14 Burst results for "Sds Central"

"sds central" Discussed on 7 Layers

7 Layers

02:28 min | 9 months ago

"sds central" Discussed on 7 Layers

"That you can find the link to the full. Pdf by checking out the transcript of this episode on sdn central dot com. Which you can find a link to in this episode summary on your podcast app or researching machine learning for this episode. I spoke with dave salvator senior manager of product marketing at invidia. He informed me about many of these use cases including financial fraud detection. He said quote. We have companies like pay pal in amex. Who are using. Ai for real time fraud detection. This is a better version of fraud protection. A smarter fraud protection that operates in real time and quote so remember machine. Learning is not interchangeable term with artificial intelligence machine learning is simply a tool that. Ai programs can use to while learn new information and improve its understanding of what had already knows. The benefits of a are also clear from detecting patient's brain cancer faster to making sure syria and you understand. Each other. however challenges are still present primarily the investment of time and money into developing a functional is considerable fine-tuning its functions and making sure the ground truth it has are no small taps. And then there's the computational demand in. ai requires but tony. Nineteen report from open. I showed quote since twenty. Twelve the amount of compute used in the largest ai training runs has been increasing exponentially with a three point four month doubling time since twenty twelve this metric has grown by more than three hundred thousand times end quote some context. The report also provided used. Moore's law as a benchmark. The law proposed a two year doubling period for how many transistors would fit on a single chip open. Ai says that would yield only a seven times increase in compute demands over the observed time period. Thanks for joining me. On this week's episode of seven layers. I've been your host connor craven associate editor at sti. Central falls seven layer. So you never miss an episode in tune into our next episode where i'll be interviewing brooke. Winnick machine learning practice league at data bricks and one more thing. Sds central on twitter. Give us a follow at..

"sds central" Discussed on 7 Layers

7 Layers

02:57 min | 11 months ago

"sds central" Discussed on 7 Layers

"Around us. Remember to subscribe Me never miss an episode in tune in tax code. Were i'll be interviewing justin and tony pele in as always you can learn more about the current technology over an sds central dot com today. I'm going to be covering zero. Trust security philosophy and principles organizations can use your principles to secure any. It environment a win the ongoing pandemic forced to large-scale shift to remote work zero trust became helpful in securing networks with more distributed and points even now as some of us return to the office in a hybrid model. Zero trust is proving useful. Why because there is no longer a network parameter that all employees work within and without that perimeter new security approaches are necessary. Zero trust focuses on protecting resources rather than locations have views all users and devices as potential security threats. The idea is never trust. Always verify basically administrators. Amer system should never let anything do or otherwise access organizations devices applications network data or other resources without verifying that the source of the access request is legitimate or there's malicious intent zero trust framework.

"sds central" Discussed on 7 Layers

7 Layers

03:58 min | 1 year ago

"sds central" Discussed on 7 Layers

"The recent advancements in five g and take a look at the future of the technology in today's episode al cover. The five g ran five g edge. Some top news stories including the impact of covid nineteen on five g. The current market landscape in the future five g g rans or by radio access networks are getting traction as five g becomes more and more prevalent ran provides radio access to devices so they can connect to cellular networks via lt and now fifty. Five t ran is virtual allies networking technologies with more advanced capabilities than previous ran standards for an depth. Look at five g ran. Check out my five. G ran article over an sds. Central dot com..

