14 Burst results for "Sdn Central"

"sdn central" Discussed on 7 Layers

7 Layers

04:00 min | 10 months ago

"sdn central" Discussed on 7 Layers

"To the exploding amount of smart devices around us. I'm your host. Connor craven associate editor 's central before we dive in. I'd like to remind you to subscribe to seven layer so you never miss an episode example. Next week we are going to have our first ever expert panel. The panelists are steve alexander chief technology officer in senior vice president at sienna. Bill gartner senior vice president and general manager of optical systems at the optical group at cisco in robert shore senior vice president of marketing. At infant era. I am so excited for you to hear this panel. It went very well in my opinion. And as always if you want to learn more about the current state of technology you can head on over to sdn central dot com today. I'm going to cover optical networks as you may have guessed from the titles in companies of some of the panelists for next week these networks use glass fibers to send data as light over various distances. A most famously. Over very long distances such as across oceans the way optical networks transmit information is by modulating the light when it is sent in variations in the measurements of the light. When it is received depending on the variations the light can be interpreted as various combinations of ones and zeros. I'll get into that more. When i talked about coherent optics. Multiple streams of data can be sent over an optical fiber by using different wavelengths literally the colors of light in this episode we will cover what optical networking is optical use cases and the benefits and challenges the infrastructure of optical networks consist of cables transceivers multiplex irs amplifiers in certain cases repeaters. Optical cables are un's of fiber which is what the light travels through is similar to how copper wires work with electricity but made of course rounded by cladding the core is the innermost part of the fiber. It is typically made of class in his the medium that light passes through cladding is wrapped around the glass and keeps the light from escaping. It can be made of a variety of materials but usually is plastic or glass that is a different density from the core. Why is sent into the court angle. Forty two degrees or less. So that when the light hits the cladding after entering the glass. It is reflected in remains in the core. This is called total internal reflection. The light waves basically are bouncing back and forth hitting reflecting off the cladding as they transverse the fiber. Now the words the light waves are not traveling in a straight path down. The fiber transceivers are devices that can do both transmission and reception of signals. They receive electrical signals and turn them into the light that has sent over the fiber at the other end of the connection. Another transceiver detects light in terms of back until electrical signals for other devices to use and sends it over the last mile of transmission. Transceivers can be tuned to achieve different per wavelength line.

Connor craven steve alexander Bill gartner robert shore sienna cisco un
"sdn central" Discussed on 7 Layers

7 Layers

02:28 min | 1 year ago

"sdn central" Discussed on 7 Layers

"That you can find the link to the full. Pdf by checking out the transcript of this episode on sdn central dot com. Which you can find a link to in this episode summary on your podcast app or researching machine learning for this episode. I spoke with dave salvator senior manager of product marketing at invidia. He informed me about many of these use cases including financial fraud detection. He said quote. We have companies like pay pal in amex. Who are using. Ai for real time fraud detection. This is a better version of fraud protection. A smarter fraud protection that operates in real time and quote so remember machine. Learning is not interchangeable term with artificial intelligence machine learning is simply a tool that. Ai programs can use to while learn new information and improve its understanding of what had already knows. The benefits of a are also clear from detecting patient's brain cancer faster to making sure syria and you understand. Each other. however challenges are still present primarily the investment of time and money into developing a functional is considerable fine-tuning its functions and making sure the ground truth it has are no small taps. And then there's the computational demand in. ai requires but tony. Nineteen report from open. I showed quote since twenty. Twelve the amount of compute used in the largest ai training runs has been increasing exponentially with a three point four month doubling time since twenty twelve this metric has grown by more than three hundred thousand times end quote some context. The report also provided used. Moore's law as a benchmark. The law proposed a two year doubling period for how many transistors would fit on a single chip open. Ai says that would yield only a seven times increase in compute demands over the observed time period. Thanks for joining me. On this week's episode of seven layers. I've been your host connor craven associate editor at sti. Central falls seven layer. So you never miss an episode in tune into our next episode where i'll be interviewing brooke. Winnick machine learning practice league at data bricks and one more thing. Sds central on twitter. Give us a follow at..

