Certifications

‘net Neutrality Collection

I've run across a lot of interesting perspectives on 'net Neutrality; to make things easier, I've pulled them onto a single page. For anyone who's interested in hearing every side of the issue, this is

By |December 14th, 2017|Categories: LEFT, OTHER|0 Comments

DDOS and The DNS

The Mirai DDOS attack happened just over a year ago, on the 21st October 2016. The attack was certainly a major landmark regarding the sorry history of "landmark" DDOS attacks on the Internet. It's up

By |December 5th, 2017|Categories: WORTH READING|0 Comments

Worth Reading: Hiding the DNS

Among all the working groups that met at IETF 100 in Singapore was the first meeting of the DNS over HTTPs Working Group (DOH). I wrote on a related topic of DNS privacy a little

By |December 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hiding the DNS

Worth Reading: Big Four Shift Open Source Licensing

The GNU Public License version 2 (GPLv2) is arguably the most important open-source license for one reason: It's the license Linux uses. On November 27, three Linux-using technology powers, Facebook, Google, and IBM, and the

By |December 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Big Four Shift Open Source Licensing

Upcoming Seminar: Brighttalk on the future of networking

On Tuesday the 5th, I'm participating in a webcast discussion about the future of networking over at Brighttalk. The details and registration linked below. I'll be in a hotel room; I'm hoping the audio and

By |December 1st, 2017|Categories: LEFT, OTHER|Comments Off on Upcoming Seminar: Brighttalk on the future of networking

Weekend Reads 120117

There’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have

By |December 1st, 2017|Categories: WEEKEND READS|Comments Off on Weekend Reads 120117

Worth Reading: Open Source Supply Chain

Diversity and inclusivity in the technology industry—and in open source communities more specifically—have received a lot of coverage, both on Opensource.com and elsewhere. One approach to the issue foregrounds arguments about concepts that are more

By |December 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open Source Supply Chain

Worth Reading: Openstack and CITC

In this blog post I will be discussing how I leveraged a flat network to initially create simple instance deployments. Then I’ll dive more deeply into how I created a VXLAN network for my OpenStack

By |November 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Openstack and CITC

Worth Reading: Gen-Z

Servers have become increasingly powerful in recent years, with more processing cores being added and accelerators like GPUs and field-programmable gate arrays (FPGAs) being added, and the amount of data that can be processed is

By |November 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Gen-Z

Worth Reading: ONAP Amsterdam

The Open Network Automation Platform, a Linux Foundation project, has released ONAP Amsterdam, an open-source platform to enable network automation for carriers and service providers. ONAP Amsterdam includes open-source software for orchestration and automation, as

By |November 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ONAP Amsterdam

Worth Reading: Quad9

In a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection.

By |November 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Quad9

Worth Reading: DNS performance metrics

Most of these benchmarks focus on denial-of-service resistance: What is the maximum query load that can be served? This is indeed a metric that is good to know. Less discussed, however, is performance under normal

By |November 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DNS performance metrics

Worth Reading: Assessing Cloud Vendors

When it comes to evaluating new vendors, it can be challenging to know how best to communicate the requirements of your vendor assessment process and ultimately select the right partner to help your business move

By |November 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Assessing Cloud Vendors

‘Net Neutrality Reader

There is a lot of talk about the "end of 'net neutrality" because of the recent announcements made by the United State Federal Communications Commission (FCC). With so much out there, it is often important

By |November 27th, 2017|Categories: LEFT, OTHER|Tags: |Comments Off on ‘Net Neutrality Reader

Worth Reading: Tech Ageism

A majority of workers over 30 are worried about losing their jobs because of the ageism in tech, according to a recent report from Visier, an employee data analytics company. It pulled HR data from

By |November 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tech Ageism

Holiday Weekend Reads (22nov17)

The coming holiday is cutting my publishing schedule short, but I didn't want to leave too many interesting stories on the cutting room floor. Hence the weekend read comes early this week, and contains a

By |November 22nd, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Holiday Weekend Reads (22nov17)

Worth Reading: A Request for Clarity

The other day I was researching a product for a blog I was writing. After twenty or so minutes on the Web page, I still had no clear idea what the product did or how

By |November 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A Request for Clarity

Worth Reading: Amazon is the new Microsoft

Microsoft in the Bill Gates era was truly full of itself, pushing competitors around, crushing enemies and occasionally breaking the law as a bevy of anti-trust settlements show. Microsoft was the second most valuable company

By |November 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Amazon is the new Microsoft

Worth Reading: Intel moves into 5G

The Intel XMM 8000-series of 5G-capable modems will bring the next generation of wireless connectivity to PCs, smartphones and infrastructure devices with a target consumer-product launch in mid-2019. Intel INTC, -2.23% also updated plans for

By |November 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Intel moves into 5G

Thoughts on Open/R

Since Facebook has released their Open/R routing platform, there has been a lot of chatter around whether or not it will be a commercial success, whether or not every hyperscaler should use the protocol, whether

By |November 21st, 2017|Categories: LEFT, RESEARCH, ROUTING, TECHNOLOGY|Tags: , |Comments Off on Thoughts on Open/R

Worth Reading: Infiniband Quantum Leap

InfiniBand and Ethernet are in a game of tug of war and are pushing the bandwidth and price/performance envelopes constantly. But the one thing they cannot do is get too far out ahead of the

By |November 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Infiniband Quantum Leap

Worth Reading: Docker Networking

There’s been a lot of talk about container networking in the industry lately (heck, we can’t even stop talking about it). And it’s for a good reason. Containers offer a fantastic way to develop and

By |November 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Docker Networking

Weekend Reading: 2017-11-17

There’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have

By |November 17th, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Weekend Reading: 2017-11-17

Worth Reading: Court Overreach with SOPA

Nearly six years ago, Internet user communities rose up and said no to the disastrous SOPA copyright bill. This bill proposed creating a new, quick court order process to compel various Internet services—free speech’s weak

By |November 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Court Overreach with SOPA

Worth Reading: Accoung Hijacks

Account takeover, or ‘hijacking’, is unfortunately a common problem for users across the web. More than 15% of Internet users have reported experiencing the takeover of an email or social networking account. However, despite its

By |November 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Accoung Hijacks

Worth Reading: Anonymous Speech Takes a Hit

First Amendment protections for anonymous speech online were dealt a serious blow earlier today when the United States Court of Appeals for the Ninth Circuit issued its opinion in United States v. Glassdoor. In its

By |November 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Anonymous Speech Takes a Hit

Worth Reading: Continuous Infrastructure

Continuous delivery (CD) and continuous integration (CI) are two well-known aspects of DevOps. But the CI in vogue today is missing a critical “I:” infrastructure. There was a time when "infrastructure" meant headless black boxes,

By |November 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Continuous Infrastructure

Worth Reading: Route Leaks

Route leaks are a fact of life on the Internet. According to one ISP's observations, on any given day of the week, between 10-20% of announcements are actually leaks. Type 6 route leaks can be

By |November 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Route Leaks

Worth Reading: GPL Licenses

The GPL family of licenses is unique among open source licenses in how past, current, and future versions of the license may apply to the software program. By not fully understanding this unique license feature,

By |November 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: GPL Licenses

Worth Reading: Fog and Open Source

Edge computing, like public cloud at scale, requires a convenient, powerful cloud software stack that can be deployed in a unified, efficient and sustainable way. Open source is leading the way. -- Mark Collier @

By |November 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fog and Open Source

Weekend Reads 2017-05-11

We're quietly replacing an open web that connects and empowers with one that restricts and commoditizes people. We need to stop it. I quit Facebook seven months ago. Despite its undeniable value, I think Facebook

By |November 10th, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Weekend Reads 2017-05-11

Worth Reading: Fixing the Plumbing

At LinkedIn, we pay attention to site speed at every step of the release process, from code development to production ramp. But inevitably, the performance of our pages degrades over time (we use the word

By |November 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fixing the Plumbing

Worth Reading: Choosing a developer job

See, in my employment searches, I’ve always focused on which tech stack a company used or if I thought I would be a successful employee from a technical perspective. If I liked the people and

By |November 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Choosing a developer job

Worth Reading: The ROCA Encryption Vulnerability

Yes. It’s serious in practice and in principle. Infineon used a flawed key generation routine, which means those keys are easier to crack, and the routine is used in chips embedded in a wide variety

By |November 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The ROCA Encryption Vulnerability

Worth Reading: New Exploits, Old Techniques

The use of tunnelling to subvert traffic is in no way new and the article itself covers many of the tunnelling approaches that have been used to set up covert channels for well over a

By |November 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: New Exploits, Old Techniques

Worth Reading: Why 5G is in trouble

I have a somewhat unconventional view of 5G. I just happen to believe it is the right one. It is trapped inside a category error about the nature of packet networking, and this means it

By |November 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why 5G is in trouble

A glance back at the looking glass: Will IP really take over the world?

In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical

By |November 6th, 2017|Categories: LEFT, RESEARCH, ROUTING|Tags: , , |Comments Off on A glance back at the looking glass: Will IP really take over the world?

Worth Reading: Should we trust geolocation?

