IGF-USA: Promoting a More Inclusive Internet

The IGF-USA took place in Washington D.C on July 24, 2017. During the event, the panel "Promoting a More Inclusive Internet" looked at current barriers to an inclusive Internet and explored how access could be expanded to underserved areas and to underrepresented communities. Moderated by Dr. Brandie Nonnecke, Research & Development Manager for CITRIS and the Banatao Institute at the University of California-Berkeley and Chair of the San Francisco-Bay Area Internet Society Chapter Working Group on Internet Governance, the panel brought together several experts on access provision, each with many years experience of connecting the unconnected in the USA and overseas.

Decentralized Approach

Susannah Gray

Ukraine Leaks Russian Social Media Ban

Another development in the long-running conflict between Ukraine and Russia occurred in May of this year when Ukrainian President Petro Poroshenko enacted a ban on Russia’s four most prominent internet companies in the name of national security.  The ban included the two most widely used social media websites, VKontakte (often referred to as the “Russian Facebook“) and Odnoklassniki (“Classmates” in Russian), as well as email service provider Mail.ru and Russian search engine Yandex.

These websites have such a significant Ukrainian user base that Mail.ru says it expects to lose $13 million this year as a result of the ban and Yandex is appealing the ban through Ukraine’s Supreme Administrative Court.

And now it appears that this ban has spilled out into the global routing table.  On 27 July 2017, Ukrainian ISP UARNet (AS3255) began announcing several new BGP routes that were hijacks of the IP address space of these Russian internet companies.  On this day, AS3255 briefly announced more-specific hijacks of each of these four Russian internet companies including 94.100.180.0/24 (Mail.ru), 87.250.250.0/23 (Yandex), 87.240.165.0/24 (Vkontakte) and 217.20.159.0/24 (Odnoklassniki).  While Continue reading

First In-Depth View of Wave Computing’s DPU Architecture, Systems

Propping up a successful silicon startup is no simple feat, but venture-backed Wave Computing has managed to hold its own in the small but critical AI training chip market–so far.

Seven years after its founding and the company’s early access program for beta machines based on its novel DPU manycore architecture is now open, which is prompting Wave to be more forthcoming about the system and chip architecture for deep learning-focused dataflow architecture.

Dr. Chris Nicol, Wave Computing CTO and lead architect of the Dataflow Processing Unit (DPU) admitted to the crowd at Hot Chips this week that maintaining funding

First In-Depth View of Wave Computing’s DPU Architecture, Systems was written by Nicole Hemsoth at The Next Platform.

Get ready for new storage technologies and media

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Get ready for new storage technologies and mediums

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Worth Reading: The changing UX of European Banking

How you see and interact with your online bank accounts is about to change. That’s because Europe is forcing change into the financial market.
Digital transformation is a thing this decade. “Digital disruption,” startups who want to be “the Uber of X” in their industry, and going “mobile first” are not new trends. But the banking industry has been slow to move with the times. —Michael Gardner @ Free Code Camp

The post Worth Reading: The changing UX of European Banking appeared first on rule 11 reader.

Announcing new DockerCon Europe tracks, sessions, speakers and website!

The DockerCon Europe website has a fresh look and new sessions added. The DockerCon Review Committee is still working through announcing final sessions in each breakout track, but below is an overview of the tracks and content you’ll find this year in Copenhagen. To view abstracts in more detail check out the Agenda Page.

In case you missed it, we have two summits happening on Thursday, October 19th. The Moby Summit, a hands-on collaborative event for advanced container users who are actively maintaining, contributing or generally interested in the design and development of the Moby Project and it’s components. The Enterprise Summit, a full day event for enterprise IT practitioners who want to learn how they can embrace the journey to hybrid IT and implement a new strategy to help fund their modernization efforts.

We have an excellent line up of speakers in store for you and are excited to share the agenda below. We hope that these sessions inspire you to register to DockerCon Europe.

Using Docker

Using Docker sessions are introductory sessions for Docker users, dev and ops alike. Filled with practical advice, learnings, and insight, these sessions will help you get started with Docker or Continue reading

Disaster Recovery with VMware NSX-V and Zerto

NSX-V Disaster Recovery with VMware NSX-V and Zerto Note, this is a reposting of the blog that I initially posted here on humairahmed.com. In a prior blog, VMware NSX and SRM: Disaster Recovery Overview and Demo, I described and demoed how VMware NSX and SRM with vSphere Replication combined provide for an enhanced disaster recovery (DR) solution. SRM... Read more →

Episode 10 – Grassroots Automation

In episode 10 we look at how to take the first steps towards automating your network. What tools should you use? Should you learn a programming language? And if so, which one? Should you buy or build your automation? Do you need to become a full fledged programmer in addition to being a network engineer? Our excellent panel of guests addresses all of the above and more!

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Kirk Byers
Guest
Ken Celenza
Guest
Ryan Booth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 10 – Grassroots Automation appeared first on Network Collective.