"sds central" Discussed on 7 Layers

7 Layers

02:51 min | 1 year ago

"sds central" Discussed on 7 Layers

"And <Speech_Male> <Advertisement> <SpeakerChange> container <Speech_Male> security tool <Speech_Male> this tool <Speech_Male> adds continuous cloud <Speech_Male> security posture <Speech_Male> management to <Speech_Male> the cystic security <Speech_Male> devops platform <Speech_Male> for google <Speech_Male> cloud platform <Speech_Male> amazon web services. <Speech_Male> This <Speech_Male> new security tool <Speech_Male> is rooted in cloud <Speech_Male> custodian <Speech_Male> in open source tool <Speech_Male> for securing cloud <Speech_Male> infrastructures. <Speech_Male> Introducing cloud <Speech_Male> asset discovery <Speech_Male> cloud service <Speech_Male> posture management <Speech_Male> in compliance <Speech_Male> foundation <Speech_Male> a recent. Us <Speech_Male> supreme court ruling <Speech_Male> may have impact <Speech_Male> <Advertisement> on how us <Speech_Male> <Advertisement> law views the use <Speech_Male> of open source code <Speech_Male> in the future. <Speech_Male> The lawsuit <Speech_Male> filed by oracle <Speech_Male> examined. Google's <Speech_Male> use of java <Speech_Male> esi language <Speech_Male> in the android operating <Speech_Male> system. <SpeakerChange> <Speech_Male> The six to two <Speech_Male> ruling said <Speech_Male> google of eleven <Speech_Male> thousand five hundred <Speech_Male> lines of java <Speech_Male> s e was <Speech_Male> fair use further <Speech_Male> adding this code <Speech_Male> only made up <Speech_Male> point four percent <Speech_Male> of the entire java <Speech_Male> code base <Speech_Male> and was used to <Speech_Male> essentially create a new <Speech_Male> ecosystem. <Speech_Male> This ruling <Speech_Male> provides relief to organizations <Speech_Male> that rely <Speech_Male> heavily on open <Speech_Male> source code <Speech_Male> forced to research <Speech_Male> analysts at <Speech_Male> this decision takes <Speech_Male> some pressure off legal <Speech_Male> and compliance <Speech_Male> teams. The <Speech_Male> analyst team also <Speech_Male> noted that <Speech_Male> computer code <Speech_Male> of functional interest <Speech_Male> that serves the <Speech_Male> public's best interest <Speech_Male> unlike other <Speech_Male> copyright -able media <Speech_Male> allowing <Speech_Male> for the court to <Speech_Male> set fair use precedent <Speech_Male> for computer <Speech_Male> code. That is far <Speech_Male> more relaxed <Speech_Male> than other media. <Speech_Male> Some of the more <Speech_Male> cutting edge news <Speech_Male> coming out of the open <Speech_Male> source. Space is nasa <Speech_Male> use of <Speech_Male> force in the twenty twenty <Speech_Male> three viper <Speech_Male> volatile investigating <Speech_Male> polar exploration <Silence> rover <Speech_Male> mission <Speech_Male> open source is rarely <Speech_Male> discussed in reference <Speech_Male> to space missions <Speech_Male> as it takes an <Speech_Male> immense amount of complex <Speech_Male> resources to <Speech_Male> develop and launch <Speech_Male> mission resources <Speech_Male> <Advertisement> and complexity <Speech_Male> that open source <Speech_Male> software previously <Silence> wasn't associated <Speech_Male> with <Speech_Male> the successful use <Speech_Male> of open source <Speech_Male> nasa mission may <Speech_Male> drastically changed <Speech_Male> the way space industry <Speech_Male> develops <SpeakerChange> in <Speech_Male> operates robots <Silence> emissions. <Silence> <Speech_Male> Thanks for joining <Speech_Male> us on this week's <Speech_Male> episode of seven layers <Speech_Male> special <Speech_Male> thanks to sds central <Speech_Male> studios editor. <Speech_Male> <Advertisement> Ashley reasoner <Speech_Male> for writing our script <Speech_Male> <Advertisement> before you go. <Speech_Male> <Advertisement> Let's do a <Speech_Male> brief overview of what <Speech_Male> we discussed today. <Speech_Male> We talked about <Speech_Male> open source basics <Speech_Male> advantages <Speech_Male> and disadvantages <Speech_Male> of open source <Speech_Male> the origins <Speech_Male> <Advertisement> of open source <Speech_Male> in the current and <Speech_Male> future open <Silence> source market. <Speech_Male> I fit your <Speech_Male> host.