"sdn central" Discussed on 7 Layers

7 Layers

05:31 min | 1 year ago

"sdn central" Discussed on 7 Layers

"Every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate editor at sdn central this week. We're continuing to look at software defined wide area networks. In just a moment you'll hear from pascal menezes. Cto of meth. If you haven't listened to our last upset honesty win. I highly recommend going back and giving it a listen before. Pascal and i began our conversation. I won't delay you any longer. Please sit back and enjoy my interview with pascal. Menezes of meth welcome listeners. I'm joined here today by pascal minez. Cto of match. Hello pascal how are you great. Honor thank you for having me. So what is your background in. Su and technology. What is it that makes you knowledgeable on this subject. Well you know my background goes back. Even way beyond the un. I mean i think involved in networking even the four even internetworking From the early eighties long long career bell very specific to question you know. Sdn microsoft when for saw this and this is about two thousand and ten. I would say in. It was very intriguing to see that you know the idea of overly under lease idea on the white area our see we already doing this hyper hyperspace data centers nets how you know how. The clouds hyper skills. Were doing it. They were putting in no hardware reliever three switches the underlay and then in the data centers just putting the land or nb gre overlays on top of it. So the idea that. Hey white couldn't do this on the white ear network and don't care about. The transport was very intriguing. But you know what they were doing it. For hyper scale is very different than why. St land needed this in. Why the way needed this. So so when. I saw this in two thousand twelve when i started studying seeing startups emergency area. I was thinking about this already. Two thousand ten actually In this area traffic steering over a wider network and multiple tunnels after to ryan the unruly. So so huge back on. Has i've been following this day..

Connor craven sdn central pascal menezes pascal minez Hello pascal Menezes Pascal pascal Su un microsoft ryan
"sdn central" Discussed on 7 Layers

7 Layers

04:14 min | 1 year ago

"sdn central" Discussed on 7 Layers

"I'll demonstrate this with some recent examples in the names in june. Twenty twenty hewlett packard enterprise or hp acquired silver peak for nine hundred twenty five million dollars to bolster. Hp's st win. Hp is taking advantage of aruba's st branch technology along with silver peak's st win in wayan optimization platforms according to cure team l. coattail aruba's founder and president of hp's intelligent edge division. The addition of silver integrates st win wired wireless routing functionalities into the aruba's branch solution together the enterprise networks edge can't connect directly to cloud and to private data center securely more about st branch check my educational articles on the topic on sdn central dot com a year later in june. Twenty twenty one fortinet partnered with four. Sdn managed service providers they are command link dna serene good networks in telecom italia these partnerships bring fort nets reach to a global scale. Each of these managed service providers will use fourteen. Sdn technology to serve their associated geographies. Jumping forward in time to last week. Cmc networks added the juniper networks sdn in missed platforms to its managed services portfolio. This increase the connection between cmc networks. And juniper because amc networks already uses one to eight technologies sdn tech and one to eight was acquired by juniper in twenty.

"sdn central" Discussed on 7 Layers

7 Layers

02:57 min | 1 year ago

"sdn central" Discussed on 7 Layers

"Hello and welcome to seven years. Where every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate editor at sdn central. This week we are continuing to look at it security in just a moment. You'll hear from justin tony pele. Ceo of wire wheel. If you haven't listened to our last episode zero trust security. I highly recommend going back and giving a lesson before justin. I began our conversation. I want to leave any longer. Please sit back and enjoy my interview with justin antoni pillay of wire wheel alright listeners. I'm joined today by the. Ceo of wire wheel. Justin tony pele. Hello justin how're you connor. Great to meet you and thanks for having me on today. Yeah so what is your experience with. It security what gives you a knowledgeable perspective connor. Thanks for having me on so wire. Wheel is a data privacy and data protection company and we help companies around the world comply with european laws like the european general data protection regulation or a growing number of data privacy laws here in the us. And you've probably seen connor the california law and the virginia privacy law I also served in the obama administration ultimately as the acting under secretary for economic affairs. So i ran the part of the government that includes the us census bureau and the bureau of economic analysis and connor. You can imagine how much time we spend in the administration thinking about it security for the census bureau which is one of the critical critical Parts of our government. I and i also had a lot of Stead a lot of time and helping the team as As the obama administration was releasing the nist cyber guidelines which you know have been kind of central control framework for it security so that's our background From the privacy side almost every privacy compliance law connor includes it security requirements and so Our platform often is leveraging or integrating with other it security platforms as well. Yeah it definitely seems like you have a storied past in. It security and definitely influenced fill..

justin Justin tony pele seven years justin tony pele This week today one justin antoni pillay Connor craven obama connor virginia privacy law sdn central law Wheel Stead european european general data protecti episode critical
"sdn central" Discussed on 7 Layers