Geolocation databases are often used by both researchers and network operators to learn the real-world location of a given IP address. But how reliable are these in terms of coverage and accuracy at both country-

By |November 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Should we trust geolocation?

Weekend Read: Don’t be true to yourself

A dedication to egalitarianism can cut both ways: uplifting the lower or bringing down the higher. I would argue that this happens not only in society but also within our souls. For egalitarianism would have

By |November 3rd, 2017|Categories: WORTH READING|Comments Off on Weekend Read: Don’t be true to yourself

Worth Reading: Days of our stolen identities

The Equifax saga continues like a soap opera, Days of Our Stolen Identity. Every time it appears the Equifax drama is ending, a new report surfaces confirming additional security issues. —Kate Donofrio @ CSA

By |November 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Days of our stolen identities

Worth Reading: Checklists

Thirty-six seconds after launch, lightning struck the Apollo 12 and its six million pounds of high explosive fuel. The instruments blacked out. Twenty-two seconds later lightning struck again. What few instruments remained started flashing red

By |November 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Checklists

Worth Reading: Low Earth Satellite Internet Access

Satellites are now cheaper, smaller and lighter. OneWeb and their manufacturing partner Airbus say automation and re-design will enable them to manufacture three satellites per day at a cost of less than $1 million each

By |November 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Low Earth Satellite Internet Access

Worth Reading: Hack it back is a bad idea

If there were a prize for the worst cybersecurity policy idea that just won’t die, it would have to go to “hacking back,” or making it legal for people to attack the computers that are

By |October 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hack it back is a bad idea

Worth Reading: The Look It Up Fallacy

The first problem behind the “Look it Up” fallacy has to do with definitions of words. Most words have more than one definition, and even when they don't have more than one main definition, there

By |October 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Look It Up Fallacy

Worth Reading: An observatory for path transparency measurement

Though the end-to-end principle and the four-layer TCP/IP architecture suggest that what happens above the IPv4 or IPv6 header isn’t any of the network’s business, the widespread deployment of firewalls, network address translators, proxies, and

By |October 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: An observatory for path transparency measurement

Worth Reading: Raw sockets in IPv6

As part of a measurement experiment, we wanted an implementation of an IPv6 UDP server and a TCP server that generated fragmented IPv6 packets. However, as an added condition, we wanted the application to directly

By |October 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Raw sockets in IPv6

Several on KRACK

Three articles of interest on the new WiFi KRACK— This is not a crypto bug but a protocol bug (a pretty obvious and trivial protocol bug). When a client connects to the network, the access-point

By |October 26th, 2017|Categories: LEFT, NORESHARE, SECURITY|Comments Off on Several on KRACK

Worth Reading: 4 Tips to Fight Propoganda

Disturbingly, both men confirmed the totality of propaganda in our society. And they did that many, many decades ago and well before the internet, social media, cable TV, or data mining. By 2017, many generations

By |October 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: 4 Tips to Fight Propoganda

On the ‘web: Failure Isn’t an Option

As I have been told many times, these sorts of Chaos Monkey things simply cannot be applied to the average “enterprise grade” network. For instance, “if you think the hospital administration is going to allow

By |October 24th, 2017|Categories: ON THE NET|Comments Off on On the ‘web: Failure Isn’t an Option

Worth Reading: TLS and Data Center Monitoring

Over the course of four years, Transport Layer Security (TLS) 1.3 has been designed to be more secure in order to prevent the interception of sessions over the Internet. It has a more secure key

By |October 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: TLS and Data Center Monitoring

Worth Reading: The Economics of DDoS

These days, there are typically three parties to a distributed denial of service attack. You probably know about two of them: the perpetrator and the target. Less well known is the vast and growing number

By |October 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Economics of DDoS

Worth Reading: Stealing Passwords by Asking

Do you want the user's Apple ID password, to get access to their Apple account, or to try the same email/password combination on different web services? Just ask your users politely, they'll probably just hand

By |October 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Stealing Passwords by Asking

Worth Reading: Stop Blaming Open Source

Despite the known threats, many organisations continue to point fingers at open source platforms for poor security practices. But do you really think these platforms are the ones that need to be blamed? Coming back

By |October 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Stop Blaming Open Source

Worth Reading: Responsible Encryption Fallacies

Moreover, instead being a solution to cyber threats, law enforcement has become a threat itself. The DNC didn't have the FBI investigate the attacks from Russia likely because they didn't want the FBI reading all

By |October 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Responsible Encryption Fallacies

Worth Reading: 10 Layers of Container Security

Containers provide an easy way to package applications and deliver them seamlessly from development to test to production. This helps ensure consistency across a variety of environments, including physical servers, virtual machines (VMs), or private

By |October 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: 10 Layers of Container Security

Worth Reading: The Largest Hole in Cloud Security

Configuration errors made while using cloud-storage services are common, security experts say, and often occur when users set access permissions so someone outside of the company—say, a vendor—can see data. “More data has been lost

By |October 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Largest Hole in Cloud Security

Worth Reading: GDPR and Personal Data

With the General Data Protection Regulation (GDPR) becoming effective May 25, 2018, organizations (or rather, organisations) seem to be stressing a bit. Most we speak with are asking, “where do we even start?” or “what

By |October 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: GDPR and Personal Data

Worth Reading: The Importance of Setting Goals

As Tom Garriga, president of Tang Wei Martial Arts Institute, tells us, “A goal is an enemy to be conquered with a battle strategy and the commitment of a warrior. The leadership process is founded

By |October 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Importance of Setting Goals

Worth Reading: The Madness of Speed Tests

We know how to X-ray a network, and the results are rather revealing. If you use the right metrics, you can also model the performance limits of any application from the measurements you take. Even

By |October 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Madness of Speed Tests

Adminstravia 20171009

Where's Russ? This is my second week of PhD seminars this fall—the only time in this program I intend to take two seminars back to back. One of the two was, in fact, very deep

By |October 9th, 2017|Categories: LEFT, OTHER|Comments Off on Adminstravia 20171009

Worth Reading: Open Source Licenses

Today, the GPL license that Stallman pioneered is in its third version (GNU GPLv3) and is only one of several dozen types of open source licenses. The Open Source Initiative, an organization founded in 1998

By |October 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open Source Licenses

Light/No Blogging this Week

I'm trying to get through the final bits of this new book (which should publish at the end of December, from what I understand), and the work required for a pair of PhD seminars (a

By |September 25th, 2017|Categories: LEFT, OTHER|Comments Off on Light/No Blogging this Week

Worth Reading: Distrusting Symantic Certificates

At the end of July, the Chrome team and the PKI community converged upon a plan to reduce, and ultimately remove, trust in Symantec’s infrastructure in order to uphold users’ security and privacy when browsing

By |September 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Distrusting Symantic Certificates

Worth Reading: BlueBorne

Bluetooth is ubiquitous, commonly connecting accessories like headsets and keyboards, but is also used throughout the brave new Internet of Things (IoT) world. An attacker exploiting these BlueBorne vulnerabilities can mount a man-in-the-middle attack, or

By |September 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: BlueBorne

Worth Reading: Hacking through subaudible commands

Chinese researchers have discovered a terrifying vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei. It affects every iPhone and Macbook running Siri, any Galaxy phone, any PC running Windows 10, and

By |September 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hacking through subaudible commands

Worth Reading: Docbook

Computers were first invented to do math, and they do it really well. But it didn't take long for users to repurpose their futuristic calculators into fancy, dynamic typewriters. Now human-readable text drives computing, so

By |September 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Docbook

Reaction: Networks are not cars or cell phones

The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! You can

By |September 20th, 2017|Categories: BGP|Comments Off on Reaction: Networks are not cars or cell phones

Worth Reading: WeChat spying revelations

It has long been known that due to WeChat keeping its servers inside China, the lack of legal protection of privacy data, and the control over companies by police, that WeChat data is not safe,

By |September 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: WeChat spying revelations

Worth Reading: Hyperconvergence and silos

Hyperconverged infrastructure (HCI) promises benefits in several dimensions: streamlining deployments across compute, storage and networking; scaling linearly as needs grow; and unifying and simplifying management. When examining prospective HCI solutions, it’s important to ensure this

By |September 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hyperconvergence and silos

Worth Reading: Why you should have a CAA DNS record

This Friday, all certificate authorities will have to honor a Domain Name System (DNS) record that allows HTTPS website owners to restrict who can issue SSL certificates for their domain names. It’s a long-needed defense

By |September 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why you should have a CAA DNS record

Worth Reading: Work life balance

Miserable at work? You’re not alone. More than half of U.S. employees were not engaged at work between 2010 and 2012 according to Gallup’s recent State of the American Workplace report, which collected data from

By |September 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Work life balance

Worth Reading: Hunting AdwindRAT

An increasing number of malware families employ SSL/TLS encryption in order to evade detection by Network Intrusion Detection Systems (NIDS). In this blog post I’m gonna have a look at Adwind, which is a cross-platform

By |September 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hunting AdwindRAT

Worth Reading: How blockchain really works

A distributed database that is used to maintain a continuously growing list of records, called blocks. That sounds nice, but how does it work? To illustrate a blockchain, we will use an open source command-line

By |September 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: How blockchain really works

