mmproxy – Creative Linux routing to preserve client IP addresses in L7 proxies

In previous blog post we discussed how we use the TPROXY iptables module to power Cloudflare Spectrum. With TPROXY we solved a major technical issue on the server side, and we thought we might find another use for it on the client side of our…

What do security certificates actually do?

In a previous post we saw the effect of encryption, trying to make content unreadable to anyone watching your traffic. Great, you may think, my DuckDuckGo searches are safe! Yes, but only if it’s really DuckDuckGo at the other end of your connection. There are…

Building Customers for Life is Core to Cisco’s Digital Transformation

In previous posts, I’ve shared many aspects of the massive digital transformation we are going through at Cisco. At the heart of this transition is the move… VISIT THE SOURCE ARTICLE Building Customers for Life is Core to Cisco’s Digital Transformation

Enterprise NFV Desgin and Use Cases – Part 3

Design Considerations for Branch Virtualization with NFV In the previous blogs (Part 1 and Part 2) on Enterprise NFV Design we discussed the concept of network function virtualization (NFV), its benefits, the foundation blocks and the design considerations of branch virtualization with NFV. In this…

IoT Edge Compute at its Best – Gluing together your IoT w/ Resin.io

In my previous blog post, I spoke to you about the need for compute at the IoT Edge and how Cisco provides two platforms (Cisco IOx and Cisco Kinetic) to help facilitate your Ops and App dev portions of your IoT engineering and development.  I also spoke…

Winter Olympics Cyber Attack Vulnerabilities – Computer Business Review

Add to favorites Travis Farral looks into the malicious activity around previous Olympic events, the geo-political instabilities surrounding South Korea, and the likely tactics malicious actors may take. With the Pyeongchang Winter Olympics staged in South Korea this year, there are multiple geo-political instabilities that…

China lacks talent to become powerhouse in artificial intelligence

… ‘s employer, a Beijing-based artificial intelligence start-up, doubled his previous salary … risk-assessment process. All of these artificial intelligence initiatives, ironically, require an abundances … VISIT THE SOURCE ARTICLE Author: || World Economic Forum

Big Read: 800 million global jobs risk being lost to automation by 2030

David Wei’s employer, a Beijing-based artificial intelligence start-up, doubled his previous salary and offered share options to entice him to come and work on the company’s AI-powered software for the legal industry. That was eight months ago. The 27-year-old programmer says he already regrets not…