are some ideas.