VPN

The World’s First Layer 1 Blockchain for Bandwidth, PKT, to List on Bittrex Global

PKT | January 04, 2022

Bittrex Global announced PKT, the world’s first layer-1 blockchain for bandwidth, will list on its exchange later this month.

PKT is an open-source community project that monetizes unused internet bandwidth and provides an economic incentive for people to expand internet connectivity and network infrastructure with minimal technical knowledge required. The blockchain is Bitcoin-fork designed for microtransaction scalability with near-zero fees and 60 second block times.

PKT divides the Internet Service Provider (ISP) roles of infrastructure provider and network operator. In effect, this lowers the barrier of entry for entrepreneurs to become ISPs, and decentralizes internet access for billions of people worldwide.

We are excited to welcome such a unique blockchain project onto the exchange. Bittrex Global is pleased that it can serve as a vehicle of momentum for PKT and we look forward to seeing its many use cases come to fruition over the coming year.”

Stephen Stonberg, CEO of Bittrex Global

“I am excited to see the PKT community activated around the vision of taking the internet back from monopolistic telecom companies,” says Caleb James DeLisle, lead developer of PKT, “and for Bittrex Global providing the community with an on-ramp to participate.”

There are an estimated 200,000 cores mining the PKT Network globally and the mining pools have reported seeing over 100 Gb/s of sustained bandwidth, powered entirely by people from around the world. Mining difficulty and network bandwidth have increased more than 10,000% since January 2021.

The PKT Network use cases will include free VPN, launching in 2022, localized mesh networking, internet sharing, and a new token issuance protocol called Token Strike, which provides token and NFT issuance with near-zero cost gas fees. TokenStrike will launch in 2022 and enables anyone to tokenize and trade bandwidth in a decentralized bandwidth market. PKT is an internet built by the people, for the people.

About PKT
PKT is a decentralized high-speed data network that enables anyone to monetize their unused internet bandwidth. Powered by PacketCrypt, the world’s first bandwidth-hard proof-of-work, people who connect to the PKT Network are paid in PKT Cash ($PKT) every 60 seconds. PKT provides an economic incentive for people to grow internet connectivity and infrastructure with minimal technical knowledge. As the network grows, PKT drives bandwidth demand, which in turn drives down the cost of bandwidth, increases the speed of the PKT Network, and improves internet connectivity in both urban and rural areas worldwide. PKT is a decentralized community project with no company, no investors, and no pre-mine. The project is an extension of the open source cjdns mesh networking protocol, created by PKT lead developer Caleb James DeLisle in 2011, which makes it so people can get onto the internet without requiring a traditional ISP.

About Bittrex Global
Bittrex Global, the most secure digital asset exchange in the world, serves both retail and institutional clients, globally. Committed to helping users build wealth, Bittrex Global facilitates the purchase and trade of over 250 tokens. Through its use of cutting-edge technology, advanced security protocols, and a sophisticated elastic multi-stage wallet strategy, the company provides a high-level experience for professional and novice customers alike. Bittrex Global is a key player in driving widespread adoption of secure and decentralized methods to building wealth while remaining compliant and adhering to the wide array of regulatory measures across the globe.

Spotlight

This set of documents provides guidance on how to securely deploy VMware vSphere™ 4.1 (“vSphere”) in a production environment. The focus is on initial configuration of the virtualization infrastructure layer, which covers the following:The virtualization hosts (both VMware® ESX® 4 and VMware ESXi™ 4)

Spotlight

This set of documents provides guidance on how to securely deploy VMware vSphere™ 4.1 (“vSphere”) in a production environment. The focus is on initial configuration of the virtualization infrastructure layer, which covers the following:The virtualization hosts (both VMware® ESX® 4 and VMware ESXi™ 4)

