Final Slates of Nominees for the 2018 Internet Society Board of Trustees Elections

In the name of the Internet Society Nominations Committee, I am pleased to announce the final slates of nominees for the 2018 Internet Society Board of Trustees elections.

The ISOC  Nominations Committee received many responses to the call for applications, with the following regional and gender distribution of candidates:

Total applications received: 26

Regional distribution:

  • Africa: 7
  • Asia Pacific: 1
  • Europe: 4
  • Latin America and Caribbean: 6
  • North America: 8

Gender distribution:

  • Female: 3
  • Male: 23

The Nominations Committee chose a slate of 3 candidates for each election slate. One nominee, Stefano Trumpy, was added to the Chapters slate after he launched a successful petition. Therefore, the final slates consist of 3 candidates for the Organization Members election, and 4 candidates for the Chapters election.

The final slates are as follows. The candidates for each election slate are listed in alphabetical order by last name.

Organizations (one seat available)

  • Tejpal Bedi
  • Róbert Kisteleki
  • Robert Pepper

Chapters (one seat available)

  • Walid Al-Saqaf
  • Matthew Rantanen
  • Stefano Trumpy
  • Roberto Zambrana

Biographical information on all the candidates is available here:

https://www.internetsociety.org/board-of-trustees/elections/2018/nominees/

Voting representatives can expect to receive e-ballots from the ISOC Elections Committee by email on Thursday, 8 March and will have Continue reading

IDG Contributor Network: 6 key questions to answer when setting up an IoT center of excellence

Adopting IoT technology is a significant, company-wide undertaking. It requires a large dedication of resources and budget across multiple departments. Rightfully, the C-level has expectations for their investments. But before you can get to the payoff, there is an inordinate amount of decisions to be made and changes to endure. Not the least of which will be to learn new technology, establish new processes and define new job descriptions.But, because the result is so valuable to an organization’s bottom line – for example, greater yields of manufactured goods, extended life of decade’s old equipment, and more – tech leaders often compare the adoption of IoT technology to the early days of computers in business.   To read this article in full, please click here

OpenStack Stretches To The Edge, Embraces Accelerators

Since its inception, the OpenStack cloud controller co-created by NASA and Rackspace Hosting, with these respective organizations supplying the core Nova compute and Swift object storage foundations, has been focused on the datacenter. But as the “Queens” release of OpenStack is being made available, the open source community that controls that cloud controller is being pulled out of the datacenter and out to the edge, where a minimalist variant of the software is expected to have a major presence in managing edge computing devices.

The Queens release of OpenStack is the 17th drop of software since NASA and Rackspace first

OpenStack Stretches To The Edge, Embraces Accelerators was written by Timothy Prickett Morgan at The Next Platform.

Memcached servers can be hijacked for massive DDoS attacks

A flaw in the implementation of the UDP protocol for Memcached servers can allow anyone to launch a massive Distributed Denial of Service (DDoS) attack with little effort.The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings.Also read: Getting the most out of your next-generation firewall Memcached is a Web-based massive memory cache for database-drive sites, such as websites, that caches the most frequently retrieved data and keeps it in memory rather than getting it from the hard disk over and over again. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.To read this article in full, please click here

Memcached servers can be hijacked for massive DDoS attacks

A flaw in the implementation of the UDP protocol for Memcached servers can allow anyone to launch a massive Distributed Denial of Service (DDoS) attack with little effort.The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings.Also read: Getting the most out of your next-generation firewall Memcached is a Web-based massive memory cache for database-drive sites, such as websites, that caches the most frequently retrieved data and keeps it in memory rather than getting it from the hard disk over and over again. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.To read this article in full, please click here

VMware Crafts Compute And Storage Stacks For The Edge

The rapid proliferation of connected devices and the huge amounts of data they are generating is forcing tech vendors and enterprises alike to cast their eyes to the network edge, which has become a focus of the distributed computing movement as more compute, storage, network, analytics and other resources are moving closer to where these devices live.

Compute is being embedded in everything, and this makes sense. The costs in time, due to latency issues, and money, due to budgetary issues, from transferring all that data from those distributed devices back to a private or public datacenter are too high

VMware Crafts Compute And Storage Stacks For The Edge was written by Jeffrey Burt at The Next Platform.

Geographic Information Systems (GIS) Field Upended by Neural Networks

On today’s episode of “The Interview” with The Next Platform, we focus on how geographic information systems (GIS) is, as a field, being revolutionized by deep learning.

This stands to reason given the large volumes of satellite image data and robust deep learning frameworks that excel at image classification and analysis–a volume issue that has been compounded by more satellites with ever-higher resolution output.

Unlike other areas of large-scale scientific data analysis that have traditionally relied on massive supercomputers, our audio interview (player below) reveals that a great deal of GIS analysis can be done on smaller systems. However,

Geographic Information Systems (GIS) Field Upended by Neural Networks was written by Nicole Hemsoth at The Next Platform.

