Weekend Reads 080422


Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.


However, open source has an urgent security problem. Open source is more ubiquitous and susceptible to persistent threats than ever before.


You’ve done everything to secure your network, and you still face threats. That’s what most enterprises say about their network security, and they’re half right.

Hedge 141: Improving WAN Router Performance

Wide area networks in large-scale cores tend to be performance choke-points—partially because of differentials between the traffic they’re receiving from data center fabrics, campuses, and other sources, and the availability of outbound bandwidth, and partially because these routers tend to be a focal point for policy implementation. Rachee Singh joins Tom Ammon, Jeff Tantsura, and Russ White to discuss “Shoofly, a tool for provisioning wide-area backbones that bypasses routers by keeping traffic in the optical domain for as long as possible.”

BGP Peering (part 1)

Why does BGP use TCP for peering? What happens if two BGP speakers begin the peering process at the same time? In this video, recorded for Packet Pushers, I start looking at the BGP peering process.

philly 101110 sq

Thirteen (Philadelphia)

2014 warsaw (120)_sq

Dorr and Column (Warsaw)

2018 molde norway (9)_sq

Cathedral (Molde)