Routing security can be a difficult topic to explain. It’s technical. It’s filled with industry jargon and acronyms. It’s, well, nerdy. But routing security is vital to a stable and secure future Internet, and we here at the Internet Society have been supporting the Mutually Agreed Norms for Routing Security (MANRS) initiative for several years now. To help explain, at a very high level, some of the major routing security issues and how MANRS can help address them, we’re pleased to announce a new explanatory video.
Available with English, French, and Spanish subtitles, this short new video explains three major incidents that can lead to things like denial of service attacks, surveillance, and lost revenue:
Network operators of all sizes have a role to play in securing the Internet’s routing infrastructure. By implementing the four simple MANRS Actions, together we can make significant improvements to reduce the most common routing threats. Those four actions are:
The idea that SD-WAN will make MPLS obsolete plays on the frustrations of enterprise IT professionals that are dissatisfied with their current WAN provider and want to kick them to the curb.
I DO NOT CARE. IT JUST HAS TO WORK. NO REALLY. I JUST DONT CARE ABOUT CABLING.
Versa prefers not to itemize its quarterly revenues on IHS Markit's SD-WAN vendor list. “Of that list of vendors, we’re the only one that is purely software and subscription based," says Versa's CEO.
Statistics says, the more often you do something, the higher the chances of a negative event occurring when you do it.
Applying this revelation, if you fly regularly, the chances increase of a delayed flight, or being involved in an incident or accident. A somewhat macabre reference perhaps.
Let’s take something real which happened to me this week (11th June 2018). Whilst working out of one of Juniper’s regional offices, I returned back to the hotel room to carry on working whilst putting my feet up. Something felt strange in the room but I couldn’t put my finger on the weirdness. After a couple of hours, I realised that all of my belongings were gone from the room. Everything! Thanks to a mix-up with the house keeping system, the maids threw my collection of travel items in to some bags ready for disposal. Thanks to a procedure that the hotel operates, for my items to be thrown to the garbage, a manager is required to sign off on the request. A process saved my belongings and I’m thankful that the managers knew this process and also knew where my stuff was likely to be. Before my items were returned, I Continue reading
Learn about antenna fundamentals and the different types of antennas available for WiFi applications.
Analytics with smart arrays: adaptive and efficient language-independent data Psaroudakis et al., EuroSys’18
(If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site).
We’re going lower-level today, with a look at some work on adaptive data structures by Oracle. It’s motivated by a desire to speed up big data analytic workloads that are “increasingly limited by simple bottlenecks within the machine.” The initial focus is on array processing, but the ambition is to extend the work to more data types in time.
Modern servers have multiple interconnected sockets of multi-core processors. Each socket has local memory, accessible via a cache-coherent non-uniform memory access (ccNUMA) architecture. In the NUMA world the following hold true:
If we want to crunch through an array as fast as possible in a NUMA world, the optimum way of doing it depends on the details of the machine, and on the application Continue reading
The Barcelona Supercomputing Center is one of the flagship HPC facilities in Europe and it arguably has the most elegant and spiritual of datacenters in the world, located inside of Torre Girona Chapel. …
BSC Fires Up Power9-V100 Hybrid Compute On MareNostrum 4 was written by Timothy Prickett Morgan at .
Rubrik Alta 4.2 offers AWS native protection for EC2, VMware vCloud Director integration, Windows full volume protection, as well as AIX & Solaris support. We zoom in on the EC2 part of the announcement.
The post BiB 045: Rubrik Alta 4.2 AWS Native Protection For EC2 appeared first on Packet Pushers.
CA Technologies and Ixia extended an existing partnership to resolve scale and complexity hurdles introduced by software-defined infrastructures.