Episode 4 – The Impact Of Increasing Encrypted Traffic

In episode 4 the panel discusses the ever increasing pervasiveness of encrypted traffic on our networks and how that encrypted traffic impacts the services that we run today.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Katherine McNamara
Guest
Brandon Carroll
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 4 – The Impact Of Increasing Encrypted Traffic appeared first on Network Collective.

Episode 4 – The Impact Of Increasing Encrypted Traffic

In episode 4 the panel discusses the ever increasing pervasiveness of encrypted traffic on our networks and how that encrypted traffic impacts the services that we run today.

 

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


 

Katherine McNamara
Guest
Brandon Carroll
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

 

Audio Only Podcast Feed:

The post Episode 4 – The Impact Of Increasing Encrypted Traffic appeared first on Network Collective.

Escuela Nacional de Lambaré

Lambaré es una ciudad paraguaya ubicada en el Departamento Central, hoy es una de las ciudades metropolitanas más pobladas e importantes del Área Metropolitana de Asunción.

El Colegio Nacional de Lambaré (CNL), es la más importante institución educativa de la ciudad, contando con 1300 alumnos de nivel socio económico bajo y Medio-bajo comprendidos entre los 12 y 18 años de edad, desarrolla una tarea estratégica en la superación de las barreras sociales para las clases carenciadas.
El año 2015 algunas aulas del CNL se derrumbaron y varias más fueron demolidas por problemas estructurales en su construcción, entre ellas las destinadas al laboratorio de informática, uno punto de contacto de los jóvenes con la internet real libre y abierta. 

Ilda Simao

The AI fight is escalating: This is the IT giants’ next move

Artificial intelligence is where the competition is in IT, with Microsoft and Google both parading powerful, always-available AI tools for the enterprise at their respective developer conferences, Build and I/O, in May. It's not just about work: AI software can now play chess, go, and some retro video games better than any human -- and even drive a car better than many of us. These superhuman performances, albeit in narrow fields, are all possible thanks to the application of decades of AI research -- research that is increasingly, as at Build and I/O, making it out of the lab and into the real world.Meanwhile, the AI-powered voice technologies behind virtual assistants like Apple's Siri, Microsoft's Cortana, Amazon.com's Alexa and Samsung Electronics' Bixby may offer less-than-superhuman performance, but they also require vastly less power than a supercomputer to run. Businesses can dabble on the edges of these, for example developing Alexa "skills" that allow Amazon Echo owners to interact with a company without having to dial its call center, or jump right in, using the various cloud-based speech recognition and text-to-speech "-as-a-service" offerings to develop full-fledged automated call centers of their own.To read this article in full Continue reading

Use Your Networking Knowledge to Design Automation Solution

I’m getting plenty of emails from not-so-very-young networking engineers trying to make career transitions. I got this one from a CCIE in his mid-40s:

Would you think the SDN and Data Center paths would be suitable for a long standing engineer?

Absolutely. It's just networking, although it's sometimes disguised a bit.

This article was initially sent to my Network Automation mailing list.

Read more ...

BrandPost: How Close Are We To The Self-Driving WAN?

In my last few blogs I’ve talked about the journey from the Software Defined WAN to the Self-Driving WAN. Applying artificial intelligence and machine learning to the WAN might seem futuristic, but it’s already happening with our Unity EdgeConnect SD-WAN solution. A great example is our revolutionary First-packet iQ application classification technology which we announced at the end of March.Traditional Application ClassificationTo read this article in full or to leave a comment, please click here

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London. IoT Threat Defense combines seven separate offerings, including network-segmentation rule creator TrustSec, network behavior analytics platform Stealthwatch and device-visibility offering named Cisco Identity Service Engine. +MORE AT NETWORK WORLD: 8 Tips to secure IoT devices | IoT security guidance emerges +To read this article in full or to leave a comment, please click here

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London. IoT Threat Defense combines seven separate offerings, including network-segmentation rule creator TrustSec, network behavior analytics platform Stealthwatch and device-visibility offering named Cisco Identity Service Engine. +MORE AT NETWORK WORLD: 8 Tips to secure IoT devices | IoT security guidance emerges +To read this article in full or to leave a comment, please click here

The Last Itanium, At Long Last

In a world of survival of the fittest coupled with mutations, something always has to be the last of its kind. And so it is with the “Kittson” Itanium 9700 processors, which Intel quietly released earlier this month and which will mostly see action in the last of the Integrity line of midrange and high-end systems from Hewlett Packard Enterprise.