Related News

VIRTUAL DESKTOP STRATEGIES

Verizon moves commercial traffic onto its 5G core

Verizon | October 19, 2022

After initial testing and friendly user trials of Verizon’s 5G core, the company recently began moving customer traffic onto the new cloud-native, containerized design core, which will offer unprecedented levels of service agility, flexibility and automated scalability. The Service-based architecture of the core consists of software applications, compute resources, networking, and storage. It is the part of the network that enables IP connectivity between a customer on the Verizon network and the services that a customer wants to use such as Internet access, voice calls, and enterprise applications. A higher level of operational autonomy unleashed in Verizon’s 5G core design will be critical for the next generation of services being enabled by new network technologies to serve consumer and enterprise customers. “Our mission has always been to build and operate the best, most reliable, highest performing, and secure networks in the world, The 5G Core is a critical step in achieving our goal. From the densification and virtualization work in the Radio Access Network, to the architectural design changes in the core of the network developed specifically for telco workloads, we are working to ensure customers not only have access to 5G, but have the most advanced, secure, and robust network to support the remarkable new solutions being developed on 5G technology.” Adam Koeppe, Senior Vice President of Network Technology, Strategy, and Planning at Verizon The Verizon Cloud Platform (VCP), on which the 5G core is built, is based on a Webscale software architecture with advanced technologies designed specifically for telco workloads. VCP is a distributed platform that supports edge services, private cloud services, Network Function Virtualization tools, Cloud Native Functions, Web applications, mapping and spatial analysis tools, orchestration tools, service assurance tools, auto-remediation, and compute offerings. Using VCP, Verizon’s 5G core will be able to achieve new levels of operational automation and adaptability to create differentiated customer experiences. This directional technology platform that enables MEC will support stand alone, non-stand alone, and VoNR services. Benefits of the 5G Core The advanced capabilities, high speed, increased bandwidth, and low latency of 5G is inspiring development of a wide variety of new use cases that include everything from massive numbers of IoT devices that use very few network resources, to smartphones with nearly infinite opportunities to use data, to more complex solutions such as AR/VR and mixed reality that will require massive computing capabilities and low latency on the edge of the network. Those solutions will each require different combinations of network capabilities. The 5G standalone core’s cloud-native virtualized applications, in combination with built-in Artificial Intelligence (AI) and Machine Learning (ML), will enable the dynamic allocation of the appropriate resources, referred to as network slicing. It will also allow for automated network configuration changes, including the ability to scale up or scale down network function capacity - to provide the right service levels and network resources needed for each use case. In addition to network slicing and dynamic resource allocation, Verizon’s new 5G core will provide other benefits: Real-time resource management of Radio Access Network and core virtual container-based network functions Advanced analytics of network data to improve network performance Optimized services between Verizon's fixed and mobile networks Scalable, more cost-efficient architecture Ability to move workloads to fit use case requirements “Bringing traffic onto the newly designed core coincides with the ecosystem development around us. With a critical number of customers now having devices that can access the advanced features of the 5G core and the solutions and applications development – especially for enterprise customers – really taking off, now is the ideal time to move traffic onto the new core,” said Koeppe.

Read More

VPN

HashiCorp Extends its Zero Trust Security Solution with Secure Remote Access Delivered in the Cloud