7 Layers

07:07 min | 1 year ago

"sdn central" Discussed on 7 Layers

"With at outcome that have the cloud edge that networking asset of capabilities security set of capabilities that we can consume as a service. And that's really the second year the flexible consumption. And if there's anything that kobe has thought us is that we need to be ready. We need to be heard and east tomorrow morning. We need to see off. Two thousand employees to be able to work remotely from different areas areas across the world different areas across america or different geos. We need to be able to do that immediately in if we need to seen down because of some crunch you see in the market or an arjun heat were experiencing immunity to tighten the belt. We need to be able to do that as fall. Consuming connectivity secure connectivity as a service allows us to do debts finally a couple more points. I want to emphasize on earth. Sassy is really security in the fourteen coming together in itself in when we think about which vendor is right for us as a business. Those are the three points that i would urge everyone to look at networking. How do you connect to your obligation. What kind of visibility. You're having to us happening. In the internet's what kind of networking record in capabilities. You have in order to optimize and assure cutting tv secure as you ain't being if you can efficiently connecting optimize that connection you've role here on the security side. It's really easy to bolsa. Love bells and whistles in innovative features or on connectivity. if he doesn't have the security or weed ads you're suppose and we don't. We don't want that either ryan. So i would urge everyone now to be blinded by all the china features that may come from one side to the san that we're not really looking into third body. Secrecy deaths incompliance and everything that comes from the security side and then finally i would say we're talking about the cloud edge. We're talking about clinic. Dvd applications to is to are on offs and data centers. In the cloud matters your vendor needs to be cloud native iran or needs to support modern cloud architecture van or needs to have flow clinic. Dvd to all the defends providers for example how about testing the chronic dvd. Weeden outs your sassy provider to the locations to the Services officer sixty five is something that many or customers are really bending on for their business. Can your vendor improve on the bench in the last thing. And i really started with that so that that's a great he sued to end with. Sassy is a germ. we're early stage. In the process for the entire industry gartner idc any other analysts. Expect these markets really grow over. The next few years truth of the matter is that you shouldn't be forced or Into making decisions that you're not comfortable enemy to ensure that your vendor your partner is ready to support you. You can't go all the way to the cloud tomorrow morning. That's fine if you mean to spin out remote orders that's fine and then physical locations can follow if you have fifteen hundred gutter locations that you can just like data centers roffe through the cloud. This came the campbell. Says you can gradually get them through the crowd as also make sure that you understand that you're facing a junior that the partner that you're choosing has the right capabilities products and map because everything is changing right and road map in order to escort you in that journey do successful deployment office certainly thank you again for joining us today. Raviv are there any final thoughts you want to add. While seeing i've been really optionally following these the progression of security and the values that security brings over the last decade or so. Anything really interesting for me to see how we as an industry Who's on on -nology and how we can really drive security and then that the community was measured through secrecy and the only thing that mattered was how your security and elegance In how many threats he knew Against the commodity seal matter but now we efficacy on top of that. The next step in index chain was the simplicity because realized that if we we have deficiency that. We don't have simplicity than humans will get it wrong in. This is our us. This is just a human issue that we all face we've so we really have to have the technology efficacy and this implicitly but looking into tomorrow in the next couple of years whether really see that we're learning is that security needs to be art of something even bigger in needs to demonstrate immediate value to our customers. And that's really what stands at the core of sassy not just of course it simple declining. Dvd and the ability to optimize that connection in may the end users life easier and help them achieve their goals fashion about this is really where we're going in. This is really. What's guiding us now journey juicy here. It's well thank you again for joining us today and thank you to our audience. Sgx central for joining us for this sponsored interview. I've been your host craven associated studio editor. Sgx central follow seven layers. So you never miss an episode in as always you can learn more about the current state of technology over on sgx central dot com and one more thing sgx central's on twitter goes to follow at sdn central and give my page of hollow at the definer underscore dx. Please leave seven layers. A review on the podcast half of your choice to help us reach a wider audience and to see how we can improve. Thanks for joining us. And i look forward to our next episode..

america twitter today Raviv second year Two thousand employees tomorrow tomorrow morning fifteen hundred gutter last decade china fourteen sgx central dot com one side seven layers three points sgx central Sgx central earth third body
"sdn central" Discussed on 7 Layers

