In the final video in his Cisco SD-WAN webinar, David Penaloza discusses site ID assignments and policy processing order.
A carefully planned site scheme and ordered list of policy entries will save you complications and headaches when deploying the SD-WAN solution.
In the final video in his Cisco SD-WAN webinar, David Penaloza discusses site ID assignments and policy processing order.
A carefully planned site scheme and ordered list of policy entries will save you complications and headaches when deploying the SD-WAN solution.
In this week's IPv6 Buzz podcast, Ed, Scott, and Tom discuss the 9th anniversary of World IPv6 Launch (and the 10th anniversary of World IPv6 Day) with Cisco alumnus and IPv6 expert (and IPv6 Buzz's first guest!) Tim Martin.
The post IPv6 Buzz 077: Revisiting World IPv6 Launch With Tim Martin appeared first on Packet Pushers.
The Kenya Education Network (KENET) supports communities that build Internet infrastructure in Kenya. For nearly a decade, KENET has been working with the Internet Society to grow capacity of higher education campuses, Technical and Vocational Education and Training (TVET) institutions, and young engineers. They peer at the Kenya Internet Exchange Point, and they’ve also been […]
The post Spotlight on the Kenya Education Network, an Africa Peering Community Champion appeared first on Internet Society.
To prevent cheating in exams many countries restrict or even shut down Internet access during critical exam hours. For most of June Syria is having planned Internet shutdowns during critical exam periods. The exam schedule is as follows:
I’m grateful to a Twitter user for the translation from the original Arabic and collating the data.
Cloudflare Radar allows anyone to track Internet traffic patterns around the world, and it has country-specific pages. The chart for the last seven days of Internet use in Syria as seen by Cloudflare shows two drops to almost zero corresponding to the first two exams on the schedule.
The Internet outage starts at around 0100 UTC (0400 local time) and ends about four and a half hours later at 0530 UTC (0830 UTC). This covers the period before the exams start apparently to prevent any figuring out the answers.
If you want to follow the other outages for the remaining seven exams you can see live data on the Cloudflare Radar Syria page.
Contributors: Subrat Sarkar (T-Rex), Jason Zhang (NSBU TAU)
Agent Tesla is a remote access tool (RAT) that is known for stealing credentials from several applications, including web browsers, VPN clients, and mail and FTP applications. It also supports keylogging, screen grabbing, and other functionality. Since it first came on to the scene in 2014, Agent Tesla has evolved into a fully customizable commercial malware tool, which is readily available on underground markets. Given the huge popularity of the malware, this threat has been thoroughly covered by the threat intelligence community, including our analysis in 2018 [1], our reports on COVID-19 related cyber threats [2] [3], and a recent article describing a surge of infections [4]. More recently, we detected a new wave of Agent Tesla attacks that exhibited some interesting characteristics, such as requesting a connection to top European football club websites.
In this blog post, we first present some of VMware’s NSX Advanced Threat Prevention telemetry and email metadata from the attack. We then provide our analysis detailing the most distinctive aspects of the attack, from the use of well-known European football club websites to key tactics, techniques, and procedures (TTPs).
Figure 1 shows Continue reading
TCP and QUIC are the two primary transport protocols in use on the Internet today—QUIC carries a large part of the HTTP traffic that makes the web work, while TCP carries most everything else that expects reliability. Why can’t we apply the lessons from QUIC to TCP so we can merge these two protocols, unifying Internet transport? TCPLS is just such an attempt at merging the most widely used reliable transport protocols.
According to the global IXP Database, as of January 2021, of the 630 registered Internet Exchange Points (IXPs), 229 are in Europe, 126 in North America, 140 in Asia-Pacific, 96 in Latin America and the Caribbean (LAC), and 39 in Africa. Although the LAC region is second-last on the list, there has been a strong […]
The post Four New IXPs Take off in Central America and the Caribbean appeared first on Internet Society.
What is a legacy data management and data analytics platform with 1,800 large enterprise customers worth? …
Why Cloudera Might Be Worth $5.3 Billion After All was written by Timothy Prickett Morgan at The Next Platform.
Back in its earliest days, hyperconverged infrastructure was seen primarily as a consolidation play, a way to bring together compute, storage, networking and management together into a single package and offset some of the rising costs and complexities in enterprise datacenters. …
Separating Compute And Storage In Hyperconverged Infrastructure was written by Jeffrey Burt at The Next Platform.
Nearly 80,000 participants registered for DockerCon Live 2021! There were fantastic keynotes, compelling sessions, thousands of interactions and everything in-between that a developer and development teams need to help solve their day-to-day application development challenges.
In all that excitement, you might have missed the new innovations that Docker announced to make it easier for developers to build, share and run your applications from code to cloud. These enhancements are a result of Docker’s continued investment and commitment to make sure developers have the best experience possible while making app development more efficient and secure.
Application security is directly tied to the software supply chain. Developers are realizing the importance of integrating security as early as possible in the development process. They must now consider the security directives of their organization and associated compliance rules while also enabling their teams to work in the most secure, efficient way possible.
These new product enhancements bolster security in a number of dimensions including scanning for vulnerabilities during different development stages and increasing team security by offering tools such as audit logs and scoped access tokens.
Take a look at what we announced:
Verified Publisher Program
Docker launched the Docker Verified Publisher program Continue reading
Docker Inc. started like many startups with engineers working from a single location. For us, this was in the Bay Area in the US. We were very office-centric, so the natural way to increase diversity and to get engineers from different cultures to work together was to open new offices in diverse locations. Right from the start, our goal was to mix American and European ways of producing software, giving us the best of both cultures.
In 2015, Docker started to open offices in Europe, starting with Cambridge in the United Kingdom and followed by Paris in France. With these two locations, the long road to gaining experience working with remote employees began.
Having multiple offices scattered around the world is different from being fully remote. But you still start experiencing some of the challenges of not having everybody in the same location simultaneously. We spent a great deal of our time on planes or trains visiting each other.
Despite the robust open-source culture of the company, which shows that you can build great software while not having everybody in the same room, we still had a very office-centric culture. A lot of the Continue reading
When I wrote about my sample OSPF+BGP hands-on lab on LinkedIn, someone couldn’t resist asking:
I’m still wondering why people use two routing protocols and do not have clean redistribution points or tunnels.
Ignoring for the moment the fact that he missed the point of the blog post (completely), the idea of “using tunnels or redistribution points instead of two routing protocols” hints at the potential applicability of RFC 1925 rule 4.
When I wrote about my sample katacoda hands-on lab on LinkedIn (mentioning how easy it is to set up an OSPF+BGP network), someone couldn’t resist asking:
I’m still wondering why people use two routing protocols and do not have clean redistribution points or tunnels.
Ignoring for the moment the fact that he missed the point of the blog post (completely), the idea of “using tunnels or redistribution points instead of two routing protocols” hints at the potential applicability of RFC 1925 rule 4.
The so-called “Magnificent 7” or “Super 8” hyperscalers and cloud builders of the world may comprise a substantial slice of worldwide sales of servers, storage, and networking, and the cloud capacity and hyperscale services they provide may in turn represent a significant – but nowhere near dominant – chunk of overall IT spending. …
A Tale Of Two Enterprise IT Beasties was written by Timothy Prickett Morgan at The Next Platform.