Worth Reading: Planning for cloud’s limitations

Protecting data from losses requires a well-planned data-management strategy. Many strategic plans include using cloud services, but IT and other departments must understand the cloud’s strengths and limitations when it comes to protection. The benefits

By |September 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Planning for cloud’s limitations

Worth Reading: Retrieval and relevance

Our expectations for search have gotten higher and higher since Google has gotten better and better. These days, very few people search beyond the first page. If those search results aren’t good enough, they’ll either

By |September 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Retrieval and relevance

Worth Reading: Global content removals

From the Internet's earliest days, the tension between a global communication network and local geography-based laws has been obvious. One scenario is that every jurisdiction's local laws apply to the Internet globally, meaning that the

By |September 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Global content removals

Worth Reading: Common issue detection for CPU profiling

Profiling of services is a useful method to find optimizations to improve service performance; the ODP (“On-Demand Profiling”) framework has helped identify many performance problems at LinkedIn. However, as these analyses and subsequent optimizations are

By |September 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Common issue detection for CPU profiling

On the ‘web: The Future of Data Center Fabrics

Recorded live at IETF 99, this Priority Queue episode is a roundtable conversation on new and emerging ideas for data center fabrics. Greg Ferro is joined by Jeff Tantsura, a chair of the routing working

By |September 12th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘web: The Future of Data Center Fabrics

Worth Reading: Gen-Z

It has been almost a year now since Gen-Z launched, and the consortium is growing and the specifications are being cooked up by the techies. The core Gen-Z spec was published in December 2016 and

By |September 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Gen-Z

Worth Reading: In defense of NATs

Network Address Translation (NAT) has often been described as an unfortunate aberration in the evolution of the Internet, and one that will be expunged with the completion of the transition to IPv6. I think that

By |September 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: In defense of NATs

Worth Reading: Security is a System Property

here's lots of security advice in the press: keep your systems patched, use a password manager, don't click on links in email, etc. But there's one thing these adages omit: an attacker who is targeting

By |September 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Security is a System Property

Worth Reading: Time is not on your side

Many of the presenters, like Truman Boyes of Bloomberg and Peyton Maynard-Koran of EA, discussed the idea of building boxes from existing components instead of buying them from established networking vendors like Cisco and Arista.

By |September 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Time is not on your side

Worth Reading: Improving metrics in cyber resiliency

With the growth in cloud computing, businesses rely on the network to access information about operational assets being stored away from the local server. Decoupling information assets from other operational assets could result in poor

By |September 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Improving metrics in cyber resiliency

Worth Reading: Cloud data storage data planes

And while such backup solutions solved the traditional data center backup to tape, and eventually disk, really well, the solution does not readily translate into a distributed multicloud solution. That’s where a data protection solution

By |September 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cloud data storage data planes

Worth Reading: Why culture company matters

The impact of a company’s culture is reflected in a company’s ability to achieve their goals and productivity levels, and in their employees’ satisfaction. The company culture can make or break a business. Yet, company

By |September 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why culture company matters

Worth Reading: When the cloud deletes our data

When we talk about people losing their data in the cloud, the conversation typically revolves around hackers, violating terms of service or sites going out of business. However, it is important to remember that in

By |September 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: When the cloud deletes our data

Worth Reading: The rise of fourth wave computing

According to a recent Jefferies report, the fourth wave of computing has started and it is being driven by the adoption of IoT with parallel processing as the solution. Tectonic shifts in computing have been

By |September 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The rise of fourth wave computing

Worth Reading: Is your mobile carrier your weakest link?

More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying

By |September 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is your mobile carrier your weakest link?

Worth Reading: Malware in your screen

Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by thirdparty manufacturers and not by the phone vendors themselves. Third-party driver source code to

By |September 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Malware in your screen

Worth Reading: Wave System’s DPU architecture

Their view is that dataflow architectures are the only way to efficiently train networks with high performance. The CPU is carved out of their systems entirely and as we explained when first details were clear

By |September 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Wave System’s DPU architecture

Worth Reading: Updating Surveillance Laws

For decades, Americans have forfeited their privacy rights for a false sense of safety. Broad, sweeping surveillance laws––such as, but certainly not limited to Section 702 of the FISA Amendments Act––have given the federal government

By |September 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Updating Surveillance Laws

Worth Reading: Multitasking without Thrashing

Human context switching is more complicated than computer context switching. Whereas the computer context switch replaces a fixed number of bytes in a few CPU registers, the human has to recall what was "on the

By |August 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Multitasking without Thrashing

Worth Reading: The calculus of service availability

The vast majority of software services and systems should aim for almost-perfect reliability rather than perfect reliability—that is, 99.999% or 99.99% rather than 100%—because users cannot tell the difference between a service being 100% available

By |August 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The calculus of service availability

Worth Reading: IoT needs a paradigm shift

Building IoT ventures from scratch by prototyping hardware devices and their backend systems as well as working for a large company that tries to sell IoT devices itself, we learned a lot about the pitfalls

By |August 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IoT needs a paradigm shift

Worth Reading: ROI is not a cybersecurity concept

In the cybersecurity community, much time is spent trying to speak the language of business, in order to communicate to business leaders our problems. One way we do this is trying to adapt the concept

By |August 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ROI is not a cybersecurity concept

Worth Reading: Is it time to build an anti-DDoS alliance?

A functional “anti-DOS alliance” is only feasible if SP”s are ready to commit to specific frugal investments. These ‘ prudent commitments’ will not require millions of dollars in anti-DOS technology. The commitments will require a

By |August 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is it time to build an anti-DDoS alliance?

Worth Reading: The rise of info-monopolies

Salil Mehta is a statistician and well-known public intellectual. See his impressive bio. He has been cited in major publications, such as the NYT. But Google closed his email and website (Statistical Ideas) down without

By |August 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The rise of info-monopolies

Worth Reading: Open core, open perimeter

Today, software development is built around APIs. Instead of embedding a vendor's product into their application, developers can call an API to consume services from a vendor. The developers don't need to know what's responding

By |August 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open core, open perimeter

Worth Reading: Detecting network outages with RIPE ATLAS

As much as we dislike it, large-scale Internet outages do happen, sometimes as a result of technical problems or sometimes even politically motivated. We’d like to be notified when these outages occur, ideally in real-time,

By |August 24th, 2017|Categories: VIDEO|Comments Off on Worth Reading: Detecting network outages with RIPE ATLAS

Worth Reading: IPv6, large packets, and DNS

It appears that rather than effecting a slight improvement from IPv4, the manner of fragmentation handling in IPv6 appears to be significantly worse than IPv4. Little wonder that there have been calls from time to

By |August 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv6, large packets, and DNS

Worth Reading: Testing in Production

There are lots of things you already test in prod—because there's no other way you can test them. Sure, you can spin up clones of various system components or entire systems, and capture real traffic

By |August 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Testing in Production

Worth Reading: The changing UX of European Banking

How you see and interact with your online bank accounts is about to change. That’s because Europe is forcing change into the financial market. Digital transformation is a thing this decade. “Digital disruption,” startups who

By |August 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The changing UX of European Banking

Worth Reading: Transitioning to a single root

APNIC is in the process of transitioning from the current Resource Public Key Infrastructure (RPKI) trust anchor arrangement to a new configuration which has been agreed among the RIRs, and announced by the NRO. In

By |August 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Transitioning to a single root

Master of None

Should you be a johnny do-it-all, or so deep that no-one understands what you are saying? It's time to talk about the shape of knowledge—and how important it is to be intentional about

By |August 21st, 2017|Categories: LEFT, MENTAL, VIDEO|1 Comment

Worth Reading: On ISO standardization of blockchains

So ISO, the primary international standards organization, is seeking to standardize blockchain technologies. On the surface, this seems a reasonable idea, creating a common standard that everyone can interoperate with. But it can be silly

By |August 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: On ISO standardization of blockchains

Worth Reading: DNS query name minimization

One new thing you need to add your DNS security policies is "query name minimizations" (RFC 7816). I thought I'd mention it since many haven't heard about it. Right now, when DNS resolvers lookup a

By |August 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DNS query name minimization

Worth Reading: Supporting new DNS RR types

The Domain Name System has always been intended to be extensible. The original spec in the 1980s had about a dozen resource record types (RRTYPEs), and since then people have invented many more so now

By |August 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Supporting new DNS RR types

Worth Reading: Hacking through the random number generator

Late Last Autumn, a Russian mathematician and programmer named Alex decided he’d had enough of running his eight-year-old business. Though his St. Petersburg firm was thriving, he’d grown weary of dealing with payroll, hiring, and

By |August 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hacking through the random number generator

Worth Reading: Why you should document first

Programmers and project managers sometimes think the phrase "doc-driven development" means putting a lot of comments in code or working closely with doc writers as development happens. That's because it's hard to imagine how development

By |August 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why you should document first

Worth Reading: We’re Still on Whois?

Here we are in a modern age, and yet the load on the public whois service at APNIC continues unabated. It’s believed they’re mostly queries from automatic systems, checking the authority over an IP address,

By |August 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: We’re Still on Whois?