7 Layers

01:48 min | 1 year ago

"sdn central" Discussed on 7 Layers

"Follow seven layers so you never miss an episode in tune in to our next episode. Where i will interview cloud security expert. Tim jefferson of barracuda networks. And as always you can learn more about the current state of technology over on sdn central dot com the cloud environment offers enterprises competitive benefits like scale ability and agility the cloud security continues to remain a concern according to mcafee one in four enterprises using public clouds experienced data theft. A major concern with ninety seven percent of organizations worldwide. He's a cloud service to some extent with cloud adoption continually increasing. It is important. Cloud security is widely understood so enterprises can be protected in cloud. Security technologies can advance in this episode. We will cover cloud security fundamentals benefits in downsides of cloud scaredy supporting technologies cloud security use cases in current cloud market landscape and its future cloud computing has proven to be the future of enterprise networking in the covid. Nineteen pandemic proved significance to the enterprise. It landscape a gartner survey found seventy percent of enterprises accelerated clouded option because of covid nineteen. And we'll continue to do so karner predicts that this will drive. Eighteen point four percent growth in the public cloud services market in twenty twenty one enterprises operational ability. The security concerns remain atop reason for avoiding cloud adoption much like traditional networking security is critical to cloud networking however cloud security takes a different approach than traditional network. Security does that security is a set of policies controls mechanisms and technologies that work together to protect cloud systems. Data infrastructure cloud security is configured to abide by compliance requirements protect data inset authentication roles for.

"sdn central" Discussed on 7 Layers

7 Layers

07:47 min | 1 year ago

"sdn central" Discussed on 7 Layers

"Where every episode we look at a different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploding amounts art devices around us. I'm your host. Connor craven associate studios editor at sdn central this week. We are continuing to look at how the cloud has evolved since its inception in. Just a moment. You'll hear from dave larssen spirent general manager. If you haven't listened to her last episode on cloud volition. I highly recommend going back and giving it listen before david i get going on the topic. I want to let you any longer. Please sit back and enjoy my interview with dave larsen of spirit alright listeners. I'm here aspiring general manager. Dave larsen to talk about the evolution of the cloud. Hello dave how are you. Welcome to thank you. It's great to be here with you today. So could you tell listeners. Bid about yourself and explain why you are knowledgeable about how the cloud has grown and changed overtime. Sure i'd be happy to I've been industry been in the industry now for probably twenty seven years Started out focused on the advent of switched ethernet Which is the underpinning. He's technology that the cloud depends on But lately in my career. I have Spent a lot of time on cloud architecture. I'm the general manager at spier communications for our security solutions business unit which is focused on building technology for the test and measurement assurance of security capabilities whether they exist in the cloud or whether they're ensconced in a hardware appliance sits deployed in your environment. in the end you're not secured anyone point in the chain. You're not secure so we technology all of the above. I've been in this role for about six months. Previous to this role. I was in the office of the cto. Hewlett packard enterprise while i was responsible for strategy and vision for networking data security in cloud architecture for the company. So i've had a fair amount of access Both to partner chain of folks that are developing technology. That's consumed whether it's public or private or hybrid cloud or telco for that matter and i've been in a position of vision and strategy that has allowed me to see how the stuff has been evolving so a very much enjoy than looking forward on this conversation with you have. It's pretty far-reaching. And if listeners would like to learn more about security in it they can always check the back catalogue of a seven layers because we've touched on quite a bit and going off of your experience in the cloud. What technology has supported the cloud when it was beginning and just becoming widely used by private organizations really like this question connor because you know the cloud really evolved out. Nothing omar through to nist. Nick needs in terms of large entities like amazon. That had huge. It expenditures that they needed to monetize. So cloud really evolved off of the same exact technology than enterprises use circa ten or fifteen years ago so is using industry standard Technology industry standard. Our technology industry standard storage technology. One of the interesting things about that though is that over time if they became clear at scale the big public cloud operators need to run their businesses. The things needed to evolve and change. And so we've seen a lot of things in that environment that have adopted in move. Beyond what you would typically find in an enterprise. It's all based on the same technology in many respects Was based on the x eighty six processor but more more recently has been based on arm processor or really interesting inference engines for machine learning and artificial intelligence than vector processors or something that you might see from nvidia There's a whole host of technology. That's being leveraged. I think the thing that's interesting about the public cloud and the big cloud operators is what they vowed to do to accommodate the scale that they need to operate at high magin. As the cloud has grown it has been exponential somewhat. Similar to almost a hype cycle graph. Where i guess an adoption chart would be more appropriate early adopters early majority so on where does just ramp up and up and up and up. What have the bump spin in the road though as it goes up and up for the cloud as it has evolved expanded. Yeah this is this is a this is a really important question in it. It's a intersects with a lot of my own personal experience. The probably the most critical thing in getting people to move confidently to adopting cloud architecture. Model says been the evolution of the security landscape to support that in a way that allowed businesses to operate using the public cloud within their risk expectations their regulatory regime however they are whatever compliance initiatives they are required to adhere to and one of the main things. I touched on this earlier and one of the comments that i made the real evolution had to do a scale but it had to do a scale in concert with operating an environment with multiple tenants. You know we talk about multi tenant capabilities of various infrastructure components of the it domain. But the cloud has had to do this in a way that was entirely at a different scale and it wasn't just cloud operators per se. It was anybody in the hyperscale realm so that could include an uber or twitter or an apple or other large-scale entities that are providing services content capabilities to millions of entities. And that problem was something that the enterprise regime was beginning to look at in terms of thinking of individual operational silos of an enterprise as an individual tenant but he never had to do it at the scale of millions of such entities and the cloud has quite successfully over the last decade plus been able to deliver an operating model that allows you to operate reliably and securely in a co located environment. Where you when you go into the public cloud. And he reserved instance. You don't always reserve an instance that is specifically hardware. That's dedicated to you. You might be sharing that instance competitor without even knowing it but the isolation that has been Imbued injured that architecture by the cloud developers themselves as allow to reliably operate knowing that the workloads that were running on that instance have been isolated and they are only operational for us And they are exposed to the internet to some degree. The fernande of many of the applications that runs on the cloud is exposed in the security domain near that allows access privileges to that. But the rest of the back. in cloud architectures are well isolated. Vp context That allows someone.