HashiCorp | October 10, 2022

HashiCorp, Inc. a leading provider of multi-cloud infrastructure automation software, today announced the general availability of HashiCorp Cloud Platform (HCP) Boundary, a secure remote access product. With this release, Boundary joins HCP Vault and HCP Consul to provide the industry’s first zero trust security solution to secure applications, networks, and people built for the cloud. As organizations move to the cloud and adopt cloud operating models, they require a different approach to security — commonly referred to as zero trust security — where the default security posture is to trust nothing, authenticate and authorize everything. But the gap between legacy security postures and the accelerated move to the cloud is contributing to a significant increase in security breaches. According to the HashiCorp State of Cloud Strategy Survey, 89% of respondents believe security is the number one determining factor for cloud success, which is driving organizations to adopt zero trust security postures. HashiCorp’s approach to zero trust security focuses on using identity to secure applications, networks, and people across multiple clouds, on-premises, and hybrid environments, which reduces the attack surface and automates complex security workflows. This ensures people, machines, and services are authenticated, every action is authorized, and data is protected. “As organizations continue to expand their cloud estates, they must shift their security strategies to keep up with the growth and complexity of applications, network components, and cloud-based systems, At HashiCorp, we have always believed that identity is the foundation for zero trust security for applications, networks, and users. With HCP Boundary, companies now have a modern solution for privileged access management, securing access in dynamic, ephemeral environments for their workforce. We think we’ve reached an important milestone for our customers by delivering a security solution built for today’s threat and infrastructure landscape.” Armon Dadgar, co-founder and CTO, HashiCorp As organizations move out of traditional datacenters and into multiple clouds, hybrid, and edge environments, securing their infrastructure becomes more complex at scale. The HashiCorp zero trust solution covers all three of these aspects: Applications: HashiCorp Vault provides a consistent way to manage application identity by integrating many platforms and identity providers. Vault enables fine-grained access control and authorization between applications and databases, including dynamically rotating credentials, PKI certificates, and API tokens, while also ensuring application data is always secure in transit and at rest. Networks: HashiCorp Consul secures network traffic between applications and services, enabling fine-grained access control policies, observability, and traffic shaping. Consul integrates with Vault’s identity platform to leverage application identity for the policies and to allow dynamic PKI. People: HashiCorp Boundary ensures the right people have access to the right systems and cloud services while removing the need to distribute and issue credentials, expose private networks, or manage static credentials. Boundary integrates with Vault to issue just-in-time credentials and ensure ephemeral access to critical systems. General Availability of HCP Boundary HCP Boundary provides a secure remote access solution for a cloud operating model, offering improvements over existing software-defined perimeter (SDP) solutions, like VPNs, and privileged access management (PAM) solutions that are IP-driven and highly manual. With HCP Boundary, teams gain fine-grained authentication and authorization controls, rapid user onboarding, and automated workflows for target discovery and credential management for ephemeral resources. As a cloud-based service, HCP Boundary benefits organizations struggling with security as they transition to the cloud, driven by people and skills shortages. HCP Boundary allows teams and users to access the critical systems they need while abstracting the session connection, establishment, credential issuance, and revocation. Boundary provides operations and security teams the ability to dynamically pull in cloud service catalogs and on-premises resources and map out policies to which systems, users, and groups should have access. To do this Boundary leverages Vault to provide passwordless connections, and after each use revokes the credentials. This helps ensure critical information like credentials, networks, and resources are never exposed to the user or outside actors. In addition to core secure remote access capabilities, Boundary also offers: Identity platform integration with Microsoft Azure Active Directory and Okta, along with many other identity platforms that support OpenID Connect to onboard trusted identities and delegate authentication Role-based access control (RBAC) to provide broad or fine-grained access to people throughout your organization Passwordless authentication for seamless integration with dynamic secrets and Vault Automated service discovery for streamlined discovery and configuration of targets. Dynamic host catalogs are currently available with Microsoft Azure and AWS, as well as direct HashiCorp Terraform integration to pull in resources under management Session visibility and logging to get insights into session metrics, events, logs, and traces with the ability to export data to business intelligence and event monitoring tools About HashiCorp HashiCorp is a leader in multi-cloud infrastructure automation software. The HashiCorp software suite enables organizations to adopt consistent workflows and create a system of record for automating the cloud: infrastructure provisioning, security, networking, and application deployment. HashiCorp’s portfolio of products includes Vagrant™, Packer™, Terraform®, Vault™, Consul®, Nomad™, Boundary™, and Waypoint™. HashiCorp offers products as open source, enterprise, and as managed cloud services. The company is headquartered in San Francisco, though most of HashiCorp employees work remotely, strategically distributed around the globe.

Read More

HYPER-V,SERVER ,CONTAINERS

Verizon expands VRAN leadership position with addition of first Ericsson VRAN cell site into its network

Verizon | December 09, 2022

Verizon, the leader in Virtualized Radio Access Network (VRAN) innovation, announced today it has extended its network virtualization efforts with the addition of the first Ericsson virtualized cell site (also referred to as Ericsson Cloud RAN), with support from Intel and RedHat providing the processing and cloud-native orchestration functions. The advancements in Radio Access Network virtualization allows Verizon to rapidly respond to customers’ varied latency and computing needs, and provides greater flexibility and agility in the introduction of new products and services. The move to a cloud-native, virtualized architecture with standardized interfaces in every part of the network leads to greater flexibility, faster delivery of services, greater scalability, and improved cost efficiency in networks. Verizon has been a global leader in virtualizing its network, announcing recently it already has 8,000 cell sites already virtualized in its network with an eye towards virtualizing 20,000 sites. Virtualizing the far edge of the RAN – the cell sites closest to the customer - is a function of decoupling the hardware and software associated with a cell tower and transitioning the software so that it’s not just stored in the cloud, but is designed for a cloud-native architecture and operation. Just this week, Verizon and Ericsson published a position paper outlining the optimal technology path for VRAN in order to maximize the performance and efficiency of the network, disaggregate hardware from software, and simplify deployment wherever possible. This technology is built into the first Ericsson virtualized cell site deployed in the Verizon network. Components of VRAN Verizon coordinated with many ecosystem partners to welcome Ericsson’s first virtualized cell site. Ericsson provided its commercial 5G Cloud RAN solution, consisting of a virtualized Central Unit (vCU), a virtualized Distributed Unit (vDU), and radio units. This software-based 5G Cloud RAN solution spans across all of Verizon’s frequency bands, utilizing both FDD and TDD 5G spectrum assets, including Massive MIMO support for C-band and interconnecting previously deployed equipment to enable Ericsson Spectrum Sharing between LTE and NR carriers. The Ericsson Cloud RAN solution offers Verizon efficiency and in network deployment and operational management transformation. Intel provided its 3rd Gen Intel Xeon Scalable processor, Intel vRAN Dedicated Accelerator ACC100 and Intel Ethernet Network Adapter E810 to deliver the processing, acceleration and connectivity requirements. Red Hat provided Red Hat OpenShift and Red Hat Advanced Cluster Management for Kubernetes to manage their fleet at scale in collaboration with Red Hat Consulting. As part of the solution, Red Hat Advanced Cluster Management delivers cloud-scale manageability by configuring the 5G RAN using a Distributed Unit (DU) profile, which deploys real-time OS kernel optimizations to run vRAN and other cloud-native application workloads from a single console. Red Hat OpenShift also incorporates zero-touch provisioning to enable distributed deployment at scale required to operate a large scale RAN. Virtualization paves the way for exciting innovation Verizon has been leading the way in virtualization with its vendor partners for years. Verizon began the journey by virtualizing the core of its network. In the years since, Verizon has been working with partners in lab trials and field tests and has been deploying cloud-based cell sites, building programmability into the network to meet the needs of today’s 5G customers and 5G solutions of tomorrow. Key 5G use cases focused on providing the best, most efficient network for customers, will heavily rely on the programmability of virtualized networks. Networks must serve IoT devices that do very little networking and stay in place, smartphones with infinite opportunities to use data in a highly mobile environment, and complex solutions like Augmented Reality that require massive computing capabilities on the edge of the network. These various network solutions rely on a correlated variety of resources from the network, which until recently have been defined rigidly and manually. Using orchestration and automation capabilities at scale on virtual infrastructure, Verizon automates network configuration changes and resource scaling dynamically based on demand. This is one of the greatest benefits of virtualizing a network - essentially building programmability into the network. Verizon Communications Inc. (NYSE, Nasdaq: VZ) was formed on June 30, 2000 and is one of the world’s leading providers of technology and communications services. Headquartered in New York City and with a presence around the world, Verizon generated revenues of $133.6 billion in 2021. The company offers data, video and voice services and solutions on its award-winning networks and platforms, delivering on customers’ demand for mobility, reliable network connectivity, security and control.

Read More