Worth Reading: The TCP Tortoise

As LinkedIn migrated to serving its pages on HTTP/2 earlier this year, it became imperative that we identify and use the most optimal transport layer strategy for our users’ network. Being a Transmission Control Protocol-centric

By |August 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The TCP Tortoise

Worth Reading: NVMe for Data Centers

The Non-Volatile Memory Express (NVMe) specification defines a new method to access solid-state drives (SSDs) over a PCIe bus, and it’s forecasted to grow exponentially over the next few years thanks to its performance advantages

By |August 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: NVMe for Data Centers

Worth Reading: The Coco Block Chain

Today I am proud to introduce the Coco Framework, an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology. Coco

By |August 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Coco Block Chain

Thoughts on Grey Failures

Grey failures happen on a regular basis in all networks, but in larger networks the law of large numbers can take over and cause additional redundancy to actually reduce availability. This video considers some of aspects of grey failures.

By |August 14th, 2017|Categories: LEFT, RESEARCH, TECHNOLOGY, VIDEO|Comments Off on Thoughts on Grey Failures

Worth Reading: Automated Safe Cracking

In the process of building his safecracking robot, which he will demonstrate live at the Defcon cybersecurity conference next week, Seidle discovered a series of real vulnerabilities in the relatively cheap, but popular, SentrySafe he

By |August 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Automated Safe Cracking

Worth Reading: Deep dive into Sky Lake

The architecture of Skylake is very different from that of the prior “Haswell” and “Broadwell” Xeon chips, and will be carried forward with the next-generation “Cascade Lake” processors that will very likely be implemented in

By |August 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Deep dive into Sky Lake

Worth Reading: Ops is everyone’s job now

Distributed systems are never "up"; they exist in a constant state of partially degraded service. Accept failure, design for resiliency, protect and shrink the critical path. You can't hold the entire system in your head

By |August 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ops is everyone’s job now

Worth Reading: Making mainstream switches malleable

While the hyperscalers of the world are pushing the bandwidth envelope and are rolling out 100 Gb/sec gear in their Ethernet switch fabrics and looking ahead to the not-too-distant future when 200 Gb/sec and even

By |August 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Making mainstream switches malleable

On the ‘web: Hyperconvergence in the Network

First there is white box; the networking world is already moving in this direction. While network devices, such as firewalls, routers, and switches were once purchased in an “appliance” model, many parts of the networking

By |August 9th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘web: Hyperconvergence in the Network

Worth Reading: Speeding up doesn’t help

The evolution then began, first at 1.5x speed, and eventually working up to twice the speed. At first, it made me laugh. Those distinct voices I had grown so accustomed to had turned into high-speed

By |August 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Speeding up doesn’t help

Worth Reading: Ageism in technology

Age is the silent career killer in the tech industry. While companies openly wrestle with the lack of racial and gender diversity, regularly releasing workforce demographics, they refuse to disclose the average age of their

By |August 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ageism in technology

Worth Reading: A code camps getting the boot?

Within the past week, two major learn-to-code boot camp programs have announced that they are going out of business. Iron Yard, a boot camp-style tech and coding school, was founded in 2012 and grew to

By |August 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A code camps getting the boot?

Worth Reading: Erasing Tech Debt

I worked on projects based on the following premise: “We’re going to switch to a different technology and everything will get discarded. For now, as long as it works, don’t worry too much about coding

By |August 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Erasing Tech Debt

Worth Reading: AMD Thread Ripper

The AMD Ryzen Threadripper processor offers higher core and thread counts, which equates to more capability and performance than any other consumer-level processor for high-end computing functionality. By doubling the core count found in the

By |August 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AMD Thread Ripper

Worth Watching: The big four

Worth more than $2.3 trillion combined, the Big Four (Apple, Amazon, Facebook, and Google) continue to grab share from media companies, brands, and retailers. Scott Galloway, Professor of Marketing at the NYU Stern School of

By |August 4th, 2017|Categories: WORTH READING|Comments Off on Worth Watching: The big four

Worth Reading: Google rewires the Internet

When all of your business is driven by end users coming to use your applications over the Internet, the network is arguably the most critical part of the infrastructure. That is why search engine and

By |August 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Google rewires the Internet

Worth Reading: The observer effect

What is needed in any monitoring system is the ability to increase or reduce the level of polling and data collection as system needs dictate. If you are actively debugging a system, then you probably

By |August 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The observer effect

Worth Reading: The IPv4 market

In September 2015, the free pool of IPv4 numbers available through the American Registry for Internet Numbers (ARIN) ran dry. In 2016, the IPv4 market was the only reliable source of IPv4 numbers, globally, and

By |August 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The IPv4 market

Worth Reading: Encryption substitutes

Policy experts have suggested that the rise of encrypted data is not the end of intelligence collection because law enforcement can look to substitutes other sources of intelligence, such as metadata that prove to be

By |August 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Encryption substitutes

Worth Reading: The economics of port breakout

Port-breakout deployments have become a popular networking tool and are driving the large industry demand for parallel optics transceivers. Today, port breakout is commonly used to operate 40/100Gbps (40/100G) parallel optics transceivers as four 10/25Gbps

By |August 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The economics of port breakout

Worth Reading: Is cloud moving too fast for security?

That’s at least five-major cloud application and infrastructure data breach incidents for 2017, and we’re only in July. Add in the number of ransomeware and other attacks during the first half of this year and

By |August 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is cloud moving too fast for security?

Worth Reading: Do startup employees make more?

Since the average startup founder who makes it to Series A earns more than a large company employee, many believe that early-stage startup employees also earn more (albeit less than founders). Dustin Moskovitz has even

By |July 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Do startup employees make more?

Worth Reading: Crafted DDoS

We’d like to introduce you to one of the most devastating ways to cause service instability in modern micro-service architectures: application DDoS. A specially crafted application DDoS attack can cause cascading system failures often for

By |July 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Crafted DDoS

Worth Reading: IPv4 route lookup on Linux

During the lifetime of an IPv4 datagram inside the Linux kernel, one important step is the route lookup for the destination address through the fib_lookup() function. From essential information about the datagram (source and destination

By |July 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv4 route lookup on Linux

Worth Reading: DNS Hijacking is Real

Over the years hackers have hijacked many domain names by manipulating their DNS records to redirect visitors to malicious servers. While there’s no perfect solution to prevent such security breaches, there are actions that domain

By |July 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DNS Hijacking is Real

Worth Reading: IPv6 flags and DNS configuration

One of the several capabilities provided by IPv6 is that hosts are provided two options to configure their IPv6 addressles) and other parameters like the Recursive DNS Server(RDNSS) information [2]; that is either by using

By |July 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 flags and DNS configuration

Worth Reading: Cisco’s Viptella Challenge

When Cisco announced its intent to acquire leading SD-WAN vendor Viptela in May of 2017, the network industry buzzed with conversation. Now, we’re in the quiet purgatory while we wait for regulatory approval. Since the

By |July 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cisco’s Viptella Challenge

Worth Reading: Internet Resource Course

Following the success of the first course ‘Introduction to Cybersecurity’, the APNIC Academy has launched its second course: ‘Internet Resource Management’. The course is for anyone interested in managing their Internet number resources more effectively,

By |July 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Internet Resource Course

Worth Reading: The Great Ethereum HAck

Around 12:00 PST, an unknown attacker exploited a critical flaw in the Parity multi-signature wallet on the Ethereum network, draining three massive wallets of over $31,000,000 worth of Ether in a matter of minutes. Given

By |July 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Great Ethereum HAck

Worth Reading: Docker Part 0

Containers (and microservices) are the future of application delivery, at least until the next Great Tech Leap Forward comes along, and Docker is the category killer platform. Companies are adopting Docker at a remarkable rate

By |July 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Docker Part 0

Worth Reading: Pursue Meaning

A recent article in The Washington Post identified a rising “sea of despair” among the white working class and a surge in suicides from 1999 to 2015, when a record high of 600,000 Americans took

By |July 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Pursue Meaning

Worth Reading: The future is hardware

Since the advent of open source in telecoms, customers have increasingly fallen in love with the idea of getting all software for free. That keeps vendors scratching their heads when thinking about long term survival,

By |July 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The future is hardware

Worth Reading: BCP79bis and Patents in the IETF

Working on technical standards in the computing, communications and networking industries often involves dealing with patents. Like most standards-development organizations (SDOs), the IETF has policies that deal with patents covering IETF protocols, specifications and standards.

By |July 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: BCP79bis and Patents in the IETF

Administravia 20170703

Just a short note: I've updated the sixty book section of the site with a new plugin designed to keep track of book libraries. Along the way, I've added an Amazon affiliate code, so maybe

By |July 24th, 2017|Categories: LEFT, OTHER|Comments Off on Administravia 20170703

Worth Reading: AMD and the Infinity Fabric

Starting with AMD’s Ryzen desktop processor and Epyc server architecture, AMD will implement their scalable Infinity Fabric across all its SoC and MCM products. Think of Infinity Fabric as a superset of HyperTransport, AMD’s previous

By |July 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AMD and the Infinity Fabric

Worth Reading: Is Decentralized Storage Sustainable?