Dave larsen amazon twitter apple uber dave dave larsen david twenty seven years Nick Both millions nvidia today this week about six months fifteen years ago Connor craven One x eighty six
"sdn central" Discussed on 7 Layers

7 Layers

04:34 min | 1 year ago

"sdn central" Discussed on 7 Layers

"So you never miss an episode in tune into our next episode where we will talk things sassy with an industry expert and as always you can learn more about the current state of technology over an sds central dot com. Today we were talking about sassy. No not being sassy but s. a. s. e. which stands for secure access service edge. I promise to hold back on the sassy wordplay in this episode. But i do encourage you to read the news article. What's so sassy about sassy by tobias man on sdn central's website in this episode. We'll look at what makes sassy so sassy but we will also cover what it is key components of sassy industry standardisation sassy offering options remote work shift industry growth in the future of sassy part one sassy basics gartner coined the term. Sassy in the twenty nineteen hype cycle cloud security report deemed the future of network insecurity functions at the time sassy was just an emerging technology and there was barely a sassy product on the market. Uh sassy.

"sdn central" Discussed on 7 Layers

7 Layers

02:08 min | 1 year ago

"sdn central" Discussed on 7 Layers

"What is reportedly the largest medical ransomware attack to date and tyler technologies a company that provides the us public sector with software was hit with a cyber attack the week of september twenty first twenty twenty but the biggest data breach of twenty twenty was the solar wind software update in mid december fire. I reported that nation state hackers breached its network and targeted. It's government customers multiple news outlets blame russian government. Hackers referred to as a p. t. twenty nine or cozy bear for the breach which hit more than four hundred and twenty-five of the fortune five hundred all five branches of the us military the pentagon national security agency state department office of the president of the us departments and what appears to be about eighteen thousand microsoft customers now. A quick word from our sponsor part to covid nineteen in network virtualization. It's impossible to talk about tony. Twenty without diving into the implications of the covid nineteen pandemic the pandemic prompted a mass migration to remote work turn the landscape of network functions insecurity shifted because of this shift many of the most viewed articles on sdn central where related to topics surrounding virtualization before jumping into some of the top technology solutions that made waves in the virtualization space. Let's take a look at what exactly virtualization is. Virtualization is the use of software Abstraction layer over computer hardware this allows the hardware elements of a single computer to be divided into multiple virtual computers referred to his virtual machines. Or vm's this allows for more efficient use of hardware. It is a common process. Nowadays and it is at the core of cloud computing software defined wide area network or sdn architecture is a common approach to virtualization and was one of the most read about topics. Sgx central and twenty twenty. Sdn is a network. That is abstracted from its hardware rating virtual overlay. That creates a network that can span large geographical distances. Sdn is typical use to connect several branches to a central hub or to connect multiple locations in large settings such as a college campus..

tyler technologies pentagon national security age us tony microsoft
"sdn central" Discussed on 7 Layers