BrandPost: Swisscom and Huawei Sign MoU on NetCity Project

At MWC 2018, Swisscom and Huawei announced they has signed a Memorandum of Understanding (MoU)  on NetCity project, intended to build a world-class, highly reliable, next-generation wireline network infrastructure that can provide customers in Switzerland with innovative products and services.NetCity, a project developed by Huawei and leading carriers for building the cities of the future, is intended to bring humanity a step closer to achieving a fully-connected, intelligent world by means of constructing a broadband, cloud-based and intelligent network architecture.The MoU marks an important step toward building a leading position for the two companies in technology, business and social responsibility. Working hand in hand on this project, Swisscom and Huawei will explore new concepts in wireline network deployment, developing innovative solutions that enable "zero-touch operations" for telecom and data center networks and accelerating the application of cloud computing, telemetry, AI, and Big Data on networks.To read this article in full, please click here

Information Gatekeeping: Not a Laughing Matter

There’s a joke that goes something like this: How do you make a little money in the online news business?

The punchline: Start with a huge pile of money, and work your way down from there.

It seems the same joke would work for the online comedy business, judging by the layoff news coming out of Funny or Die in January. Recently, Splitsider.com published an interesting Q&A with comedy veteran Matt Klinman, and he talked about the woes of online comedy outlets.

Klinman focused his ire on Facebook and its role as an information gatekeeper, in which the site determines what comedy clips to show each of its users. But much of his criticism could have just as easily been targeted at a handful of other online gatekeepers that point Internet users to a huge percentage of the original content that’s out there.

As Klinman says about Facebook, these services have created their own “centrally designed Internet” in which they serve as “our editor and our boss. They hide behind algorithms that they change constantly.”

As a thrice-laid-off online journalist, I can sympathize. I’m pretty sure I can’t blame any of the current gatekeepers for my 2002 layoff Continue reading

A Secure Supply Chain for Kubernetes

The beta release of the Docker Enterprise Edition (Docker EE) container platform last month integrates Kubernetes orchestration, running alongside Swarm, to provide a single container platform that supports both legacy and new applications running on-premises or in the cloud. For organizations that are exploring Kubernetes or deploying it in production, Docker EE offers integrated security for the entire lifecycle of a containerized application, providing an additional layer of security before the workload is deployed by Kubernetes and continuing to secure the application while it is running.

Mike Coleman previously discussed access controls for Kubernetes. This week we’ll begin discussing how Docker EE secures the Kubernetes supply chain.

What is a Software Supply Chain?

When you purchase something from a retail store, there is an entire supply chain that gets the product from raw materials to the manufacturer to you. Similarly, there is a software supply chain that takes an application from code on a developer’s laptop to production.

Every company’s software supply chain may be slightly different; some outsource software development, some have adopted Continuous Integration and Continuous Delivery processes, and some deploy production applications across multiple clouds, some on-premises. Regardless of what the software supply chain consists of, Continue reading

IDG Contributor Network: The future of IoT device management

The Internet of Things (IoT) continues to expand its reach into homes, businesses, social settings, and other environments, as more and more devices are connected with the purpose of gathering and sharing data.Clearly, there are several potential benefits of IoT from a consumer standpoint. Apart from the convenience aspect, smart connected products can lead to increased energy efficiency, improved safety and security, higher product quality, etc.But unfortunately, the current consumer IoT device landscape is still immature. For consumer IoT devices to thrive, device management capabilities need to evolve in a few ways.IoT device management is the process of authenticating, provisioning, configuring, monitoring and maintaining the device firmware and software that provides its functional capabilities. Effective device management is critical to establishing and maintaining the health, connectivity, and security of IoT devices. IoT application vendors typically provide comprehensive device management with their solutions. But all bets are off if that application vendor goes out of business and you would like to use your devices with a similar application from a different vendor. Consumers are increasingly faced with unexpected device obsolescence and landfills are starting to fill up with expensive IoT bricks. What consumer IoT needs is a truly Continue reading

New to the INE video library: CCIE Service Provider v4.1 Exam Review

Last week we added a new exam review course to correlate with the recent Service Provider v4.1 blueprint changes. All Access Pass members can view this exam review by logging into their streaming account. This course is also available for purchase at ine.com.

 

Why Take This Course?

This Course reflects the v4.1 blueprint changes and is the most up to date Service Provider exam review in INE’s video course library. This course provides an overview of blueprint changes, as well as the technologies candidates should know in order to pass their CCIE Service Provider exam.

About the Course

This course is taught by Brian McGahan and includes 27 hours on content. This course is intended for those in the final stages of their CCIE studies preparing to take the CCIE Service Provider Lab Exam. Prior to taking this course, viewers should have a foundational understanding of the blueprint technologies covered in this exam and a working knowledge of Cisco’s IOS interface.

What You’ll Learn

This course will refine your skills and expand your knowledge of the blueprint technologies. You will also learn to change the way you think about problems and how to derive solutions. Last, Continue reading