There are many reasons to dislike centralized storage services. They include business risk, as we see in le petit musée des projets Google abandonnés, monoculture vulnerability and rent extraction. There is thus naturally a lot

By |July 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is Decentralized Storage Sustainable?

Worth Reading: Silicon Valley’s Overstuffed Unicorns

Here's what's happening: Young tech companies have been backed by unprecedented sums of investment money in the last three or four years. Those startup financiers in turn have collected record amounts of money from their

By |July 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Silicon Valley’s Overstuffed Unicorns

Worth Reading: Identifying Intrusive Apps

Mobile apps entertain and assist us, make it easy to communicate with friends and family, and provide tools ranging from maps to electronic wallets. But these apps could also seek more device information than they

By |July 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Identifying Intrusive Apps

Worth Reading: The Traffic Shaping Loophole

Since the disclosures of Edward Snowden in 2013, the U.S. government has assured its citizens that the National Security Agency (NSA) cannot spy on their electronic communications without the approval of a special surveillance judge.

By |July 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Traffic Shaping Loophole

Worth Reading: Secure the Grid

Over the weekend, 140,000 people in Los Angeles spent 12 steamy hours without power when a local high-voltage transformer blew up. No one knows the cause of this particular disruption of service. But it’s the

By |July 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Secure the Grid

Worth Reading: AI Forgeries are in the Future

Today, when people see a video of a politician taking a bribe, a soldier perpetrating a war crime, or a celebrity starring in a sex tape, viewers can safely assume that the depicted events have

By |July 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AI Forgeries are in the Future

Worth Reading: The Internet and Trust

This narrative refers to the understanding that trust mitigates the basic uncertainties that the Internet architecture has imposed upon its operators since its inception. To this day, network engineers cannot generally be certain about the

By |July 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Internet and Trust

Worth Reading: The Value of DRM Locks

My co-authors and I at the University of Glasgow are investigating how restrictions on interoperability imposed by Digital Rights Management (DRM) systems might impact the market for goods. We are doing this as part of

By |July 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Value of DRM Locks

Worth Reading: New German law encourages censorship

Social media companies and other hosts of third-party content will soon face potential fines of €50 million in Germany if they fail to promptly censor speech that may violate German law. Last week, the German

By |July 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: New German law encourages censorship

Worth Reading: Journey into the hybrid cloud

“In the cloud” is more now than just a phrase that describes a feeling. Although the cloud began as a vision, over the past decade it has become an integral part of everyday business decisions,

By |July 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Journey into the hybrid cloud

Worth Reading: Cutting through the segment routing hype

Segment Routing (SR) is a new traffic-engineering technology being developed by the IETF’s SPRING Working Group. Two forwarding plane encapsulations are being defined for SR: Multiprotocol Label Switching (MPLS) and IPv6 with a Segment Routing

By |July 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cutting through the segment routing hype

On the ‘web: Is it really simpler?

Simplification is the metabuzzword overlaying the networking world today. For instance, Software Defined Wide Area Networks (SD-WANs), which propose to reduce the complexity of the enterprise wide area network, particularly the network connecting to the

By |July 12th, 2017|Categories: LEFT, ON THE NET|Tags: |Comments Off on On the ‘web: Is it really simpler?

Worth Reading: Take a pause on ransomware

As these devastating global ransomware attacks illustrate, cybersecurity is not an issue that can be ignored. Any time a device or system is connected to the Internet, it is a potential target. What was once

By |July 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Take a pause on ransomware

Worth Reading: 5G and Internet Technology

5G is the latest generation of cellular network standards. There’s a tremendous amount of activity around it in the industry. But how does 5G relate to Internet technology? Are there 5G-related work items that the

By |July 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: 5G and Internet Technology

Worth Reading: The next generation of whois

Similar to Internet DNS, WHOIS is not a single, centrally managed database. Rather, domain name registration data is held in disparate locations and administered by multiple Registries and Registrars. Further, a similar WHOIS service (maintained

By |July 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The next generation of whois

Worth Reading: Why isn’t everyone running DNSSEC?

Given how critical DNS is to the functioning of the Internet, it’s a mystery that the world is prepared to accept such a security-deficient protocol at the core of all its infrastructure. What’s even crazier

By |July 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why isn’t everyone running DNSSEC?

Worth Reading: Are more specifics harmful?

The number of more specific advertisements in the IPv4 Internet is more than 50% of all advertisements, and the comparable picture in IPv6 has more specific advertisements approaching 40% of all network advertisements. It is

By |July 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Are more specifics harmful?

Worth Reading: Hijacking Bitcoin

It turns out that if you can hijack less than a hundred BGP prefixes (feasible) you can isolate about 50% of the mining power in the network. Once a collection of nodes are partitioned from

By |July 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hijacking Bitcoin

Worth Reading: A brittle and fragile future

While this is not intended to be a dystopian rant, I feel strongly motivated to draw attention to the fragile and interdependent future we are creating through the use of programmable devices and systems. Some

By |July 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A brittle and fragile future

Worth Reading: Subscription based networking

Cisco’s big announcement this week ahead of Cisco Live was their new Intent-based Networking push. This new portfolio does include new switching platforms in the guise of the Catalyst 9000 series, but the majority of

By |June 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Subscription based networking

Worth Reading: Characterizing IPv6 load balancing

Routers that perform load balancing choose among multiple next-hop routers when forwarding packets. In Figure 1, router R1 chooses among R2 and R3. In general, the next-hop is chosen by computing a hash over a

By |June 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Characterizing IPv6 load balancing

Worth Reading: DevOps is not a security panacea

Many development teams view security as an impediment to agility and innovation, but efforts over the past few years have tried to integrate security controls and testing directly into DevOps workflows without sacrificing development speed

By |June 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DevOps is not a security panacea

Worth Reading: Behind the 200g hype

In the run up to NGON 2017 in Nice, the hype machines from optical vendors have been spinning up in anticipation of one of the most reported shows in our industry. In particular, there have

By |June 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Behind the 200g hype

Worth Reading: The blue disco ball

We deal with procurement departments every day. It’s a fact of modern day corporate life. But this week, I’ve had to respond to so many RFPs asking for “blue disco balls,” (my metaphoric name for

By |June 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The blue disco ball

Worth Reading: What if we designed differently?

Imagine if the design of your electrical supply was optimised to apply the biggest possible voltage and current to anything that was plugged in. That would clearly be ridiculous! Imagine if the design of your

By |June 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: What if we designed differently?

Worth Reading: A different kind of bubble

If you visit San Francisco, you will find it difficult to walk more than a few blocks in central S.F. without encountering a major construction project. It seems that every decrepit low-rise building in the

By |June 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A different kind of bubble

Worth Reading: A lesson on cloud agility

As first reported by CNBC on Wednesday, retail and e-commerce giant Wal-Mart notified some of its technology partners that they need to move their information assets away from Amazon Web Services if they want to

By |June 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A lesson on cloud agility

Worth Reading: The root of a robust Internet

On 26 December 2006, a magnitude-7.0 earthquake struck off the southwest coast of Taiwan. This was the Hengchun earthquake, and the quake and its aftershocks resulted in six of the seven submarine cables serving Hong

By |June 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The root of a robust Internet

Worth Reading: The revival of standards

Standards… what a boring, old fashioned and backwards oriented term. How can the representative of a vendor that claims to be open, elastic and forward thinking use it in a headline? Be honest… this was

By |June 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The revival of standards

Worth Reading: Token Effects

Tokens are a new business model that’s emerging for open source. It’s a new way to raise capital by selling tokens through an ICO (initial coin offering). If the project succeeds, its token will appreciate

By |June 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Token Effects

Worth Reading: Four lessons in multicloud storage

Multicloud deployments are a major IT focus, with a whopping 85 percent of enterprises reporting that they have a multicloud strategy in 2017. That’s up from 82 percent in 2016 (RightScale 2017 State of the

By |June 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Four lessons in multicloud storage

Worth Reading: Software is the future of optical

Flexible optical technologies like ROADMs, tunable wavelengths, and the newly enabled tunable modulation format high-speed optics along with sub-wavelength grooming via OTN (which is included in the transport SDN model) are just the beginning. As

By |June 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Software is the future of optical

Worth Reading: Open IPv6 Resolvers

Open DNS resolvers that answer queries coming from anyone have been the main component of a large number of DDoS attacks in recent years. By sending queries with a spoofed source address to such open

By |June 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open IPv6 Resolvers

Worth Reading: Connecting Sleep and Income

A third of American workers report they regularly get fewer than seven hours of sleep a night, leading to the loss of some 1.2 million working days and robbing the U.S. economy of an estimated

By |June 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Connecting Sleep and Income

Worth Reading: Distributed Memory Pooling

More databases and data stores and the applications that run atop them are moving to in-memory processing, and sometimes the memory capacity in a single big iron NUMA server isn’t enough and the latencies across

By |June 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Distributed Memory Pooling

Worth Reading: Balancing Trademarks and Domain Names

The UDRP is a simple-worded, non-territorial, specialized forum for adjudicating claims of cybersquatting. It is conducted wholly online. It is not a trademark court. If there's any analogy with litigation, it is that the complaint

By |June 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Balancing Trademarks and Domain Names

Worth Reading: Not all who wander are lost

Not all who wander are lost is a favorite “Lord of the Rings” nerd-ism, and one I’ve always personally loved. Gandalf, however, never tried to learn computer programming, and also he already had a pretty

By |June 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Not all who wander are lost

Worth Reading: Ego is the enemy

When you hear the word enemy, you probably think about regular expressions, bugs, deployments, meetings, and deadlines. Actually, in our quest to reach our goals and become the software developers we want to be, we

By |June 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ego is the enemy

Worth Reading: Making providers responsible for content

When online content hosts face a risk of litigation over user-generated content, they will respond with overbroad censorship measures that limit individuals’ rights to post and access lawful, constitutionally protected speech. This is true whether

By |June 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Making providers responsible for content

Worth Reading: Liqid’s Composable System

Hardware is, by its very nature, physical and therefore, unlike software or virtual hardware and software routines encoded by FPGAs, it is the one thing that cannot be easily changed. The dream of composable systems,

By |June 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Liqid’s Composable System

Worth Reading: What if there is no money in systems?