7 Layers

03:06 min | 1 year ago

"sdn central" Discussed on 7 Layers

"Another one <Speech_Female> as well and i <Speech_Female> was really surprised <Speech_Female> at how <Speech_Female> much the public <Speech_Female> seemed <Speech_Female> to dislike <Speech_Female> and not <Speech_Female> trust mail <Speech_Female> in ballots from <Speech_Female> some of <Speech_Female> those kind of recent <Speech_Female> post twenty twenty <Speech_Female> <SpeakerChange> plus <Speech_Female> november surveys. <Speech_Male> You know <Speech_Male> it seems <Speech_Male> wall. There is an argument <Speech_Male> for accessibility <Speech_Male> and <Speech_Male> maintaining enfranchisement. <Speech_Male> <Speech_Male> There <Speech_Male> are still people that <Speech_Male> distrust something <Speech_Male> that <Speech_Male> puts <Speech_Male> a almost <Speech_Male> visual <Speech_Male> barrier between <Speech_Male> them and <Speech_Male> as you <Speech_Male> described in <Speech_Male> central new york <Speech_Male> as <Speech_Male> physically seeing <Speech_Male> their vote <Speech_Male> counted. <Speech_Male> <Speech_Male> Is there anything <Speech_Male> else you think needs <Speech_Male> to be said <Speech_Male> <hes> about elections <Speech_Male> security. That <Speech_Male> may not be talked <Speech_Male> about enough. We certainly <Speech_Male> covered some <Speech_Male> of that with how <Speech_Male> the media <Speech_Male> is covering the <Speech_Male> security of the election. <Speech_Male> Potentially <Speech_Male> looking <Speech_Male> more at hacking <Speech_Male> and not so much <Speech_Male> at the more <Speech_Male> <Speech_Male> subtle forms <Speech_Male> of attacks <Speech_Male> you know what <Speech_Male> are people <Speech_Male> talking <Speech_Male> about her. <SpeakerChange> What are they not <Speech_Female> aware of. <Speech_Female> Think the <Speech_Female> two most helpful <Speech_Female> things that <Speech_Female> your <Speech_Female> your audience <Speech_Female> my and <Speech_Female> then the public in general <Speech_Female> might take away from <Speech_Female> our discussion <Speech_Female> is one <Speech_Female> that when <Speech_Female> we think about election <Speech_Female> security <Speech_Female> and <Speech_Female> even election interference <Speech_Female> we have to broaden <Speech_Female> the aperture <Speech_Female> to think about. <Speech_Female> Multiple <Speech_Female> lines <Speech_Female> are multiple. Actors <Speech_Female> <Advertisement> are multiple <Speech_Female> <Advertisement> factors <Speech_Female> <Advertisement> of interference. <Speech_Female> Yes therefore <Speech_Female> an interference that <Speech_Female> you know the the fbi <Speech_Female> in others <Speech_Female> you know the intelligence <Speech_Female> communities kind of cover <Speech_Female> <hes> but there's <Speech_Female> also influence <Speech_Female> operations <Speech_Female> that are coming from various <Speech_Female> <Speech_Female> Different agents <Speech_Female> with different motives <Speech_Female> and agenda <Speech_Female> so it might be <Speech_Female> that you know <Speech_Female> we talked about social <Speech_Female> media and the way in <Speech_Female> which social media <Speech_Female> companies <Speech_Female> <Silence> seem to have <Speech_Female> <Speech_Female> a preference. <Speech_Female> They were <Speech_Female> Had a preference <Speech_Female> for certain candidates <Speech_Female> over other <Speech_Female> candidates. I <Speech_Female> think that was more obvious <Speech_Female> in the national <Speech_Female> elections. There was a lot <Speech_Female> of anti trumpism <Speech_Female> coming <Speech_Female> from the you know <Speech_Male> from some of the big social <Speech_Male> media companies <Speech_Female> but i think <Speech_Female> in smaller <Speech_Female> elections. <Speech_Female> It might be harder <Speech_Female> for folks <Speech_Female> to identify <Speech_Female> that <Speech_Female> you know some of these private <Speech_Female> sector actors <Speech_Female> who have a strong <Speech_Female> role <Speech_Female> in the <Speech_Female> in the public <Speech_Female> square right in the <Speech_Female> public. Discourse <Speech_Female> could actually <Speech_Female> have their finger <Speech_Female> on the scale for one <Speech_Female> candidate or another <Speech_Female> so. That's kind <Speech_Female> of <Speech_Female> election influence <Speech_Female> our <Speech_Female> election interference <Speech_Female> that we're not used to thinking <Speech_Male> about <SpeakerChange> but it's <Speech_Music_Male> it's live <Silence> <Speech_Male> Really <Speech_Male> is all the time <Speech_Male> we have together. <Speech_Male> <hes> <Speech_Male> dr zoe. <Speech_Male> So i just want to thank <Speech_Male> you for coming <Speech_Male> on <SpeakerChange> and <Speech_Male> having this terrific <Silence> discussion <Speech_Male> <SpeakerChange> anytime. <Speech_Male> <Silence> Thank you very much. <Speech_Male> Subscribe <Speech_Male> to seven layers so you never <Speech_Male> miss an episode and <Speech_Male> tune into our episode <Speech_Male> where we will give <Speech_Male> you a retrospective <Speech_Male> on twenty twenty s technological <Silence> innovations <Speech_Male> <Speech_Male> and as always you can <Speech_Male> learn more about the current state <Speech_Male> of technology. <Speech_Male> Sds central <Speech_Male> dot com. <Speech_Male> I've been your host. Connor <Speech_Male> craven associate <Speech_Male> studios editor <Speech_Male> at sdn central. I'm really looking forward to the next episode. And i hope you are too.

