US President Obama brought attention to the issue of net neutrality, which is the principle that internet service providers should treat all internet data equally and not charge differential rates based on user, content, or type of data. Advocates want ISPs regulated as common carriers, prohibiting discrimination. Allowing ISPs to create "fast lanes" could lead to a two-tiered internet system. The group "Save the Internet" is fighting large corporations trying to change these principles and have received over 4 million signatures supporting net neutrality. Maintaining net neutrality ensures users can access content of their choosing rather than what ISPs allow and that all data is treated equally regardless of how or what device is used to access it.
Visit the Big Thinkers in Small Cells Portal: http://www.cisco.com/assets/sol/sp/big_thinkers/index.html
To learn more, please visit the Cisco Small Cell Solutions Page: http://cisco.com/go/smallcell
It is a Presentation On Net Neutrality...
CONTENTS:-
*What is Net Neutrality?
*Why Net Neutrality is important?
*Net Neutrality in India
*History
*TRAI rules in favor of Net Neutrality
*Why should we care?
-Sourav Dey
Mail ID: piyush.kolkata@gmail.com | piyush.kolkata@outlook.com
Mail me for the PPT version.
Network Neutrality - Training Presentation for Indictee Scientists at C-DAC, ...Rajat Kumar
The Centre for the Development of Advanced Computing (C-DAC) is a research and development organization under the Department of Electronics and Information Technology, Govt of India.
Net Neutrality formed a critical part of the C-DAC Induction Training Programme to allow the scientists to understand the discourses surrounding this relevant topic
The global information infrastructureSectionGETTING ON BO.docxcherry686017
The global information infrastructure
Section:
GETTING ON BOARD THE INTERNET
From the Internet toward Worldwide Commerce
The Internet offers many resources, but its lack of robustness in service, security, and reliability renders it an interim solution to a true global information infrastructure (GII) that supports worldwide commerce. The development of such an infrastructure depends on more than improvements in technology however; for the GII to be commercially robust, issues concerning regulations, security, and cultural diversity must also be resolved.
The Global Information Infrastructure (GII) is defined as an environment that uses high-performance hardware, software, and communications to deliver voice, data, video, graphics and other information regardless of where the information or user is located.
The GII will be the information highway of the future. Today, the infrastructure is the Internet. This article describes the Internet and, from time to time, moves forward to the GII. The components of the information highway -- people, communications media, communications networks, data bases, agents, information providers, and bridges -- and their interrelationships are shown in Exhibit 1.
THE INTERNET: USERS AND APPLICATIONS
The exact number of Internet users is not known. Estimates range from 10 to 100 million users with interconnecting networks stretched around the world. In 1994, there were approximately 20,000 networks in the US, and 1,500 each in the UK, Germany, and Japan. In countries such as Russia, South Africa, and South Korea, networks numbered in the several hundreds. In developing countries such as China, Kuwait, and Egypt, three to five networks were typically operational.
Current Internet applications include:
· Find/learn -- through data bases and descriptions.
· Talk -- through E-mail, voice, and video.
· Work -- accomplished through cooperative work, telecommuting, and videoconferences.
· Shop --using catalogs and electronic malls.
· Play -- using games and video on demand.
· Invest -- through stock market advice, order placement, and money management.
INTERNET SERVICES
Internet applications are delivered through a variety of services (see Exhibit 2).
E-Mail. E-mail, for example, provides capabilities for sending messages addressed to individuals or to mailing lists. It is much faster and less costly than traditional postal services. However, Internet E-mail goes through multiple nodes and is subject to delay. Furthermore, there is no address directory.
Newsgroups are a natural extension of E-mail. They allow users to post messages for anyone to read. Another extension of E-mail is computer conferencing. In essence, a computer conference is a file devoted to a specific topic being discussed by a group of people.
Telnet. Telnet allows users to access a remote computer as though it were a local machine. Regardless of where they are located, users can retrieve E-mail messages and download them to the local computer. Typ ...
Visit the Big Thinkers in Small Cells Portal: http://www.cisco.com/assets/sol/sp/big_thinkers/index.html
To learn more, please visit the Cisco Small Cell Solutions Page: http://cisco.com/go/smallcell
It is a Presentation On Net Neutrality...
CONTENTS:-
*What is Net Neutrality?
*Why Net Neutrality is important?
*Net Neutrality in India
*History
*TRAI rules in favor of Net Neutrality
*Why should we care?
-Sourav Dey
Mail ID: piyush.kolkata@gmail.com | piyush.kolkata@outlook.com
Mail me for the PPT version.