The Itanium line has a complex history, perhaps fitting for a computing architecture that was evolving from the 32-bit X86 architecture inside of Intel and that was taken in a much more experimental and bold direction when the aspiring server

The Last Itanium, At Long Last was written by Timothy Prickett Morgan at The Next Platform.

38% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter – Deal Alert

This USB 3.0 adapter from Inateck can interface with up to three drives simultaneously. It is compatible with 2.5"/3.5" IDE/SATA hard drives and 5.25" IDE/SATA CD/DVD drives, and features a one-touch backup function. Use it to read an old internal drive from a crashed computer, or to use an internal drive similar to an external backup drive. You might find a lot of uses for this one. The typical list price of $47.99 has been reduced on Amazon 38% right now to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Some Surprises in the 2018 DoE Budget for Supercomputing

The US Department of Energy fiscal year 2018 budget request is in. While it reflects much of what we might expect in pre-approval format in terms of forthcoming supercomputers in particular, there are some elements that strike us as noteworthy.

In the just-released 2018 FY budget request from Advanced Scientific Computing Research (ASCR), page eight of the document states that “The Argonne Leadership Computing Facility will operate Mira (at 10 petaflops) and Theta (at 8.5 petaflops) for existing users, while turning focus to site preparations for deployment of an exascale system of novel architecture.”

Notice anything missing in this description?

Some Surprises in the 2018 DoE Budget for Supercomputing was written by Nicole Hemsoth at The Next Platform.

Forget the plus-sized screen, the regular iPhone is the best fit

Like a lot of people, I found myself getting a sore neck and eyes from squinting at a smartphone screen for too long. It’s not that the iPhone 6 has a small screen relative to the market, it’s just that prolonged staring at the screen really isn’t a good idea to anyone but a chiropractor looking to boost his business. I had fiddled with the iPhone 6s Plus in the local Best Buy, and I liked what I saw. Also, it didn’t feel too cumbersome in my hand, so I decided to go for it. The iPhone 7 was out. The removal of the headphone jack was a deal-breaker for me. + Also on Network World: One-third of iPhones are the Plus model + I purchased a used iPhone 6 Plus through Glyde, which acts as an intermediary between buyers and sellers of devices like smartphones, tablets and laptops. Swapping phones was easy in my situation. I am with AT&T, which uses a SIM chip. All I had to do was pop the chip out of the old phone and insert it in the new one, and I had service. I restored the app and settings backup from Continue reading

IDG Contributor Network: SD-WANs lost my voice

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.The problem with voice We need to separate from the theory of voice and the reality of voice. The theory goes something like this. The Internet is fine for email and web browsing. It’s even pretty good for personal voice. But if I want to deliver a voice service, day-in-day out without a hiccup, then I run into a problem. Voice is a real-time protocol with strict tolerances around latency, loss and jitter. Exceed those tolerances and symptoms common to a poor voice service set in. Increased delays from traffic routing or lost packets disrupt voice calls. Outages and brownouts can cause calls to drop.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SD-WANs lost my voice

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.The problem with voice We need to separate from the theory of voice and the reality of voice. The theory goes something like this. The Internet is fine for email and web browsing. It’s even pretty good for personal voice. But if I want to deliver a voice service, day-in-day out without a hiccup, then I run into a problem. Voice is a real-time protocol with strict tolerances around latency, loss and jitter. Exceed those tolerances and symptoms common to a poor voice service set in. Increased delays from traffic routing or lost packets disrupt voice calls. Outages and brownouts can cause calls to drop.To read this article in full or to leave a comment, please click here

58% off RAVPower Portable Multi-Functional Power Bank with 9000mAh Built-in Apple Lightning Connector and AC Plug – Deal Alert

The RAVPower Savior 9000mAh portable charger has both a built built-in Apple Lightning Connector and a foldable two prong wall plug so you don't need to bring an extra cable to charge your Apple Device.  The additional USB output is 1A & Lightning output is 2.4A - this means you can have incredible charging speeds up to 3.4A To read this article in full or to leave a comment, please click here

IDG Contributor Network: Do you know where your data is?

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits of the latest and greatest technology, it’s often necessary to go beyond company walls and sign up with a vendor for new software or services.You may have spent considerable resources to ensure that your security is strong, but what about your third-party vendors? We’ve discussed how cybersecurity is only as strong the weakest link before, but sometimes that weak link is a partner.To read this article in full or to leave a comment, please click here