Making money in the information technology market has always been a challenge, but it keeps getting increasingly difficult as the tumultuous change in how companies consume compute, storage, and networking rips through all aspects of

By |June 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: What if there is no money in systems?

Worth Reading: The next five years of IPv6

The qualities of this deployment seem to me (at least) to best fit a logistic supply curve. Why? Because the economics application is often to model the rate of uptake of innovation, where we know

By |June 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The next five years of IPv6

Worth Reading: vDoS for Money

At the height of vDOS’s profitability in mid-2015, the DDoS-for-hire service was earning its proprietors more than $42,000 a month in PayPal and Bitcoin payments from thousands of subscribers. That’s according to an analysis of

By |June 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: vDoS for Money

Worth Reading: World IPv6 Report

On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five

By |June 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: World IPv6 Report

Worth Reading: Keeping positive while job hunting

Like many cities, Washington DC is a place one’s job title can define his or her success or self-worth. In the digital age, many still carry business cards with our titles. Romantic meet-ups begin with

By |June 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Keeping positive while job hunting

Worth Reading: Fast changes, illustrated

A new industrial revolution has begun. Here are two small examples to illustrate what it will be like. Extrapolate these a thousand fold. Then do so again. That’s what will happen in the next 70

By |June 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fast changes, illustrated

Worth Reading: Connecting Nepal

In 1997, we finally got the Internet in Nepal. Unfortunately, it was only available in the capital, Kathmandu, which is very far from my village of Nangi. But almost immediately, I started thinking of ways

By |June 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Connecting Nepal

Worth Reading: pbgpp

pbgpp allows network operators to apply a wide range of filters, either on network layer (src IP, dst IP), but foremost BGP fields — for example, prefix, communities, or next hop. Filters are applied in

By |June 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: pbgpp

Worth Reading: The forecast is still cloudy

The technical content of this year’s BCE was, as usual, presented by some of the best and brightest minds in telecom. Unfortunately, most of those minds were in agreement that the landscape for SDN and

By |June 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The forecast is still cloudy

Open Networking for Large-Scale Networks

Shawn Zandi and I recently recorded a new webinar for Ivan over at ipspace.net around open source and disaggregated networking. If you have ever wanted to find out about these topics, this webinar is a

By |June 6th, 2017|Categories: LEFT, ON THE NET|Comments Off on Open Networking for Large-Scale Networks

Worth Reading: WannaCry and Vulnerabilities

All software contains bugs or errors in the code. Some of these bugs have security implications, granting an attacker unauthorized access to or control of a computer. These vulnerabilities are rampant in the software we

By |June 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: WannaCry and Vulnerabilities

Worth Reading: Tolerance

The idea of tolerance is that reasonable people can disagree. You still believe you are right, and the other person is wrong, but you accept that they are nonetheless a reasonable person with good intentions,

By |June 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tolerance

Ethereum: The “Next New Internet?”

According to this article, we now have a new Internet being developed: Ethereum (thanks to Chase Mitchell, one of my regular readers, for pointing this new development out). In fact, it's called "web 3.0," in

By |June 5th, 2017|Categories: LEFT, REACTION|Comments Off on Ethereum: The “Next New Internet?”

Worth Reading: Tainted Leaks

This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then “leaked” to achieve specific propaganda

By |June 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tainted Leaks

Worth Reading: Bill would surveil Americans for life

The bill requires sharing of private student data among various federal agencies, including the U.S. Department of Education’s Office of Federal Student Aid, the Department of Treasury, the Department of Defense, the Department of Veterans

By |June 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bill would surveil Americans for life

Worth Reading: We are all groot

If you venture forth on becoming a programmer after reaching any kind of reasonable adulthood — i.e., gotten through college, survived the military, worked a “real” job or two — you’re used to feeling reasonably

By |June 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: We are all groot

Worth Reading: These words should be banned

Client: “Our Big Data Rock Star ideated a cloud-based, scalable, native programmatic tool set that produced excellent learnings.” [Consultant]: “Well, it sounds like he took it to the next level … efforting 110% to craft

By |May 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: These words should be banned

Worth Reading: The future of ransomware

Ransomware isn't new, but it's increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It's extortion taken to its networked

By |May 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The future of ransomware

Worth Reading: Hi gamut monitors

For the last 20 years, the display industry has settled on a limited, standard range of colors, called the sRGB gamut. If the lopsided, chopped-off-rainbow-disc below (technical name: the “1931 CIE Chromaticity Diagram”) represents all

By |May 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hi gamut monitors

Worth Reading: ISO 27018 for the cloud

Cloud computing technologies have revolutionized the way organizations manage and store their information. Where companies used to house and maintain their own data, a host of organizations have now made the switch to a cloud-based

By |May 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ISO 27018 for the cloud

Worth Watching: The Impact of Encryption

In episode 4 the panel discusses the ever increasing pervasiveness of encrypted traffic on our networks and how that encrypted traffic impacts the services that we run today. —The Network Collective

By |May 29th, 2017|Categories: WORTH READING|Comments Off on Worth Watching: The Impact of Encryption

Worth Reading: Who controls the Internet?

Who controls the Internet? How much influence do they have? And what would happen if one of those parties launched an attack or was compromised and used to launch an attack? Previous works have looked

By |May 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Who controls the Internet?

Worth Reading: A better way to compare yourself

Comparing your work or abilities to someone else’s can be an unproductive and self-destructive activity. Yet we compare ourselves all the time. In my own experience, it feels like every day I’m comparing my work

By |May 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A better way to compare yourself

Worth Reading: Who pays security costs?

Computer security costs money. It costs more to develop secure software, and there's an ongoing maintenance cost to patch the remaining holes. Spending more time and money up front will likely result in lesser maintenance

By |May 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Who pays security costs?

Reading List: WannaCry and Ransomware

A good bit has been written about the recent WannaCry outbreak over the last few weeks; rather than stringing the best out through Worth Reading posts, I have collected the three best posts on the

By |May 24th, 2017|Categories: LEFT, NORESHARE, SECURITY|Comments Off on Reading List: WannaCry and Ransomware

Worth Reading: Key logger audio driver

The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user's keystrokes and saves the information to a local file, accessible to

By |May 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Key logger audio driver

Worth Reading: Mapping with wifi

We think of Wi-Fi as primarily bathing our homes and offices in a comfy, invisible blanket of data and internet access, but just as a blanket can take on the shapes of the bodies it

By |May 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Mapping with wifi

Worth Reading: Security debt

Just like organizations can build up technical debt, so too can they also build up something called “security debt,” if they don’t plan accordingly... In the past, security used to be ignored by pretty much

By |May 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Security debt

Worth Reading: Hype to reality

Looking back, even long term industry veterans can’t remember so many ‘earth shattering’, ‘ground breaking’ and ‘industry changing’ solutions hitting the market, in such a short timeframe. SDN will revolutionize the way we manage networks,

By |May 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hype to reality

Worth Reading: Humans training their AI replacements

Some humans are already training the artificial intelligence systems that will take over their jobs, and reporters are wondering if their experiences offer the first glimpses of an exotic new future of diminished human utility

By |May 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Humans training their AI replacements

Worth Reading: Bartering for privacy

If data is the new currency then why isn’t exchanging data for use of a service a barter transaction? If a doctor exchanges medical services for chickens, for example, that is a taxable event at

By |May 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bartering for privacy

On the ‘net: A New Routing Stack Comes to Town

While Quagga has always been the mainstay of the open source routing world, but this “granddaddy of open source routing stacks” has always suffered from a shallowness of community participation, a lack of a solid

By |May 18th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: A New Routing Stack Comes to Town

Worth Reading: Openstack and complexity

It was only one T-shirt amongst the crowd of attendees at Monday’s opening day of OpenStack Summit 2017 in Boston, but it spoke on behalf of a good many others: “Make OpenStack Great Again.” —The

By |May 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Openstack and complexity

Worth Reading: RDNSS enabled in Windows 10

It is a pleasant surprise for many (us included) that Microsoft implemented support for the RDNSS (RFC 8106) option in Router Advertisements beginning with the Windows 10 Creators Update. Interestingly, I wasn’t able to find

By |May 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: RDNSS enabled in Windows 10

Worth Reading: IoT devices will never be secure

The biggest problem with IoT security is that most devices are going to be relatively simple and inexpensive connected things. The bandwidth consumption of these devices should be kept to the minimum to save bandwidth.