Network Neutrality - Training Presentation for Indictee Scientists at C-DAC, ...Rajat Kumar
The Centre for the Development of Advanced Computing (C-DAC) is a research and development organization under the Department of Electronics and Information Technology, Govt of India.
Net Neutrality formed a critical part of the C-DAC Induction Training Programme to allow the scientists to understand the discourses surrounding this relevant topic
The global information infrastructureSectionGETTING ON BO.docxcherry686017
The global information infrastructure
Section:
GETTING ON BOARD THE INTERNET
From the Internet toward Worldwide Commerce
The Internet offers many resources, but its lack of robustness in service, security, and reliability renders it an interim solution to a true global information infrastructure (GII) that supports worldwide commerce. The development of such an infrastructure depends on more than improvements in technology however; for the GII to be commercially robust, issues concerning regulations, security, and cultural diversity must also be resolved.
The Global Information Infrastructure (GII) is defined as an environment that uses high-performance hardware, software, and communications to deliver voice, data, video, graphics and other information regardless of where the information or user is located.
The GII will be the information highway of the future. Today, the infrastructure is the Internet. This article describes the Internet and, from time to time, moves forward to the GII. The components of the information highway -- people, communications media, communications networks, data bases, agents, information providers, and bridges -- and their interrelationships are shown in Exhibit 1.
THE INTERNET: USERS AND APPLICATIONS
The exact number of Internet users is not known. Estimates range from 10 to 100 million users with interconnecting networks stretched around the world. In 1994, there were approximately 20,000 networks in the US, and 1,500 each in the UK, Germany, and Japan. In countries such as Russia, South Africa, and South Korea, networks numbered in the several hundreds. In developing countries such as China, Kuwait, and Egypt, three to five networks were typically operational.
Current Internet applications include:
· Find/learn -- through data bases and descriptions.
· Talk -- through E-mail, voice, and video.
· Work -- accomplished through cooperative work, telecommuting, and videoconferences.
· Shop --using catalogs and electronic malls.
· Play -- using games and video on demand.
· Invest -- through stock market advice, order placement, and money management.
INTERNET SERVICES
Internet applications are delivered through a variety of services (see Exhibit 2).
E-Mail. E-mail, for example, provides capabilities for sending messages addressed to individuals or to mailing lists. It is much faster and less costly than traditional postal services. However, Internet E-mail goes through multiple nodes and is subject to delay. Furthermore, there is no address directory.
Newsgroups are a natural extension of E-mail. They allow users to post messages for anyone to read. Another extension of E-mail is computer conferencing. In essence, a computer conference is a file devoted to a specific topic being discussed by a group of people.
Telnet. Telnet allows users to access a remote computer as though it were a local machine. Regardless of where they are located, users can retrieve E-mail messages and download them to the local computer. Typ ...
C5-1 CASE STUDY 5NET NEUTRALITYFew issues related to.docxRAHUL126667
C5-1
CASE STUDY 5
NET NEUTRALITY
Few issues related to business use of the Internet have spurred as much
heated debate as Net Neutrality. At the heart of the Net Neutrality debate is
the idea that Internet access providers should not discriminate with regard
to what applications an individual can use or interact with over the Internet.
Advocates of Net Neutrality contend that individual freedom to use of the
Internet extends to the content uploads or downloads. They also believe that
individuals acquiring services from Internet access providers should be able
to use the applications and devices of their choice, and be allowed to interact
with the content of their choice anywhere on the Internet.
The concept of Net Neutrality is grounded in traditional “common
carriage” concepts. Because carriers of goods, people, and information can
be considered common carriers, common carriage concepts have been
applied to trains, planes, buses, and telephone companies. Common carriage
principles embody the ideal that the efficient movement of goods and
information is essential to our economy, nation, and culture, and therefore
carriers must not discriminate against or favor particular individuals or
content.
If common carriers are truly public goods, it can be argued that these
modes of conveyance should not discriminate with regard to what they carry
or where they carry it. This also means that the carrier should not be held
liable for carrying things that may be harmful. For example, if a terrorist
C5-2
uses a subway to travel to the site of a terrorist act, the subway cannot be
sued for being complicit in terrorism.
Telecommunication carriers have been classified as common carriers for
more than 100 years, dating back to the early days of the telegraph. Nearly
half a century has passed since the Federal Communications Commission
(FCC) determined that the telephone network should be an open platform
over which computer networks can be created. As a result of the
Carterphone case, the FCC resolved that individuals had the right to attach
devices of their choosing to the telephone network [BOSW12]. This opened
the door for data communication devices such as fax machines and modems
to be attached to telephone lines, thereby making it possible to create
computer networks over the telephone network. In essence, court and
regulatory rulings in the U.S. created an environment that fostered the idea
that computer networks could be constructed to go anywhere the telephone
network could take them using devices that could carry just about any type
of content. The decisions made by courts and regulatory agencies that
opened the door for telephone networks to carry data generated by
computers were largely consistent with traditional common carriage
concepts. However, the emergence of the World Wide Web and the
increased popularity of broadband access that it generated added a ...
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE PROBLE.pdfinfo824691
THIS IS AN ARTICLE PLEASE GIVE ANSWERS FOR THE QUESTIONS (THE
PROBLEM)
Closing Case Network Neutrality Wars
The explosive growth of streaming video and mobile technologies is creating bandwidth
problems over the Internet. The Internet was designed to transmit content such as e-mails and
Web pages. However, media items being transmitted across the Internet today, such as high-
definition movies, are vastly larger in size. To compound this problem, there are (in early 2015)
over 180 million smartphone users in the United States, many of whom use the Internet to stream
video content to their phones. The Internet bandwidth issue is as much about economics as it is
about technology. Currently, consumers can send 1-kilobyte e-mails or watch the latest 30-
gigabyte movie on their large-screen televisions for the same monthly broadband fee. Unlike the
system used for power and water bills where higher usage results in higher fees, monthly
broadband fees are not tied to consumer usage. A study from Juniper Networks
(www.juniper.net) highlights this “revenue-per-bit” problem. The report predicts that Internet
revenue for carriers such as AT&T (www.att.com) and Comcast (www.comcast.com) will grow
by 5 percent per year through 2020. At the same time, Internet traffic will increase by 27 percent
annually, meaning that carriers will have to increase their bandwidth investment by 20 percent
per year just to keep up with demand. Under this model, the carrier’s business models will face
pressures, because their total necessary investment will exceed revenue growth. Few industry
analysts expect carriers to stop investing in new capacity. Nevertheless, analysts agree that a
financial crunch is coming. As Internet traffic soars, analysts expect revenue per megabit to
decrease. These figures translate into a far lower return on investment (ROI). Although carriers
can find ways to increase their capacity, it will be difficult for them to reap any revenue benefits
from doing so. The heart of the problem is that, even if the technology is equal to the task of
transmitting huge amounts of data, no one is sure how to pay for these technologies. One
proposed solution is to eliminate network neutrality. (A POSSIBLE SOLUTION)Network
neutrality is an operating model under which Internet service providers (ISPs) must allow
customers equal access to content and applications, regardless of the source or nature of the
content. That is, Internet backbone carriers must treat all Web traffic equally, not charging
different rates by user, content, site, platform, or application. Telecommunications and cable
companies want to replace network neutrality with an arrangement in which they can charge
differentiated prices based on the amount of bandwidth consumed by the content that is being
delivered over the Internet. These companies believe that differentiated pricing is the most
equitable method by which they can finance the necessary investments in their network
infrastructures. .
All the q about net neutrality.1. Who is in favor of net neutralit.pdfakashborakhede
All the q about net neutrality.
1. Who is in favor of net neutrality? What reasons do they offer for this position?
2. What legal challenges are critics making against the FCC\'s rules? What three approaches are
they taking? Which is likely to succeed?
3. What affect could the FCC\'s decision have on the government, consumers, and various
internet-related companies? Are conditions expected to change drastically for any of these
groups?
Solution
1. Net neutrality is the principle that Internet service providers and governments should treat all
data on the Internet equally, not discriminating or charging differentially by user, content, site,
platform, application, type of attached equipment, or mode of communication. Nearly anyone
and any business not involved with the cable and phone companies supports keeping the Internet
as the open marketplace that it is today. Consumer groups, small businesses, innovators, family
and religious groups, financial services, retailers as well as major Internet brands such as Google,
Yahoo!, Amazon.com, Earthlink, eBay, Intel, Microsoft, Skype, Vonage are fighting to keep the
Internet open.
2.The FCC just voted in favor of a strong net neutrality rule to keep the Internet open and free.A
legal fight against the Federal Communications Commission\'s new Internet traffic rules has
begun with a suit by the United States Telecom Association, an industry group that represents
companies including AT&T and Verizon. The FCC is honing in on three areas of oversight: the
blocking of access to any content, the \'throttling\' of Internet traffic (slowing it down for reasons
other than what may be technically necessary to maintain a network\'s operations), and paid
prioritization (in which providers may favor some Internet traffic over others by creating \'fast
lanes\' for websites and services that can pay for them). One of the key legal arguments to expect
in the months to come, according to Werbach, is that the FCC previously said a company can
either be a telecommunications service or an information service, but not both. ISPs may argue
that they are elements of both and that the FCC must prove that they are not information
companies before it can reclassify them, says Werbach.
3.It will be a long time before anything materialises. Netflix won\'t stream any faster for you and
ISPs won\'t stop investing in their networks or high speed fiber cables as a result. Internet service
providers say they back the concept. But they don\'t want to face more, costly regulation and
claim it would hurt the economy.
Their argument is the internet has been progressing just fine the way it is currently set up, thanks
in parts to their expensive investments in network upgrades that have improved the quality of
high-speed service and expanded its availability.
More regulation will cost them more money - money they would otherwise spend on expanding
and improving their networks, they say. That would have the trickle-down effect of hurting
b.
2016 Broadband Outlook Report, Telecoms.comBrian Metzger
The Broadband Outlook Report is based on quantitative research from more than 600 telecommunications and internet professionals, with over 50% of respondents representing communications service providers (CSPs). Inside you will discover:
* How CSPs define digital transformation
* What percentage of CSPs have a digital transformation strategy
* Which capabilities CSPs say are the most important to improving the digital experience
* And much more insight into the telecom industry’s digital transformation imperative
CASE STUDY -1 BA 633 Information Systems Inf.docxhallettfaustina
CASE STUDY -1
BA 633: Information Systems Infrastructure.
Prof: Fred Rose.
NET NEUTRALITY
Anvesh Veldandi
Student no: 558046.
1. This case focuses on the Net Neutrality debate in the United States. Do some Internet research on international
views of Net Neutrality and summarize how views of this issue differ within and across other countries.
Network neutrality has been a contentious issue in the United States for several years, but is increasingly debated
elsewhere, with the EU, several European countries, and the Japanese government all examining the issue.
Net neutrality does not have a single, unanimously accepted definition even within, let alone across, countries.
Nevertheless, proponents of net neutrality generally believe that a structure in which the Internet’s intelligence lies
primarily at the edges of the network, with the edges connected by relatively “dumb pipes” is responsible for the
Internet’s diversity and innovation. They fear that without some regulation broadband providers may discriminate in
favor of their own or sponsored applications, or might degrade traffic to sites that do not pay for better quality of
service tiers.
Net neutrality debates in the U.S. have focused primarily on regulations regarding how broadband providers could
price and manage traffic on their networks. The debate in Europe, has generally focused instead on the role
unbundling mandatory network sharing can play in keeping networks neutral. Unbundling
proponents argue that if the infrastructure provider does not offer retail services or is only one of many retailers
offering service over its infrastructure it will have less incentive to discriminate in favor of or against particular
content. Unbundling opponents typically do not discuss it in the context of net neutrality, but note that it can reduce
incentives to invest in the underlying infrastructure. This paper first examines the net neutrality debate in countries
other than United States. It explores net neutrality in the U.K., France, Denmark, the Netherlands,
Germany, Sweden, South Korea, and Japan. Because net neutrality is another type of mandatory network sharing
and because unbundling is a key component of the EU’s general response to net neutrality, the second part of the
paper uses a new dataset to test empirically the effects of unbundling on investment in fiber-to-the-home.
The net neutrality debate began in other countries much later than it began in the U.S. Most European countries
embrace the general idea of net neutrality. While they address the issue differently, most have so far stated that
unbundling combined with rules governing firms with significant market power, rather than specific n ...
+ Overview of MOBILE EVOLUTION AND DEVELOPMENT OF THE INTERNET.
+ MOBILE INTERNET: TRENDS AND GROWTH
+ BENEFITS OF THE MOBILE INTERNET
+ CHALLENGES OF THE MOBILE INTERNET
+ SOLUTIONS
Mobile networks are now dominated by data. If we rewind back to a decade ago, smartphones and application stores were unheard of. Twitter and Facebook were not in existence and YouTube wasn’t as popular. Culturally, consumers are valuing the need to be socially connected in the present day Internet.
The traditional cellular network cannot cope with the increase in data and signaling traffic that is generated and thus is driving carriers in the direction of offload. The Phase 1 approach was centered on immediately relieving congestion on the network by encouraging offload to any available Wi-Fi hotspot. In this second part of the five part offload series, we draw attention to Direct Internet Offload. The concept of Direct Internet Offload is nothing new, but has taken a slight shift considering Wi-Fi’s popularity. And the flexibility to integrate them into mainstream network design offers transformative opportunities for carriers without losing sight of the commitment to make the user experience secure and controlled.
Protocols in Mobile Electronic CommerceIJERA Editor
Mobile-commerce, also known by other terms such as M-Commerce or m-Commerce, is the capability to follow commerce with the help of a hand held devise like mobile phone, a Personal digital assistant PDA, a smart phone, or other emerging mobile equipment such as dash top mobile devices. Since decade Mobile-commerce is being expressed as follows: Mobile-commerce is where any transaction, involving the transfer of rights or ownership to use goods and services, which is initialized and/or processed by using mobile (cell) access to computer-mediated (eg. WAN) networks with the help of an electronic device.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
January 2015 Newsletter
1. Geoff CourtsGeoff CourtsGeoff CourtsGeoff Courts
US President Obama recently
brought to the spotlight an issue
that has been at the heart of the
‘Open Internet’ since it’s
inception. Net Neutrality is the
principle “that Internet service
providers and governments
should treat all data on the
Internet equally, not
discriminating or charging
differentially by user, content,
site, platform, application, type of
attached equipment, or mode of
communication”. [Wikipedia]
Common CarrierCommon CarrierCommon CarrierCommon Carrier A long standing
principle in common law countries
is that of the common carrier,
where a person or company that
transports goods is prohibited
from discriminating or refusing
service based on the customer or
the nature of the goods. It’s
usually associated with utility
providers such as water or
electricity, as well as public
transport. Private carriers, such as
haulage firms, are private carriers,
and are allowed to differentiate.
Advocates of neutrality are
focused on designating ISPs as
common carriers, and by
implication designating the
Internet in the same category as
other utilities.
In his statement, Obama called the
internet “one of the most
significant democratizing
influences the world has ever
known”. By allowing ISPs to create
virtual fast lanes for certain types
of traffic or data, it would create
a two-tier internet.
Paying for a premium service, such
as Netflix, is not the issue, but
allowing ISPs to charge a premium
to stream certain types of data is.
Save TheSave TheSave TheSave The
InternetInternetInternetInternet is a
lobby group
that is
fighting
against the
corporations
trying to get
their way. They have received over
4 million signatures to a petition
to save net neutrality, and to
reclassify broadband providers as
common carriers.
User ChoiceUser ChoiceUser ChoiceUser Choice One of the key
concepts is that the user should be
able to choose what content they
want to view, not the ISPs, and
that by charging users premiums
to access certain content, or from
How IT Can Be
Net Neutrality | Equal Access For All
certain
devices, it
removes
essential
freedoms that
have been in
place since the
webs’
inception. One
mobile
provider in the
US actually
blocked access
to certain sites
like Facebook
and Twitter if
you were on a
lower price plan, charging users a
premium to access certain sites
and content.
A key point is that not only should
the data you access not be
discriminated against, but the
A Bitcoin Miner produced by
Butterfly Labs
The Internet and The Web
Geoff CourtsGeoff CourtsGeoff CourtsGeoff Courts The terms are often used interchangeably, but they are actually two distinct things.
The InternetThe InternetThe InternetThe Internet is the physical infrastructure or cables, routers, servers, and other devices, all interconnected.
They use the common language of TCP/IP to transmit packets of data.
The WebThe WebThe WebThe Web is the system of hypertext linked documents that are
accessed via The Internet. Hypertext, usually written in HTML, is
what allows clicking on a word to take you to another document or
web page.
When we pay for a broadband service, we are actually paying to
access the internet i.e. get connected to the physical infrastructure.
A utility provider, like a water company, is really charging you for
the delivery of the water and use of its network of pipes, rather than
for the water itself.
Net Neutrality holds that all broadband providers should be classed in the same way as other utilities
providers. You can pay for a faster physical connection, perhaps a fibre line or 4G mobile, but the ISP is not
responsible for the content. The case argues, quite convincingly, that the ISP should not be the one to
choose what types of web content you are looking at, or choose what content you should be able to
access faster. Speed of access should be determined by the service type, not the data content.
device you choose to access it on
too. Smartphones are the primary
or only way many people, access
the internet, and they should not
be denied access to certain data
because of their method of
access.
If data is not treated equally, you risk a two-speed
internet, where those that can’t afford to pay get
slower speeds based on content (cagle.com)
January 2015Volume 3 Issue 1
2. Sarah RenchSarah RenchSarah RenchSarah Rench Since 2012, Barclays have
offered a service called Pingit which
allows users to make payments straight
from one mobile user to another. In April
2014, Paym, pronounced Pay ‘Em’,
launched its services to enable mobile
payments for other banking institutions.
Paym is run by the Payments Council, an
industry body that expects ‘one billion
such transactions to be made by 2018’.
The service will be available to customers
of Halifax, Bank of Scotland, Danske Bank,
Lloyds Bank, HSBC, Santander, TSB Bank
and Barclays (through Pingit).
How does thisHow does thisHow does thisHow does this
work? Can Iwork? Can Iwork? Can Iwork? Can I
use it?use it?use it?use it?
Well, you can
start by
downloading
your banks
existing
mobile
payments
application
(app).
Although
Barclays Pingit
allows you to register even if you are not
an existing customer.
Using Barclays Pingit as an example, it
works on mobile devices with Android 2.2
and above, IOS 4.2 and above, and
Blackberry OS 4.6 and above.
You can then register your mobile number
with your bank via the app. Once the
necessary security checks have been done
and approved, you are then able to send
and receive payments to anyone with a
UK current account linked to their mobile
phone number and track the payments
through the mobile application. You can
then call the recipient’s mobile number
via the Pingit app, key in an amount
between £1 and £300 and hit send. This
removes the need for account numbers
and sort codes and allows you to use the
phone numbers in your contact list or
manually entered to send money to your
desired recipient.
If you are a UK current account holder or
have a UK mobile number, then there are
no fees for this service and payments
happen almost instantly.pingit2
Do businesses accept Pingit or PaymDo businesses accept Pingit or PaymDo businesses accept Pingit or PaymDo businesses accept Pingit or Paym
transfers? What reference do they use?transfers? What reference do they use?transfers? What reference do they use?transfers? What reference do they use?
FC Exchange was one of the first foreign
currency exchange companies who
provided this service to their customers.
As Nick Fullerton, CEO at FC Exchange
comments, ‘We wanted to provide our
customers an easy, quick and secure way
to send funds to us.’ FC Exchange is one
of many businesses who can be sent
money via Pingit and can be seen listed
under the Barclays Business Directory as
‘FCEXCHANGE1’ removing the need to
enter bank details, which can sometimes
result in payment input errors and delays
in transfers.
Mike Walters, Head of UK Corporate
Payments at Barclays stated, “Mobile
commerce has grown more than 250%
over the last two years and it is
important that businesses provide
consumers with a convenient and easy
payment method through this channel.”
FC
Exchange is
an example
of one
business
that
recognises
the need to
fully mobile
optimise
their online
services to
ensure
customers
receive the
best
services both online and offline.
With apps like Pingit making paying
businesses and friends so easy, no one
can say they don’t have time to sit
down and make the payment, as after
the initial set up, it’s now fully mobile!
For more information on how to set up
Barclay’s Pingit or how to make great
savings on foreign currency transfers
using the latest online technology
contact FC Exchange.
Sarah Rench is the Online Manager at FC
Exchange, a foreign exchange and
international payment solution provider.
Will You Paym By Cash, Card or Pingit? 4G Fast Broadband Next Day
Jude BrownJude BrownJude BrownJude Brown So most of you should know what 3G is, and
probably use it day to day to surf the internet on your
mobiles, but not all would have used 4G day to day. 4G has
been discussed in previous newsletters by Ciaran and Geoff
(January ’14 & August ’14), and this time I am back on the 4G
subject with good news. From the start of this year, we will
be giving all clients the option to move on to 4G for
internet back up at a small cost but with many benefits
with the UK Broadband provider.
Why is a 4G back up important? First of all the 4G will act
as a secondary internet connection to your office. This
means if a problem occurred with your primary internet
connection, the UK Broadband router can be switched to
within seconds to provide full internet access. You can also
bring the router with you anywhere you want (within an
area serviced by 4G), so in case of an emergency you can
finish your work in a café or bar by plugging in the router
and still having the same good connection.
The UK broadband router gets delivered one working day
after the order is placed. Quick, efficient, and you will be
set up within minutes of receiving it.
The setup is simple. Plug the hub into a power socket, place
the box near a window to maximise the signal, and you are
good to go.
Unlimited data is another key benefit, as it actually means
unlimited data. There is no limit to the UK Broadband
internet use and you will not be charged extra for browsing
or leaving the router connected.
The UK Broadband router is something we will be
recommending to all of you in the New Year, purely
because it’s cheap, quick, and an item all offices should
have.
UK Broadband also provide the Relish 4G Service built on
the same infrastructure
4G Coverage is limited to certain areas of central
London, but more postcodes are added every month
3. Geoff CourtsGeoff CourtsGeoff CourtsGeoff Courts
Typing on a
mobile phone
can be annoying.
Really annoying,
especially if you
want to go fast
and autocorrect
changes what
you meant to
say into
something that
might cause the
person you’re
messaging to
call the Police or
social services.
So, to save time
and aggravation
all round, you
can create short
alternatives to
common words
or phrases.
On iOSiOSiOSiOS you’ll
find this under
Settings > General > Keyboard > Shortcuts
On AndroidAndroidAndroidAndroid, under Settings > Languages & Input
Examples I have used are my various email addresses.
geoff@macnamara-ict.co.uk is shortened simply to ‘gmac’ and my full
address is added after I start typing my house number.
Victorian Wearable Technology
Geoff CourtsGeoff CourtsGeoff CourtsGeoff Courts Our last issue of 2014 had a short piece on Wearable
Technology and looked at some of the pending designs like the Apple
Watch. But wearable tech is not new. The Victorians were keen
inventors and were known for some fairly awesome technology such as
the paddle steamer (Isambard Kingdom Brunel), steel (Henry Bessemer)
and of course the telephone (Alexander Graham Bell).
A new book Inventions That Didn’t Change The World examines some
other ideas that didn’t achieve such greatness. In 1839 the Board Of
Trade established the
Designs Registry as an
alternative forum to
the patent office for
people to submit
drawings of their ideas
rather than more
detailed patent
applications to get the
ideas on record, and
the book examines
some of them.
Some of the ideas
were, as the books
title suggests, fairly rubbish. Fork Scissors, an Artificial Leech for
drawing blood (leeches became so popular as a medicinal cure, they
were in short supply), and an Air Conditioned Top Hat (a hat with a
hole in the top) were among the ones that didn’t make it.
Hopefully the wearable tech prospects for 2015 are more promising.
Quick Tip | Mobile ShortcutsManaged Print
Jack JonesJack JonesJack JonesJack Jones I find printers rather annoying– when they stop working,
they rarely give us good reason. Like a sick pet, something’s wrong,
but they can’t say what.
Depending on your
volume of printing, you
may be spending
hundreds (yearly,
possibly even
thousands?) of pounds on
paper, ink and printer
servicing. You try to print
a 20 page document and at
page 16, it comes to a halt –
paper jam. You check the
tray, and there’s nothing there. Or, that important report for your
client presentation comes out weak and faded. The toner’s out but
you can’t get a delivery for another couple of days.
The solution?The solution?The solution?The solution? Managed Print Services are your answer to the
logistical side of things and the cost. Many of the Managed Print
Services will have a method to monitor your printer and receive their
own alert when you are low on consumables, such as toner, and they
can have it shipped to you automatically with the objective of it
arriving just before the printer runs out.
You will likely be pay a cost per page (differentiated between black
and white or colour) , which works out much cheaper than buying
toners outright, but while the printer is on the contract, you will also
have servicing and engineer visits included (in most cases).
Since we switched to managed print services, we cut our printing
costs roughly in half, with printer rage reduced by at least 90%.
The "bona fide ventilating hat" would have allowed men
to wear hats without overheating.
Printer chewing up those TPS reports?
There is a less frustrating solution
The Year of IT (in)Security | Part 1: The Enemy
Ciaran KennyCiaran KennyCiaran KennyCiaran Kenny For anyone with even a passing interest in IT security, 2014
came to a fascinating end: what with the Sony hack escalating to become
an issue of US national security, a reassessment of where the Stuxnet
worm might have originated (hint: it seemed to focus on ‘enemies’ of the
US), and the discovery of Regin, a positively super-powered bit of
spyware. All three exploits are of a level of sophistication not seen
before; almost certainly
involving either state level
or very well resourced
attackers.
Stuxnet appears to have
shut down a large part of
Iran’s nuclear programme.
Regin just hangs around
for months recording
everything before
constructing a highly
personalised and wholly
credible attack to relieve
its targets of large
amounts of money.
And, as for that Sony hack, apart from threatening the security of United
States, the world has been deprived (well, if we forget about bit
torrents) of another Seth Rogen work of art.
So, as small businesses, should we care? I think we should, if only because
2014 has made it clear that when it comes to IT security we are now
facing an array of pretty menacing unknown unknowns. Who really knows
what ‘the enemy’ wants but he has demonstrated an ability to get
through some pretty serious defences.
Hopefully having this picture here won’t
mean we’ll be the next target
4. Unit 2.1 Hoxton Works
128 Hoxton Street
London
N1 6SH
020 3102 2140
enquiries@macnamara-ict.co.uk
Macnamara ICT Ltd was setup in 2003 to provide the
very best in IT Management and Support to
businesses throughout London and beyond. We have
consciously modelled ourselves on the professional
services rather than traditional technology sector.
If you would like to know more about Macnamara
ICT Ltd please contact
Ciaran Kenny | Managing DirectorCiaran Kenny | Managing DirectorCiaran Kenny | Managing DirectorCiaran Kenny | Managing Director
ciaran@macnamaraciaran@macnamaraciaran@macnamaraciaran@macnamara----ict.co.uk | 020 3102 2141ict.co.uk | 020 3102 2141ict.co.uk | 020 3102 2141ict.co.uk | 020 3102 2141
We would love to have your feedback on how we
can improve this newsletter. Contact the Editor:
Geoff Courts | Marketing ManagerGeoff Courts | Marketing ManagerGeoff Courts | Marketing ManagerGeoff Courts | Marketing Manager
geoff@macnamarageoff@macnamarageoff@macnamarageoff@macnamara----ict.co.uk | 020 3102 2142ict.co.uk | 020 3102 2142ict.co.uk | 020 3102 2142ict.co.uk | 020 3102 2142
Cyber Streetwise Who We Are
This isn’t all of us, but we’re
the ones you are most likely
to come across.
Ciaran KennyCiaran KennyCiaran KennyCiaran Kenny
MD, came to
London from
Dublin in the
late 70’s
following the
punk movement. Worked on the
redevelopment of Baker St tube
before getting into IT, and has a
website
everystationinlondon.comeverystationinlondon.comeverystationinlondon.comeverystationinlondon.com
documenting the architecture
of, you guessed it, every station
in London
Geoff CourtsGeoff CourtsGeoff CourtsGeoff Courts
Has been with
Macnamara
for over 6 1/2
years. Plays
guitar and
bass in some bands but definitely
doesn’t sing. Practices Tai Chi
Chuan. Used to be a store
manager at Starbucks but
doesn’t like to talk about that.
Jack JonesJack JonesJack JonesJack Jones
Formerly
drum major in
the UK’s
leading youth
marching
band, has marched in the Lord
Mayors Show, and on a video for
The Feeling. Currently learning
trombone.
Jude BrownJude BrownJude BrownJude Brown
The newest
team member,
Jude is on an
apprenticeship
learning
technical pre-sales and support.
Formerly a holiday club rep and
barman, as well as army cadet.
Jargon BusterJargon BusterJargon BusterJargon Buster | Some definitions explained
Net Neutrality |Net Neutrality |Net Neutrality |Net Neutrality | The concept that all traffic on the internet should be treated equally, and be given equal
status by hardware and broadband providers.
4G |4G |4G |4G | The data network provided by mobile telecoms carriers. Faster than 3G, which most smartphones
are able to access, it can deliver speeds faster than some ADSL broadband connections.
Managed Print |Managed Print |Managed Print |Managed Print | More than just renting a printer, it often covers service and some consumables.
Geoff CourtsGeoff CourtsGeoff CourtsGeoff Courts Cyber security is something that, by
now, you will have realised we keep harping on
about.
The UK
government has a
standard known
as ISO27001 for
Information
Security
Management, and
achieving it
means that you
know you have a
secure system.
The cost of getting it can be quite high for a small
business though, which is why the lesser, but still
secure, scheme called Cyber Essentials has been
developed with SMEs in mind.
Macnamara will be helping our clients achieve this
standard in 2015, and as a result of the security
practices we put in place as standard the majority
will find they need to do little if anything new to
fully qualify.
Cyber StreetwiseCyber StreetwiseCyber StreetwiseCyber Streetwise
While the branding of the Cyber Streetwise
campaign makes it look a bit Sesame Street, the
principles behind the public awareness of the cyber
streetwise program are definitely valuable and
worth taking on board. The campaign covers simple
things like why installing software updates is a
good thing, and what secure passwords are.
For example, it’s not uncommon for our
customers to have trouble every now and then
choosing a new password because the word they
want to use isn’t complicated enough. The best
practice guide recommends a password that is
made up of multiple words, plus numbers and
symbols. Most password policies also require a
minimum of 8 letters.
“For example look around and pick three random
things that you can see like ‘plant’, ‘chair’ and
‘ink’. Put these three words together and swap
some of the letters for numbers and symbols like
this: pl@ntCha!r1nk Remember: The longer your
password is, the harder it is to crack. “
Much of the security is covered by us as standard,
and many of the suggestions have been discussed
in these pages. Recognising a secure website, why
we install updates on Servers and PCs, and maybe
the biggest one of all, the importance of ‘User
Awareness’, all play their part in keeping your
data, but also yourself, secure online.
For more details on getting qualified for Cyber
Essentials, just ask. Or we’ll be in touch soon
enough.