new york fbi dr zoe Connor
"sdn central" Discussed on 7 Layers

7 Layers

05:12 min | 1 year ago

"sdn central" Discussed on 7 Layers

"We look at different aspects of technology from literal wires in the ground to switches and routers and all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate studio editor at sdn central this week. We are continuing to look at ransomware. In just a moment you will hear from jim. Bowers security architect in the tech gurus team at technology brokerage inc or tbi. Please no on occasion. I refer to tbi as ti research. This was set an error the tpi. Jim bowers works at is not the same organization as be research if fact if you search for tv. I research you'll probably find research papers on traumatic brain injuries and not the latest on technology solutions. If you haven't listened to our last episode on ransomware yet. I recommend you give it a listen. It's a welcome refresher on this type of malware. The short version is attackers gain access to files. They encrypt them in demand. Money before decrypt the files while they'll decrease the house if you're lucky i won't hold you any longer. Please enjoy my interview with security architect. Jim bowers of tbi hello audience. We are here with jim. Bowers of research. Welcome jim i appreciate you taking the time to chat about ransomware today. Can you tell the audience a little bit about your background and your role at ti. Yeah it'd be glad to do so My background over. The past twenty five years really started in networking for the first half. I are protected. Low latency distribution in architecture for financial trading and voice and video As threat actors starting to all the attack started to get better kinda jump into security. And that's when i worked with diaz. Mitigation helps us several carriers. Us mitigation cloud based products. And then kind of shifted more into Helping manage stock offerings rolled out several companies as well as lookit security assessments for companies tv. I really glad to be here. are of their tech guru group and that's a group of kennard engineers. That helps all of our partners kind of do that. Consultative approach Whether it's insecurity on the cybersecurity architects Or cloud or all things of voice Voice related so we really enable our our partners. Have that deeper discussion. Yeah it seems like you're Maybe a jack of all trades or You'll have a fingers a lot of pies so within all of that Where have you learned the most about ransomware and you know..

Jim bowers Connor craven Bowers jim lookit diaz kennard Us
"sdn central" Discussed on 7 Layers

7 Layers

05:10 min | 2 years ago

"sdn central" Discussed on 7 Layers

"Welcome back in the second section. I'll will be going over a few examples of Iot security events where devices were compromised and used for large scale attacks. I, I'm going to look at fax machines which these days mostly exists in all in one printers, such printers can be found in people's homes as well as corporate offices connected to networks, be Ethernet Wifi Bluetooth and other interfaces. Fax Machines are also connected to a telephone network via wired connection. Research and experiments conducted by check point software technologies showed that in an attacker armed with phone line, and the targets fax number could gain control over the all in one printer impossibly infiltrate the rest of the printers network. All the hacker had to do was send a militias facts. Essentially, what checkpoint did was discovered. If an attacker sent a colorful facts, the target printer takes that information and creates a j peg filed without checking for anything harmful. The malware can be stored inside the document. Document file and through a file base loader checkpoint wrote. The malware is loaded into the memory. Then the experimenters used both eternal blue in double pulsar exploits to spread them our throughout the local network, while this is an example of an attack that occurred in the real world in cost organizations, millions of dollars. It is a good proof of concept for how seemingly innocuous devices can be used against you even devices. You might not have remembered you had to worry about for falling to. Research head to the transcript of this episode on Sdn Central Dot Com another example of vulnerable Iot. Devices comes from the medical IOT world, the Saint Jude Medical implantable cardiac device came with the Merlin at home transmitter, which sent data from the device to physicians. This transmitter had vulnerabilities however. Now before I go further. According to the FDA, there have been no reports of patient harm related to these vulnerabilities. Additionally, the FDA did not provide specifics on the vulnerabilities. These cardiac devices included pacemakers defibrillators in recent criminalization devices, all of which are used to keep hearts beating at the right pace. Patients may have a heartbeat that is too slow. Brady Cardia too fast. Techy cardia.