By |May 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IoT devices will never be secure

Troubleshooting: Half Split

The best models will support the second crucial skill required for troubleshooting: seeing the system as a set of problems to be solved. The problem/solution mindset is so critical in really understanding how

By |May 16th, 2017|Categories: LEFT, SKILLS, TROUBLESHOOTING|Comments Off on Troubleshooting: Half Split

Worth Reading: Enabling DNSSEC Validation

In July 2010, we saw an important Internet milestone: the Domain Name System (DNS) root zone was signed with DNSSEC, the DNS security extensions. DNS was designed without much thought given to security, but DNSSEC

By |May 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Enabling DNSSEC Validation

Worth Reading: Improving peering relationships in Japan

Route servers are used by many Internet Exchange Points (IXPs) — including our own at Japan Internet Exchange (JPIX) — to facilitate multilateral peering among various members. To better understand the peering characteristics of our

By |May 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Improving peering relationships in Japan

Worth Reading: Partner or die

If your job is process oriented, for example, calculating make-goods for improperly filled orders, your whole department will be automated soon. Don’t let the pink slip surprise you. If you analyze numbers in Excel, craft

By |May 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Partner or die

Worth Reading: Digital advertising takes a hit

But how effectively does that information work to meet advertiser goals? As advertisers including P&G, which spends billions of dollars each year on all its advertising for brands including Crest, Old Spice, and Gillette, have

By |May 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Digital advertising takes a hit

Worth Reading: Value constrains us

I only take part in a few services, and I’m not consistently active on any of them. Despite however many followers I might have on a given platform, the world doesn’t care what I have

By |May 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Value constrains us

Worth Reading: Mind the gap

The sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security

By |May 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Mind the gap

Worth Reading: Cherry picker

For big data analytics jobs, especially recurring jobs, finding a good cloud configuration (number and type of machines, CPU, memory ,disk and network options) can make a big different to overall cost and runtimes. Likewise,

By |May 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cherry picker

Worth Reading: Who really has fast lanes?

Internet Association members sometimes say that they could actually afford to pay more for fast lanes but they are worried about the little guys, the startup, who may not be able to pay more and

By |May 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Who really has fast lanes?

Worth Reading: Be careful what you wish for

After a few minutes of hyperventilating into an empty Dunkin Donuts bag, though, I calmed down enough to appreciate that the guy is trying to provide exactly what I’ve been complaining about the lack of

By |May 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Be careful what you wish for

Worth Reading: Coding is hard

Of course, sitting in front of a computer writing code isn’t going to improve your physical health. JavaScript is great for building apps, not abs. I don’t think it’s too much of a stretch, though,

By |May 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Coding is hard

Worth Reading: Commodifying words

Words (and by extension their constituent letters) are as free to utter and use as is the air sustaining life. No one owns them. There is no toll fee to be paid to dictionary makers

By |May 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Commodifying words

Worth Reading: Hackers use drones and lasers to bypass air gap

When hackers infect computers with malware, they generally communicate with their code over the internet via a command-and-control server. But firewalls and intrusion detection systems can block communication going to and from suspicious domains and

By |May 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hackers use drones and lasers to bypass air gap

Worth Reading: Domain names fade

The internet has changed and evolved ever since it's ancestors first came to life in the late 1960's. Some technology fades away and is forgotten; other aspects continue but are overlaid, like geological sediments, so

By |May 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Domain names fade

Worth Reading: Test Strategy for Samza/Kafka Services

Over a decade ago, test strategies invested heavily in UI-driven tests. Backend and mid-tier services were tested using automated UI-based tests. While UI-based tests have certain merits, such as testing user flows, they are also

By |May 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Test Strategy for Samza/Kafka Services

On the ‘net: Why a new routing stack?

In late 2016, several companies worked together to fork Quagga—that is, to pull the code based into a new Git repository, and hence into a separately maintained project. This new open source routing stack has

By |April 12th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: Why a new routing stack?

On the ‘net: CAP and SDN

The CAP theorem essentially states that consistency, accessibility, and portioning are three sides of a tradeoff triangle. Much like quick, cheap, and quality; or state, optimization, and surface; CAP posits that you can choose “two

By |April 4th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: CAP and SDN

Distributed Denial of Service Open Threat Signaling (DOTS)

When the inevitable 2AM call happens—"our network is under attack"—what do you do? After running through the OODA loop (1, 2, 3, 4), used communities to distribute the attack as much as possible, mitigated the

By |April 3rd, 2017|Categories: DDOS, LEFT, STANDARDS, TECHNOLOGY|Tags: , , , , , , |Comments Off on Distributed Denial of Service Open Threat Signaling (DOTS)

Reaction: The Future is…

This week, I ran across two posts that follow down a path I've gone down before—but it is well worth bringing this point up again. Once more into the breach. Tom, over at the Networking

By |March 28th, 2017|Categories: CULTURE, REACTION|Comments Off on Reaction: The Future is…

On the ‘net: Nothing to Hide, Everything to Gain

The IETF Journal published an article by Shawn and I last week about open source, open standards, and participation by vendors and providers. Why should a provider—particularly a content provider—care about the open standards and

By |March 21st, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: Nothing to Hide, Everything to Gain

Middleboxes and the End-to-End Principle

The IP suite was always loosely grounded in the end-to-end principle, defined here (a version of this paper is also apparently available here), is quoted in RFC2775 as: The function in question can completely and

By |March 20th, 2017|Categories: LEFT, STANDARDS, TECHNOLOGY|Comments Off on Middleboxes and the End-to-End Principle

On the ‘net: PCEP

The original Path Control Element Protocol (PCEP) work dates from the early 2000’s, with the first IETF RFC (4655) being made informational in 2006—which means PCEP predates the time when SDNs were “cool.” PCEP was

By |March 14th, 2017|Categories: LEFT, ON THE NET|Tags: |Comments Off on On the ‘net: PCEP

On the ‘net: LinkedIn’s DC Design Principles

Operating a large-scale, rapidly growing network requires a philosophical change in how you plan, deploy, and operate your infrastructure. At LinkedIn, as we scaled our data center network, it became evident that we needed to

By |March 2nd, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: LinkedIn’s DC Design Principles

The Perfect and the Good

Perfect and good: one is just an extension of the other, right? When I was 16 (a long, long, long time ago), I was destined to be a great graphis—a designer and/or illustrator

By |February 27th, 2017|Categories: DESIGN, LEFT, SKILLS|Comments Off on The Perfect and the Good

On the ‘net: Net Neutrality Explained

Net Neutrality seems like a simple, easy to understand concept—but it seems the deeper you dig into the concept, this appearance of simplicity is actually just a light coat of surfacing on a very complex

By |February 22nd, 2017|Categories: ON THE NET|Comments Off on On the ‘net: Net Neutrality Explained

Metacognitive

If I could choose just a handful of skills you must learn to be a successful engineer, being metacognitive would certainly be among them. What is metacognition? OOne of my favorite books on the virtue

By |February 15th, 2017|Categories: SKILLS, Uncategorized|1 Comment

On the ‘net: I2RS Architecture

The last post on the topic of interface to the routing system (I2RS) discussed use cases; this one will provide an overview of the I2RS architecture, and then consider some challenges in the neighborhood of

By |February 14th, 2017|Categories: LEFT, ON THE NET|Tags: |Comments Off on On the ‘net: I2RS Architecture

Leave Your Ego at the Door

You are just about to walk into the interview room. Regardless of whether you are being interviewed, or interviewing—what are you thinking about? Are you thinking about winning? Are you thinking about whining? Or are

By |February 8th, 2017|Categories: CULTURE, LEFT|Comments Off on Leave Your Ego at the Door

On the ‘net: Getting to know…

Russ White is on LinkedIn’s Infrastructure Engineering team, working on next-generation network design and architecture. He has worked in networking since the late 1980s, and has a long history contributing knowledge back to the networking

By |February 1st, 2017|Categories: ON THE NET|Comments Off on On the ‘net: Getting to know…

On the ‘net: Considerations in Moving to an SDDC

There are two basic models to consider when moving data centers: running the old and new in parallel during some form of transition phase, or integrating your existing equipment with the newer SDDC. The second,

By |January 26th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: Considerations in Moving to an SDDC

Updated Generic Icon Set

I've updated the generic icons linked from this page to include a virtual router/switch. I've also added two different spine and leaf topologies to the presentation. I may add other "generic" topologies over time, as

By |January 24th, 2017|Categories: LEFT, OTHER|2 Comments

On the ‘net: The background of I2RS

Through this (probably far too long) series on SDNs, we have looked at BGP, Fibbing, and Openflow. BGP and Fibbing would be described as augmented control planes; the distributed control plane is not replaced, but

By |January 24th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: The background of I2RS

Large Scale Network Design LiveLesson

Alvaro and I finished recording a new LiveLesson back in December; it should be available for pre-purchase at the end of January. For those folks interested in network design, this is going to be a