"sds central" Discussed on 7 Layers

7 Layers

07:40 min | 1 year ago

"sds central" Discussed on 7 Layers

"I'm here with juniper networks is bob dunne to talk about oversight regulations in the tech industry. Hello bipolar you. Good connor how are you. I'm doing well tell us a little bit about your history working with government and how it regulates the tech industry web connor i. I moved to virginia with my family about eighteen years ago. I know mentor of mine from nortel said. Can you come down here and help me figure out this federal thing as he put it and i fell in love with the federal market and its customers Since then i was in a bid for awhile. And then i worked exclusively with the intelligence community for nortel which was some of the most rewarding work i've ever i've ever done then. I tried my hand in small business. I went to a company called star which is based out of portland oregon again focused on the army and tactical solutions. Then i went to ericsson federal which was actually sold in in spun off and korea. We created the company called ozias which still exists today. And then i went back to pack star. I was ceo. They are for a little over four years. And now i'm With juniper and very proud to be vp of federal for juniper networks with regards to standards and regulations and how the oversight works with the tech industry. You know you have the usual names. Like the fcc in epa eeoc in other agencies like that but What many may not be familiar with our agencies. Gsa which is a general services administration and nist which is the national institution for standards and technology. Their mission is to enable innovation through standards and measurements. And then on top of that. Of course you have congressional oversight which pays attention to The industry and what tech companies put out whether it's a service Or hardware yeah. I'm a big fan of nist here at sgx. Because i used so much of their documentation to help. Inform my understanding of technology. When i'm writing my articles before we dive into specifics. How is the tech industry regulated Do the industry regulators and various governments. Have a tight grip or things still fairly lax. I guess it depends on which industry. You're talking about so when the part that i'm familiar with an obviously involved in right now as network equipment providers we provide solutions and we are heavily regulated when you look at the social media companies You know it's it's a new world and you've heard about the Congressional meetings and some of the scrutiny twitter and facebook and others are under. And i think they're just trying to figure out now how best to regulate them do you Put a lot of standards in place like we have today through all the certifications we go through the federal government It remains to be seen with the latest Hack that occurred. A lot of people are concerned about cybersecurity as they should be. And i think there's going to be more regulation in that area as well. yeah maybe rightfully so. What are some of the significant government or industry regulations that organizations are still complying with. Well again you know nist is is very important to juniper and we go through the steps internally and then we put forward our solutions to nist and other agencies there's an organization called the gic which is joint interoperability interoperability tests center. We put a lot of our solutions through that process and then are certifications like a fed ramp when you're talking about the cloud phipps. has strong criteria that that Have to be met and other certifications going on down the line. So you think about. Americans with disabilities act which is section five away if to be compliant with that and the list is pretty long but When you select the market that you want to go after and provide secure solutions it's necessary. It's a requirement so that will continue. And i think those companies that comply with the standards and regulations really benefit from the outcomes because it makes their solution stronger. And while there's a lot of company oversight internal oversight. I think having the checks and balances only make the company stronger. That's good to hear. It seems like there's more regulations than just on the tech itself like you mentioned About disabilities and it isn't important to remember that these organizations are just like any other in that they have the workplace regulations on top of the technological regulations Exactly however in general what does regulation of the tech industry look like in the united states. You know what aspects of the technology are most regulated while the first word that comes to mind is security so every aspect of what we delivered to our customers. has different levels of security. There's risk management framework. Put out by diet cap that must be followed and we do I mentioned the There are others that are put in place like nyack. The national information assurance partners And they focus on common criteria and then companies also put in the rigors into their supply chain so supply chain management is critically important because it starts really at the idea of a solution or a product or a service all the way down the chain to implementation at offering so especially with the bad actors that are trying to penetrate networks companies have to Maintain control and put in a security standards that are second to none and if you look at the best technology companies the most successful technology companies security is always top of mind and and i think it will be top of mind for a long time.

virginia sds central star ozias bob dunne korea juniper networks This week today eighteen years ago Connor craven portland bob pack connor ericsson over four years federal juniper nortel
"sds central" Discussed on 7 Layers

7 Layers

05:27 min | 1 year ago

"sds central" Discussed on 7 Layers

"We look at a different aspect of technology from literal wires in the ground to switches and routers in all the way up to the exploding amount of smart devices around us. I'm your host. Connor craven associate studios editor at sds central. This week are continuing our deep dive into oversight in regulations in the tech industry. In just a moment you'll hear from bob dunne vice president of global governments at juniper networks. If you haven't listened to our last episode on oversight in the tech industry. I highly recommend you go back and give it a listen before bob and i take a deep dive into the topic. I want delay any longer. Please sit back and enjoy my interview. With bob dunne of juniper networks. Alright listeners i'm here with juniper networks is bob dunne to talk about oversight regulations in the tech industry. Hello bipolar you. Good connor how are you. I'm doing well tell us a little bit about your history working with government and how it regulates the tech industry web connor i. I moved to virginia with my family about eighteen years ago. I know mentor of mine from nortel said. Can you come down here and help me figure out this federal thing as he put it and i fell in love with the federal market and its customers Since then i was in a bid for awhile. And then i worked exclusively with the intelligence community for nortel which was some of the most rewarding work i've ever i've ever done then. I tried my hand in small business. I went to a company called star which is based out of portland oregon again focused on the army and tactical solutions. Then i went to ericsson federal which was actually sold in in spun off and korea. We created the company called ozias which still exists today. And then i went back to pack star. I was ceo. They are for a little over four years. And now i'm With juniper and very proud to be vp of federal for juniper networks with regards to standards and regulations and how the oversight works with the tech industry. You know you have the usual names. Like the fcc in epa eeoc in other agencies like that but What many may not be familiar with our agencies. Gsa which is a general services administration and nist which is the national institution for standards and technology..

virginia sds central star ozias bob dunne korea juniper networks This week today eighteen years ago Connor craven portland bob pack connor ericsson over four years federal juniper nortel
"sds central" Discussed on 7 Layers

7 Layers

04:52 min | 1 year ago

"sds central" Discussed on 7 Layers

"We look at different technology that connects our world from literal wires in the ground to switches routers and all the way up to the exploding amount of smart devices around us. Remember subscribe to seven layer. So you never miss an episode. Intended to our next episode. Where i will interview bob dunne vice president of juniper networks global governments division in here about their experience with oversight in tech. And as always you can learn more about the current state of technology over an sds central dot com in today's episode. We're going to cover the evolution of tech oversight current data security tech regulations potential upcoming tech policies impact regulations on the tech industry the history of oversight in telecom and tech tech regulations in the news and recommended approaches regulations heart won the state house versus big tech from the new york times. The regulation of tech monopolies will decide the fate of western democracies from business insider in australia. Big tech divisions boil over from politico eu headlines. Just like these appear in our daily life is he's technology in various world. Governments are always in some battle framed as good versus evil. The conversation around tech regulation is now part of everyday life but up until recently. Regulations and technology rarely garnered attention must regulations introduced up until recently focused primarily on security and data. Protection is simply wasn't something that average people thought about previously. The goal regulations was to protect client data. Now the question being asked is should companies. Have all this data to begin with which then leads many to question how much power tech companies should have these questions. They're fallout in. Impending regulations will impact more than just the major tech companies. That are often highlighted in headlines. It will impact lobbying efforts. Enterprise spending security standards in industry acquisitions and mergers before we dive into where tech regulations currently stand. I want to take a look. At some of the foundational technology standards and regulations organizations in tech companies currently abide by at the core of many of these standards is data security for an depth look at data security. Check out the seven layers state of security episode from early december. The sock to security standard is a set of minimum requirements for the design sustainability ineffectiveness of security controls in operations pertaining to the data of organizations and their customers standard is wide reaching in the tech industry in.

australia bob dunne early december new york today juniper networks seven layers seven layer dot com
"sds central" Discussed on 7 Layers

7 Layers

02:44 min | 1 year ago

"sds central" Discussed on 7 Layers

"Penn sandow and other start ups like fungible that have been chasing this as well as big public developers like broadcom and melania knocks that are competing for the next wave of it evolution. For how do we build out a security regime in a distributed manner and of course. I mentioned them earlier. Vm-ware's moving very aggressively here as well. And and as a leader they are driving and leveraging their ability and their portfolio to provide highly standardized capabilities That will allow you to build out both containers. vm's in a very secure manner and then federate those things with the cloud. I guess the short the short point to make an all of this is a lot is changing very very rapidly. We feel like we've made a you know. We made huge strides in getting to public cloud. But i think we've only scratched the surface the kinds of technological changes that are coming for our audience. Our incredible and all of these companies and more are participating in it my only guidance to them in the self serving way is the only way. We're gonna know how this stuff works. We can measure it so we need to be able to focus on an open and vibrant community that is dedicated to building out certification and test methodologies that allow our enterprise customers are government entities service providers to make the best choices possible. Because in the end when we do that. We're all more secure and we have a much better business environment and a much better economy that we all try them. Yeah i imagine it would make a lot more accessible for more people to bring their own genius to. It is about time for us to wrap up. I'd like to thank you. They've arson for coming on seven layers and giving us your expertise like yukon are like to thank the audience for listening to me. I really enjoyed look forward to maybe doing this again. In the future. Yes that'd be wonderful so subscribed seven layers so you never miss an episode and as always you can learn more about the current state of technology over on sds central dot com. I've been your host. Connor craven associate studios editor 's central. I'm really looking forward to our next episode. And i hope you are too and one more thing as the central twitter give us a follow it at sgx central and give my page of hollow at the definer underscore s dx. Please leave seven layers. A review on the podcast app. Fear choice to help us reach a wider audience. Thanks for joining us. And i look forward to our next episode..

twitter seven layers both containers yukon broadcom one more thing Penn sandow Connor sds central dot com sgx central
"sds central" Discussed on 7 Layers

7 Layers

04:19 min | 1 year ago

"sds central" Discussed on 7 Layers

"We look at different aspect of technology from literal wires in the ground to switches and routers and all the way up to the exploded amount of smart devices around us. I'm your host. Connor craven associate studios editor at sds central this week. We are getting an experts perspective on secure access services edge in just a moment. You'll hear from paul kohler principal consultant at the silicon valley technology. Alliance if you have to our previous upset the covered. Sassy i suggest to give it a listen it will give you all the basic information acronyms. You'll need to know before jumping into this conversation. I won't hold you any longer. Please enjoy interviewed with paul kohler. Welcome listeners to my interview with principal consultant at the silicon valley technology alliance. Paul kohler we are here today to talk about the technology secure access services edge or sassy for short but before we begin. How are you today. paul Doing very well. Thanks conor could you tell the listeners. A bit about yourself and philipson on where your knowledge on security service edge comes from. Yeah sure sure so So i I worked at cisco three different stints. I've worked. vm-ware also vip tele St wind pioneer and then through of had various different held various different roles Tech support seo sales engineer systems engineer t emmy product manager technology alliance partnerships running partnerships and for the coach. Just over the past year. I've been an independent consultant. I focus on. Sdn and cloud security and network management strategy then that role. I kind of talked various. Different contacts. That i've made the is These various different companies and try and keep on top of old various trends yet your focus on sdn networking security. That all seems to tie pretty well together to make what most people define sassy Speaking speaking of how people define sassy garner defined the technology in twenty nineteen but that definition sort of existed in vacuum. How would you define sassy. Yeah shaw so i think you know. It's it's really primarily two key components one is the security Sort of cloud based security portion and then the other is the actual enforcement portion so a use. Cpa portion so that cloud security portion. I think you know that there's been a lot of sort of disparite Solutions on the security side so like firewall cosby sake And then also you've got ips ideas malware and so long. And you know as as scott. I think correctly sort of defined it You know there's this increasing the more scalable lying rate Security rather than having point products and doing service chaining Just sort of being able to inspect the traffic one single time and also I think having sort of it's it's in a way. It's like applying the principles of st one and two to sassy a to security so meaning that you kind of consolidate your and unify your your policy engine. You'll management in the cloud and then the enforcement in a similar way similar to the sdn model..

Paul kohler paul kohler paul Doing Connor craven today cisco silicon valley technology silicon valley technology alli one this week past year two key components conor one single time twenty nineteen scott sds central three philipson stints
"sds central" Discussed on 7 Layers

7 Layers

04:34 min | 1 year ago

"sds central" Discussed on 7 Layers

"So you never miss an episode in tune into our next episode where we will talk things sassy with an industry expert and as always you can learn more about the current state of technology over an sds central dot com. Today we were talking about sassy. No not being sassy but s. a. s. e. which stands for secure access service edge. I promise to hold back on the sassy wordplay in this episode. But i do encourage you to read the news article. What's so sassy about sassy by tobias man on sdn central's website in this episode. We'll look at what makes sassy so sassy but we will also cover what it is key components of sassy industry standardisation sassy offering options remote work shift industry growth in the future of sassy part one sassy basics gartner coined the term. Sassy in the twenty nineteen hype cycle cloud security report deemed the future of network insecurity functions at the time sassy was just an emerging technology and there was barely a sassy product on the market. Uh sassy.

"sds central" Discussed on 7 Layers

7 Layers

03:06 min | 1 year ago

"sds central" Discussed on 7 Layers

"Another one <Speech_Female> as well and i <Speech_Female> was really surprised <Speech_Female> at how <Speech_Female> much the public <Speech_Female> seemed <Speech_Female> to dislike <Speech_Female> and not <Speech_Female> trust mail <Speech_Female> in ballots from <Speech_Female> some of <Speech_Female> those kind of recent <Speech_Female> post twenty twenty <Speech_Female> <SpeakerChange> plus <Speech_Female> november surveys. <Speech_Male> You know <Speech_Male> it seems <Speech_Male> wall. There is an argument <Speech_Male> for accessibility <Speech_Male> and <Speech_Male> maintaining enfranchisement. <Speech_Male> <Speech_Male> There <Speech_Male> are still people that <Speech_Male> distrust something <Speech_Male> that <Speech_Male> puts <Speech_Male> a almost <Speech_Male> visual <Speech_Male> barrier between <Speech_Male> them and <Speech_Male> as you <Speech_Male> described in <Speech_Male> central new york <Speech_Male> as <Speech_Male> physically seeing <Speech_Male> their vote <Speech_Male> counted. <Speech_Male> <Speech_Male> Is there anything <Speech_Male> else you think needs <Speech_Male> to be said <Speech_Male> <hes> about elections <Speech_Male> security. That <Speech_Male> may not be talked <Speech_Male> about enough. We certainly <Speech_Male> covered some <Speech_Male> of that with how <Speech_Male> the media <Speech_Male> is covering the <Speech_Male> security of the election. <Speech_Male> Potentially <Speech_Male> looking <Speech_Male> more at hacking <Speech_Male> and not so much <Speech_Male> at the more <Speech_Male> <Speech_Male> subtle forms <Speech_Male> of attacks <Speech_Male> you know what <Speech_Male> are people <Speech_Male> talking <Speech_Male> about her. <SpeakerChange> What are they not <Speech_Female> aware of. <Speech_Female> Think the <Speech_Female> two most helpful <Speech_Female> things that <Speech_Female> your <Speech_Female> your audience <Speech_Female> my and <Speech_Female> then the public in general <Speech_Female> might take away from <Speech_Female> our discussion <Speech_Female> is one <Speech_Female> that when <Speech_Female> we think about election <Speech_Female> security <Speech_Female> and <Speech_Female> even election interference <Speech_Female> we have to broaden <Speech_Female> the aperture <Speech_Female> to think about. <Speech_Female> Multiple <Speech_Female> lines <Speech_Female> are multiple. Actors <Speech_Female> <Advertisement> are multiple <Speech_Female> <Advertisement> factors <Speech_Female> <Advertisement> of interference. <Speech_Female> Yes therefore <Speech_Female> an interference that <Speech_Female> you know the the fbi <Speech_Female> in others <Speech_Female> you know the intelligence <Speech_Female> communities kind of cover <Speech_Female> <hes> but there's <Speech_Female> also influence <Speech_Female> operations <Speech_Female> that are coming from various <Speech_Female> <Speech_Female> Different agents <Speech_Female> with different motives <Speech_Female> and agenda <Speech_Female> so it might be <Speech_Female> that you know <Speech_Female> we talked about social <Speech_Female> media and the way in <Speech_Female> which social media <Speech_Female> companies <Speech_Female> <Silence> seem to have <Speech_Female> <Speech_Female> a preference. <Speech_Female> They were <Speech_Female> Had a preference <Speech_Female> for certain candidates <Speech_Female> over other <Speech_Female> candidates. I <Speech_Female> think that was more obvious <Speech_Female> in the national <Speech_Female> elections. There was a lot <Speech_Female> of anti trumpism <Speech_Female> coming <Speech_Female> from the you know <Speech_Male> from some of the big social <Speech_Male> media companies <Speech_Female> but i think <Speech_Female> in smaller <Speech_Female> elections. <Speech_Female> It might be harder <Speech_Female> for folks <Speech_Female> to identify <Speech_Female> that <Speech_Female> you know some of these private <Speech_Female> sector actors <Speech_Female> who have a strong <Speech_Female> role <Speech_Female> in the <Speech_Female> in the public <Speech_Female> square right in the <Speech_Female> public. Discourse <Speech_Female> could actually <Speech_Female> have their finger <Speech_Female> on the scale for one <Speech_Female> candidate or another <Speech_Female> so. That's kind <Speech_Female> of <Speech_Female> election influence <Speech_Female> our <Speech_Female> election interference <Speech_Female> that we're not used to thinking <Speech_Male> about <SpeakerChange> but it's <Speech_Music_Male> it's live <Silence> <Speech_Male> Really <Speech_Male> is all the time <Speech_Male> we have together. <Speech_Male> <hes> <Speech_Male> dr zoe. <Speech_Male> So i just want to thank <Speech_Male> you for coming <Speech_Male> on <SpeakerChange> and <Speech_Male> having this terrific <Silence> discussion <Speech_Male> <SpeakerChange> anytime. <Speech_Male> <Silence> Thank you very much. <Speech_Male> Subscribe <Speech_Male> to seven layers so you never <Speech_Male> miss an episode and <Speech_Male> tune into our episode <Speech_Male> where we will give <Speech_Male> you a retrospective <Speech_Male> on twenty twenty s technological <Silence> innovations <Speech_Male> <Speech_Male> and as always you can <Speech_Male> learn more about the current state <Speech_Male> of technology. <Speech_Male> Sds central <Speech_Male> dot com. <Speech_Male> I've been your host. Connor <Speech_Male> craven associate <Speech_Male> studios editor <Speech_Male> at sdn central. I'm really looking forward to the next episode. And i hope you are too.

new york fbi dr zoe Connor
"sds central" Discussed on 7 Layers

7 Layers

01:30 min | 1 year ago

"sds central" Discussed on 7 Layers

"Sds central <Speech_Male> is here to help <Speech_Male> visit sgx <Speech_Male> dot <Speech_Male> io slash career <Speech_Male> to download <Speech_Male> our latest career. Guide <Speech_Male> these <Speech_Male> guides include detailed <Speech_Male> information about <Speech_Male> top skills needed <Speech_Male> for the fastest growing. <Speech_Male> It jobs <Speech_Male> interviews with <Speech_Male> industry experts <Speech_Male> and guidelines for <Speech_Male> nailing. Your next interview <Speech_Male> use them <Speech_Male> as a roadmap for <Speech_Male> navigating your dream <Speech_Male> tech career path. <Speech_Male> Download <Speech_Male> the latest guy today <Speech_Male> at spx <Speech_Male> dot io <Speech_Male> slash <Silence> career. <SpeakerChange> <Speech_Male> <Speech_Male> Thank you for joining us on. <Speech_Male> This week's episode of <Speech_Male> seven layers <Speech_Male> reach out podcasts <Speech_Male> at sds central <Speech_Male> dot com with <Speech_Male> any questions concerns <Speech_Male> corrections <Speech_Male> or honestly <Silence> pronunciations. <SpeakerChange> <Speech_Male> To <Speech_Male> before you go. Let's <Speech_Male> do a brief overview <Speech_Male> of what we discussed <Speech_Male> today one <Speech_Male> ransomware <Speech_Male> malware that prevents <Speech_Male> victims from accessing <Speech_Male> files and then <Silence> demands payment <Speech_Male> to <Speech_Male> ransomware gains <Speech_Male> access through infected <Speech_Male> emails devices <Speech_Male> or attachments <Speech_Male> in through militias <Speech_Male> websites. <Speech_Male> Three attackers <Speech_Male> often use asymmetric. <Speech_Male> Encryption <Speech_Male> in crypto currency <Speech_Male> so the ransomware <Speech_Male> is difficult to decrypt <Silence> in hard to trace <Silence> for <Speech_Male> ransomware <Speech_Male> attacks have <Speech_Male> a large financial impact <Speech_Male> on organizations <Speech_Male> can result in <Speech_Male> data leaks and can't <Speech_Male> interfere with various <Speech_Male> infrastructures <Speech_Male> and finally <Speech_Male> attacks <Speech_Male> the rice. Although ransomware is becoming <Speech_Male> more prevalent <Speech_Male> doesn't mean people <Speech_Male> are helpless remember. <Speech_Male> Best security <Speech_Male> practices can prevent <Speech_Male> ransomware attacks. <Speech_Male> Reduce the negative <Speech_Male> impact if they do <Speech_Male> happen. I've been your <Speech_Male> host. Connor craven <Speech_Male> associate studios <Speech_Male> editor 's sdn <Speech_Male> central. I'm really looking forward to the next episode. And i hope you are too.

"sds central" Discussed on 7 Layers

7 Layers

05:59 min | 2 years ago

"sds central" Discussed on 7 Layers

"Mobile has also been working to deploy five G. in the US but is mostly playing catch at this point. In comparison to the other two major telecoms I have mentioned other countries of note. The has steady plans for five G. networks or have some infrastructure deployed include Australia France Switzerland and the Nordic countries of Denmark Finland Iceland Norway Sweden. Australia has some five gene networks. The lay are not as advanced as other countries. I discussed earlier. In France there have been no five spectrum. Auctions and five G. network operators have been left to build out their four G. LT INFRASTRUCTURE WITH FIVE T. Quit -ment in order to hit the ground running so Julian was rolling out considerable nationwide infrastructure but that was delayed in early twenty twenty due to public concern over the impact of five G. Radio Frequencies on Human Health in April twenty twenty government decided to continue rollouts with the safety standards. That were already in place. I should note that there has been considerable research conducted on the topic of Five G. Radio waves and their effect on humans and there is so far no discernible adverse effects that have been found for more information read the SDS central definitional article titled. What is the environmental impact of five G. BY STUDIOS EDITOR MARLIES? Lessing back to the last section on my list. The Nordic countries they have agreed to create a unified approach to five G. deployment in each country for an interconnected five network throughout the region. Though there hasn't been much progress made on that will make put a hamper on rolling out five G. Globally is the Cova pan-demic primarily in the form of delaying spectrum auctions by governments a silver lining that despite strain being placed on supply chains. The manufacturers are still producing equipment for now as the pandemic continues. It will likely become more difficult for operations to remain. Resilient next up after this short break will be covering how the heck these telecoms are going to make any profits during and after making expensive shift of Five G. infrastructure. It infrastructure is under more demand and more scrutiny than ever the way we build networks has fundamentally changed with new technologies constantly evolving to solve new challenges at the same time the role of it departments and of individuals within the department is changing while vendors and executive strategize around new technologies those in the trenches scrambled to keep up D. Essentials definitional guides cover topics from SDN one. Oh one to the Internet of things to carefully curated primers for major industry events. They are one hundred percent independent content designed to share knowledge and help technology professionals stay ahead of the curve. Download the latest guy today at SDS DOT I O. Slash guides again that's S. DX dot io slash guides so before the break we talked about the state of the five t market in in our previous have said we talked about how five G. Networks are built in some benefits but this whole big question by a lot of potential but a lot of potential to do exactly what what use cases driving the vast amount of investment or seeing off with most five G. related things that's not a simple answer in this section we're going to cover some major five two use cases these use cases cover both the consumer side of five. G. Like reality as the business I had like five. G. Enable factories perhaps one of the most talked about five use cases. Thomas Vehicles specifically the self driving car when it comes to self driving cars lowly NC especially comes into play self driving cars work by using sensors. Gps navigation systems to inform the car. Were they are? What is around them when it comes to self driving cars lowly? Nc especially comes into play when it comes to self driving cars low latency especially comes into play self. Driving cars work by using sensors. Gps navigation systems to inform the car where it is what is around it. Piji networks can provide the connectivity to improve the quality of maps vehicle to vehicle activity vehicle to everything can activity Beagle the vehicle connections. Are where cards. Talk to other cars for better information on the relative locations and vehicle to everything connectivities where the car can talk to smart cities infrastructure like. Stop Lights all this information. The car can avoid accidents and get to its destination more efficiently for example if no pedestrians are around but a car is coming to a stop. Light the car can communicate so the light can change the carton keepdriving instead of stopping for no reason also. We passengers want to access the Internet. While in the car they will want the Fiji connectivity that they have grown used to and important aspect of five technology that will have to be improved on. Is the hand off between base stations as the car barrels past them for consistent connection the network will have to be able to not disrupt the connection as the car. Switches from using one base station to the next donahue. Spiegel's are not limited to cars for example they could also be forklifts and a smart warehouse or drones delivering food and packages drones delivering things. You have ordered off Amazon fall. The story of Internet of things smart warehouses on the other hand are just one example of what is called industrial. Iot I let's consider the Internet of things often referred to as just IOT. The world devices included in the Internet of things. It's best anything from a fridge to a thermostat to a vacuum can be connected to the Internet. These devices can consume monstrous amounts of bandwidth. Because they're always connected in there so many of them fifty is often tied. Iot because of one of its. Three's case families massive machine type communications or MTC. This type of use case is designed to handle large amounts of connected devices that transmit small amounts of data that are latency sensitive is not because as mentioned there are lots of them but also they usually don't generate all that much data at once and rarely require a response from the network in a second on the business side organizations find themselves having to manage a.

G. networks telecoms NC US Denmark Finland Iceland Norway France Australia Australia France Switzerland Cova Lessing Julian EDITOR MTC executive Thomas Vehicles Spiegel Fiji
"sds central" Discussed on SDxCentral Weekly Wrap

SDxCentral Weekly Wrap

04:28 min | 3 years ago

"sds central" Discussed on SDxCentral Weekly Wrap

"Today is June twenty first two thousand nineteen and this is the SDS central weekly wrap where we cover the week's top stories on next generation IT infrastructure VM ware this week launched a new multi cloud security product that moves the company further into that rapidly. Expanding space, the new secure state product uses an interconnected cloud security model. That is an intermediate data layer that layer leverages cloud API is change events, streams and native threat data to provide a better understanding of security posture, vulnerabilities, how different assets are interconnected, and the associated risks and threats across multiple clouds. So curious state also helps customers understand cloud, deployments and risks by building relationship mode of how those services are configured to connect inside of a customer's cloud accounts. It also automates cloud compliance monitoring that can feed a risk model layer to correlate vulnerabilities and threats. And it provides DevOps teams with real time security inside. It's the secure state product is based on technology that the firm acquired last year when it bought public cloud security startup cloud corio, it's being integrated into its cloud health platform that VM ware picked up from a different acquisition last year and has become a cornerstone of its multi cloud strategy. The new product feeds into recent comments made by VM ware executives about the need for tighter integration of security products into broader multi cloud deployments. It also follows on the heels of its recent launch of an internal firewall service which signaled its intent to become a larger player in the security space. Hewlett Packard enterprise is making the bold move to offer its entire services portfolio through an as a service model by twenty twenty two HP. Ceo, Antonio Neri made that proclamation as part of a keynote address at the vendors discover event this week in Las Vegas. The company's current as a service model runs through its green lake platform that has. This year has more than two point eight billion dollars in contract value and more than six hundred customers. He said that business was HP's fastest growing segment. Turning out two hundred and seventy five percent year over year growth, he explained that the move would transform its focus into a consumption driven company over the next three years, and help free up capital. The approach is similar to on premises IT as a service models launched by Dell technologies and Lenovo though nearly claimed HP has a ten year head start over those rivals HP this week, also announced, hybrid cloud deals with Google and AT and T the Google deal will see HP run Google's Anthony multi cloud management platform on its on premises server and storage products. It will also be delivered as service to the green light platform the AT, and T deal will see the two companies team up on a go to market program to accelerate business adoption of edge connections and edge computing. In China-based telecom equipment, vendor Weiwei, said that the ongoing US led campaign to ban the use of its equipment in western five G networks will cause a thirty billion dollar hit to its bottom line that bombshell came during a press conference at the company's headquarters, where it CEO said, restrictive measures imposed by President, Donald Trump and the US department of commerce were more extreme and wide ranging than expected, while way hasn't quantified the near term impact on its radio access network equipment business, but it could face ongoing challenges at the matter, isn't resolved soon the company is also waging, a legal battle against the US government over the constitutionality of the twenty nine thousand nine national defense authorization act, which restricts while away from conducting business with the US government, it's contractors and suppliers network operators around the world or in the early stages of deploying five G services and Weiwei's ways increasingly being left out of those plans due to government imposed bans based on security concerns company. Exoo. -secutive maintain that it's it is not a security risk. And argue that actions taken by the US government are politically motivated, and further complicated by the ongoing trade war with China. That's all for this week, make sure to subscribe, and review us on, I tunes or your favorite podcast platform. For more on these stories and the latest news, check out as DX central dot com.

HP US government Antonio Neri US AT Ceo SDS Google US department of commerce Weiwei Hewlett Packard enterprise Las Vegas Donald Trump China Dell technologies Lenovo twenty twenty President five G