Iot FDA Brady Cardia Saint Jude Medical Research head
"sdn central" Discussed on 7 Layers

7 Layers

05:29 min | 2 years ago

"sdn central" Discussed on 7 Layers

"We explore a different layer of the technology that connects our world from the literal wires in the ground to switches and routers and all the way up to the exploiting amount of smart devices that surround us. I'm your host Connor Craven Studios Associate Editor at Sdn Central in our last episode. We gave the basics. What five G is and how it works. It is a complex multi-faceted and according to the Central Editor Matt Capco a considerably over hyped technology. This week is the second in a two part series of five G. Networks in this episode. We're going to answer the questions. What is the current satisified networks? What are some five use cases and Howard telecoms going to monetize five G. following that we are joined by the president of Five G. America's Chris Pearson to discuss the five G. Market and use cases? G America's is a five G. dedicated industry trade organization made up of telecommunication service providers and manufacturers is impossible to deploy a mature G. Network. All at once. Has He talked about in the previous episode. Five years really out in stages as such the five G. Deployment Status of every major telecommunications company Telekom is in constant flux across the globe telecoms are racing to build better five G. networks to play them fester improve out the modernization model in this section. I'm going to look at a few countries. Telecom sector leading the charge including China South Korea the United Kingdom Germany and the United States. While this is not a comprehensive list of every country in telecom developing five G. networks. It will give you a good overview of the global landscape and general state of deployments in trials and be sure to check the episode transcript for links to resources for those of you who really want to fall down the rabbit hole of five. G. Market landscapes as of this recording. Only one of these countries mentioned has auctioned off the high frequency millimeter wave spectrum. This is significant because the military spectrum is the frequency range newest five G. networks provides high in dense urban areas plans by the other countries in the list to do so in early twenty. Twenty it disrupted by the Cova. Nineteen pandemic which country has completed their action. Well you'll just have to listen to find out. Let's start with China. According to the Chinese state run news agency Shenhua. China launched the world's largest G. Network on October thirty first two thousand nineteen this is significant because according to analysts at the firm Jefferies as well as GSM a the number of people in China subscribe to five G. will grow from one hundred ten million to six hundred million between twenty twenty and twenty twenty five. That would equate to about forty percent of the entire global five market in twenty twenty-five the largest possible because the three largest Chinese network operators China Mobile China Unicom in China Telecom agreed to cooperate in building Vijay Infrastructure China Unicom and China. Telecom are also sharing bands of five G. frequency spectrum. Let's go a little deeper cooperation between the three on building infrastructure. Each of the telecoms were responsible for deploying. A portion of the total number base stations needed to hit the mark of the largest five-day network collectively three telecoms deployed almost eighty six thousand. Five G base stations as of November twenty nineteen. Because the three work together on this the time it took to have the largest network was reduced entering China into the five G. Race however as of this recording they have yet to utilize the high frequency millimeter wave spectrum. A key element of five G. networks. The rapid ramp-up of infrastructure was accomplished despite the efforts to hamper China's spivey progress from the United States and other countries as Chris Nicholl a principal analysts that he g was quoted in an SEC. Central article quote any other time. I would say that this effort in China is really pushing the five G. development forward globally but with the Chinese vendors being hampered in the global market Nokia Ericsson. Samsung are buffered in the United States against Y and Z. T he added. I'm still hearing reports. That hallway is about a year ahead of the other vendors in key areas such as massive multiple input multiple output antennas in radio performance. But the are behind on V. Ran. So you need to pick your position on leadership and quote. China may have the largest five G. Network South Korea may have the most advance according to a December twenty nineteen report from open signal the network performance of both escape telecoms in Korea Telecom's five networks surpassed five G. networks in nearly all other countries for example escaped telecom at the time of the open signal report had download speeds of sixty nine point eight megabits per second L. G. You plus and Korea Telecom the other telecoms reviewed had download speeds of forty eight point one and forty seven point three megabits per second respectively. Moreover both providers have portions of their networks. That are on five G. standalone infrastructure. In case you've forgotten from last episode of five Stanley Infrastructure is one that does not rely on four G. Network infrastructure. All of this is being done without millimeter wave frequencies as they have not been auctioned off by the South Korean government beyond the technical aspects. South Korea also lease land market adoption. South Korean customers have been buying five network services more than any other country according to research from IHS Market Publishing September. Twenty nineteen stores could not keep five G. capable devices in stock in South Korea additionally. Ihs Market reported that it only took sixty nine days for South Korea's five G. providers to reach one million five G. subscribers citing the greater variety of phones leading to a more rapid growth of the five G. market between nineteen reports summary South Korea's.

China telecoms South Korea G. Networks G. Market China Mobile China Unicom United States Vijay Infrastructure China Uni Korea Telecom China Telecom IHS Market Howard telecoms G. networks Stanley Infrastructure Connor Craven Studios G. Network Five G. America Matt Capco Editor Sdn Central