By |January 19th, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on Large Scale Network Design LiveLesson

On the ‘net: Rockstar SE with Terry Kim

I was recently interviewed on Rockstar SEby Terry Kim—it's a worthwhile listen! Russ White has over 30 years of experience in network engineering; A Distinguished Architect during his time at Cisco, holds the highest certification

By |January 18th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: Rockstar SE with Terry Kim

SDxE: Engineer Focused

As an engineer, you've probably asked yourself a thousand times—what does all this software defined stuff mean for me? Answers are out there, of course; it seems like everyone is writing about it. Some of

By |January 17th, 2017|Categories: LEFT, OTHER, SCHEDULE|Comments Off on SDxE: Engineer Focused

On the ‘net: Looking at Openflow

Openflow is the “father of software defined networks” in the minds of many engineers. To understand Openflow, however, you cannot just look at the protocol itself; rather you must go back to the beginning, in

By |December 14th, 2016|Categories: LEFT, ON THE NET|Tags: |Comments Off on On the ‘net: Looking at Openflow

snaproute Go BGP Code Dive (14): First Steps in Processing an Update

In the last post on this topic, we found the tail of the update chain. The actual event appears to be processed here— case BGPEventUpdateMsg: st.fsm.StartHoldTimer() bgpMsg := data.(*packet.BGPMessage) st.fsm.ProcessUpdateMessage(bgpMsg) —which is found around line

By |December 12th, 2016|Categories: BGP, BGP CODE, CODING, LEFT|Tags: , , |Comments Off on snaproute Go BGP Code Dive (14): First Steps in Processing an Update

The One Car

Imagine, for a moment, that you could only have one car. To do everything. No, I don't mean, "I have access to a moving van through a mover, so I only need a minivan," I

By |November 21st, 2016|Categories: CULTURE, DESIGN, LEFT|Tags: |Comments Off on The One Car

On the ‘net: The Internet Protocol Journal

The latest IPJ has been published—the first in a while. Ole is just putting the publication back on a sound footing; hopefully we'll start seeing new editions of this excellent resource on a regular basis.

By |November 17th, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: The Internet Protocol Journal

On the ‘net: The Death of Transit

To tie the two situations together, public transport and transit providers lose money for the same reason — people are willing to pay for what they see and enjoy, not for the means required to

By |November 9th, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: The Death of Transit

On the ‘net: Software Patents

What should we do with software patents? I've seen both sides of the debate, as I work a great deal in the context of standards bodies (particularly the IETF), where software patents have impeded progress

By |October 18th, 2016|Categories: LEFT, ON THE NET|Tags: |Comments Off on On the ‘net: Software Patents

On the ‘net: BGP as an SDN

There are probably a dozen other ways to influence the path in this situation using a route reflector in BGP. Each of these methods have advantages and disadvantages; for instance, flowspec and segment routing can

By |October 11th, 2016|Categories: LEFT, ON THE NET|Tags: |Comments Off on On the ‘net: BGP as an SDN

On the ‘net: Author Interview at the LeanPub Blog

Len: Hi, I’m Len Epp from Leanpub, and in this Leanpub podcast I’ll be interviewing Daniel Dib and Russ White. Russ is based in North Carolina and has been working with large-scale networks for more

By |September 22nd, 2016|Categories: ON THE NET|Comments Off on On the ‘net: Author Interview at the LeanPub Blog

On the ‘net: White Box Switching at LinkedIn

When LinkedIn announced their Project Falco I knew exactly what one of my future Software Gone Wild podcasts would be: a chat with Russ White (Mr. CCDE, now network architect @ LinkedIn). It took us

By |September 21st, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: White Box Switching at LinkedIn

Nenshou Fire: Recoil

My daughter has started a new fiction series on her blog; I'll just link to it here for anyone who's interested. A cold circular object is pressed to my head, a hand reaching around to

By |September 15th, 2016|Categories: LEFT, NORESHARE, OTHER|Comments Off on Nenshou Fire: Recoil

Reaction: Forced Updates

The controversy over Microsoft forcing upgrades on users is in the news again, as the EFF has posted an article once again about the forced upgrades to Windows 10, and the various data collection schemes

By |August 25th, 2016|Categories: LEFT, REACTION|Comments Off on Reaction: Forced Updates

On the ‘net: I2RS on Packet Pushers

While Greg was at the IETF in Berlin, Sue Hares and I—the two current co-chairs of the I2RS working group—had a general discussion around what the big idea is and where the working group is

By |August 24th, 2016|Categories: ON THE NET, ROUTING|Comments Off on On the ‘net: I2RS on Packet Pushers

Do what you love?

How many times have you heard this? Or this? Two of the most oft repeated, and driven home, ideas in modern times are be true to yourself and do what you love. But just because

By |August 23rd, 2016|Categories: CULTURE, LEFT|Tags: |Comments Off on Do what you love?

On the ‘net: Crashes and Complexity

It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed,

By |August 16th, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: Crashes and Complexity

Reaction: Standardization versus Innovation

Should the Docker container image format be completely standardized? Or should Docker not be held back from evolving the format ahead of the open specification? This was the topic of a heated Twitter tussle last

By |August 9th, 2016|Categories: CULTURE, LEFT, REACTION|Comments Off on Reaction: Standardization versus Innovation

On the ‘net: The future of networking

Lately I have been thinking a lot about the future of networking and the career paths in this domain. As you probably know I like to guide and mentor people and with everything going on

By |August 4th, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: The future of networking

On the ‘net: You keep using that SDN word…

Software Defined Networks (SDNs), are everywhere, and everyone is either building one, selling one, or using one. Everyone, that is, except—probably—you. Don’t feel too bad if you’re feeling left out, because it’s hard to know,

By |July 24th, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: You keep using that SDN word…

Short Cuts

It was going to be a long evening, anyway—the flight check bird was coming in, and both Instrument Landing Systems (ILSs) needed to be tuned up and ready for the test. So we took some

By |July 6th, 2016|Categories: CULTURE, LEFT|Tags: |Comments Off on Short Cuts

No Capes, No Wands

As a keen observer of the network engineering world for the last twenty... okay, maybe longer, but I don't want to sound like an old man telling stories quite yet... years, there's one thing I've

By |June 14th, 2016|Categories: CULTURE, LEFT|Tags: |2 Comments

Universal Scaling and Complexity

The universal scaling law is a model designed to help engineers understand transaction based systems, particularly databases and applications. What could a transaction based system have to do with network design? After all, networks aren't

By |May 18th, 2016|Categories: LEFT, NORESHARE, RESEARCH|Comments Off on Universal Scaling and Complexity

IETF 99: Prague, Czech Republic

I plan to attend the 99th IETF in Prague, Czech Republic, July 16-21, 2017. There are always tons of interesting things going on at the IETF. If you're going to be there, please let me

By |April 14th, 2016|Categories: SCHEDULE|Comments Off on IETF 99: Prague, Czech Republic

IS-IS LiveLesson Publishing Soon

While the IS-IS book is still useful, it is getting on a little in age, and some people find learning through video to be more helpful. I've recorded seven hours of video on IS-IS in

By |April 12th, 2016|Categories: LEFT, OTHER|Comments Off on IS-IS LiveLesson Publishing Soon

The Candy Jar Effect

When I first started in Cisco TAC, as a lowly grade 3 engineer taking hardware RMA calls, I didn't know anyone. I had just moved to North Carolina, we hadn't found a church yet, I'm

By |April 1st, 2016|Categories: CULTURE, LEFT|Tags: |Comments Off on The Candy Jar Effect

New Address

To make this blog a little easier to find, I've pointed rule11.tech here as well. rule11.tech will continue to work, as well, but people seem to have a hard time remembering the url, so I

By |March 2nd, 2016|Categories: OTHER|Comments Off on New Address

Innovation and the Internet

Industries mature, of course. That they do so shouldn't be surprising to anyone who's watched the world for very long. The question is — do they mature in a way that places a few players

By |December 2nd, 2015|Categories: CULTURE, LEFT|Comments Off on Innovation and the Internet

Personal Integrity

There is, on a daily basis, a choice you must make as a geek, as someone who is involved in technology — particularly in the world of computer networking. The choice we always face, every

By |November 24th, 2015|Categories: LEFT, SKILLS|Tags: , |Comments Off on Personal Integrity

Anonymity isn’t a bug

Despite the bad rap it sometimes gets, anonymity – and anonymity technology – is used all the time by everyday people. Think about it: just walking in a park without being recorded or observed or

By |November 17th, 2015|Categories: CULTURE, LEFT, SECURITY|Tags: , |Comments Off on Anonymity isn’t a bug

Rule 11 is your friend

It's common enough in the networking industry — particularly right now — to bemoan the rate of change. In fact, when I worked in the Cisco Technical Assistance Center (TAC), we had a phrase that

By |October 12th, 2015|Categories: LEFT, SKILLS|Comments Off on Rule 11 is your friend

Intellectual virtue and the engineer

On the 19th of January in 2009, Captain "Sully" Sullenberger glided an Airbus A320 into the Hudson River just after takeoff from LaGuardia airport in New York City. Both engines failed due to multiple bird

By |September 28th, 2015|Categories: