Certifications

Worth Reading: Moving the Data Center to Base-8

The MTP (MPO-style) connector, launched in 1996, revolutionizes the design and deployment of cabling in the data center. Having 12 fibers in a single ferrule, it made dramatic progress in meeting the high-level challenges of

By |July 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Moving the Data Center to Base-8

Worth Reading: Always measure one level deeper

A good performance evaluation provides a deep understanding of a system's behavior, quantifying not only the overall behavior but also its internal mechanisms and policies. It explains why a system behaves the way it does,

By |July 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Always measure one level deeper

Worth Reading: Iw4o6

The main issue with DS-Lite is the Network Address Translation (NAT) function that’s deployed at the carriers’ network. Since mapping between IPv4 and IPv6 addresses is per network-flow, DS-Lite is hard to scale. To solve

By |July 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Iw4o6

Worth Reading: Water cooling making a comeback

Water cooling has come a long way since that time, and while air cooling of machinery has been a boon, allowing for simpler datacenters, in terms of thermal densities, we are getting back to the

By |July 3rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Water cooling making a comeback

Worth Reading: A deep dive into STARTTLS everywhere

Unlike PGP and S/MIME, STARTTLS provides hop-to-hop encryption (TLS for email), not end-to-end. Without requiring configuration on the end-user's part, a mailserver with STARTTLS support can protect email from passive network eavesdroppers. —Syndey Li @EFF

By |July 3rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: A deep dive into STARTTLS everywhere

Worth Reading: Hyperledger

...there are a number of challenges to the widespread use of permissioned distributed ledger technologies (DLT). Key among them are problems associated with the lack of standards, the regulatory challenges and the lack of knowledge

By |July 2nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Hyperledger

Worth Reading: The value of IT Analytics

Information technology operations analytics (ITOA) has emerged as a valuable practice that enables tech managers to increase efficiency. It uses data-science principles to perform pattern discovery, correlation, anomaly detection and root-cause analysis against data collected

By |June 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The value of IT Analytics

Worth Reading: A successor to OpenFlow?

Using OpenFlow, SDN was supposed to deliver a programmable interface to the network, thereby enabling real-time network control and innovation. In reality, it achieved only a fraction of what was promised. —Hayim Porat @ECI

By |June 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: A successor to OpenFlow?

Worth Reading: The power of hyperscale

The growth of cloud-IT adoption continues unabated. Today’s landscape of cloud providers is dominated by a small handful of companies based in the U.S. and China that deploy company-owned hyperscale data centers. For the foreseeable

By |June 27th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The power of hyperscale

Worth Reading: A closer look at the IP Header

The IP identification field of the IP header (IP-ID) was introduced with RFC 791 in the early ’80s, to assist network-layer fragmentation and reassembly processes. —Flavia Salutari @APNIC

By |June 27th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: A closer look at the IP Header

Worth Reading: Another 10 years later

The evolutionary path of any technology can often take strange and unanticipated turns and twists. At some points simplicity and minimalism can be replaced by complexity and ornamentation, while at other times a dramatic cut-through

By |June 26th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Another 10 years later

Worth Reading: Arista runs Barefoot

Hull says that the Broadcom chips have roughly the same level of programmability as the XPliant chips, although the manner in which it is implemented in a combination of microcode and firmware is different. —Timothy

By |June 25th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Arista runs Barefoot

Worth Reading: SDN is dead

Feathers have been ruffled on several occasions over the last few years by someone publicly claiming that, “SDN is Dead!” This has inevitably been protested by leading communications service providers, rebutting that this cannot be

By |June 25th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: SDN is dead

Worth Reading: The VPNFilter Bot

VPNFilter is a sophisticated piece of malware that infects mostly older home and small-office routers made by Linksys, MikroTik, Netgear, QNAP and TP-Link. It's an impressive piece of work. —Bruce Schneier

By |June 21st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The VPNFilter Bot

Worth Reading: Meet Bro

In a nutshell, Bro transforms network traffic — in all its volume, variety, and downright weirdness — into exceptionally useful real-time data for security operations. Through deep packet inspection, Bro can extract hundreds of security-relevant

By |June 21st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Meet Bro

Worth Reading: Eight SDN platforms

The architecture of SDN is highly dynamic, manageable, cost-effective and adaptable, and hence is well suited to high-bandwidth, dynamic applications. SDN architectures decouple network control and forwarding functions, enabling the former to become directly programmable,

By |June 20th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Eight SDN platforms

Worth Reading: Bypassing security with IPv6

As of last year, IPv6 has become an Internet standard, meaning that technology and processes are now in place allowing organizations to make a relatively smooth transition. As someone immersed in penetration testing and the

By |June 20th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Bypassing security with IPv6

Worth Reading: Spam domains

Web site names ending in new top-level domains (TLDs) like .men, .work and .click are some of the riskiest and spammy-est on the Internet, according to experts who track such concentrations of badness online. @Krebs

By |June 19th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Spam domains

Research: Lessons from Evolve or Die

Google runs what is probably one of the largest networks in the world. Because of this, network engineers often have two sorts of reactions to anything Google publishes, or does. The first is "my network

By |June 19th, 2018|Categories: LEFT, RESEARCH|Comments Off on Research: Lessons from Evolve or Die

Worth Reading: Measurement in the gigabit era

Now is an opportune time for those of us in the technical and research communities to explore the implications of the expanding deployment of gigabit per second (Gbps) end-user connection speeds (throughput capacity of an

By |June 18th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Measurement in the gigabit era

Worth Reading: Cable management and air damming

As data centers increasingly become the heart of businesses, proper distribution and cable management have also taken on new importance. Traditional methods of preventing air damming, cooling vital components and ensuring proper containment simply fail

By |June 18th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Cable management and air damming

Worth Reading: IPv6 Tables

iptables is a popular utility that allows system administrators to configure tables provided by the Linux kernel firewall and the chains and rules it stores. It is the most common and widely used Linux firewall

By |June 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 Tables

Worth Reading: Advances in IPv6 Network Reconnaissance

During the recent TROOPERS18 conference in Heidelberg, Germany, and the subsequent x33fcon conference in Gdynia, Poland, I presented some findings from an IPv6 network reconnaissance project I’ve been working on, along with a number of

By |June 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Advances in IPv6 Network Reconnaissance

Worth Reading: Defeating AMD’s SEV

German security researchers claim to have found a new practical attack against virtual machines (VMs) protected using AMD's Secure Encrypted Virtualization (SEV) technology that could allow attackers to recover plaintext memory data from guest VMs.

By |June 13th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Defeating AMD’s SEV

Worth Reading: Work-life Balance

“This work-life harmony thing is what I try to teach young employees and actually senior executives at Amazon too. But especially the people coming in,” he said. “I get asked about work-life balance all the

By |June 13th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Work-life Balance

Worth Reading: Kata Containers

Intel has been working on the Clear Containers Project for some time to address security concerns within containers through Intel Virtualization Technology (Intel VT). This essentially offers the capability to launch containers as lightweight virtual

By |June 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Kata Containers

Worth Reading: The old switcharoo

The cost of servers keeps going up and up, thanks in large part to memory, flash, and GPU prices rising as too much demand chases too little supply and also due in part to the

By |June 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The old switcharoo

Worth Reading: On the essence of foundations

One cannot employ the same “laser focus” building techniques in an unknown area as one would on a city lot. While the prospecting may not be obviously applicable to building the house, it’s essential in

By |June 11th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: On the essence of foundations

Worth Reading: A high profile outage riles traders

Our technology has become so advanced that markets are never hit by glitches, right? Not at all. The London Stock Exchange’s one-hour delay to its open on Thursday is only the latest high-profile malfunction to

By |June 11th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: A high profile outage riles traders

At Cisco Live!

The Network Collective crew—Jordan, Eyvonne, and I—will be at Cisco Live this week. You can normally find me hanging around the certifications or social media lounge, or just walking around the floor talking to folks.

By |June 9th, 2018|Categories: LEFT, NORESHARE, OTHER|Comments Off on At Cisco Live!

Worth Reading: Distraction free reading

The problem with reading in a browser window is that it's full of distractions. Elements like navigation tools, headers and footers, ads, link boxes, and more can slow your reading and cause frustration. —Scott Nesbitt

By |June 7th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Distraction free reading

Worth Reading: The world’s first cyberattack

The world’s first national data network was constructed in France during the 1790s. It was a mechanical telegraph system, consisting of chains of towers, each of which had a system of movable wooden arms on

By |June 7th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The world’s first cyberattack

Worth Reading: A new report on defending against botnets

On May 11, 2017, the President issued Executive Order (EO) 13800, “Strengthening the Cybersecurity ofFederal Networks and Critical Infrastructure,” calling for “resilience against botnets and otherautomated, distributed threats.”1 The President directed the Secretary of Commerce

By |June 6th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: A new report on defending against botnets

Worth Reading: 5G is a delicate balance

How many of you have heard that 5G will change the world as we know it? While this statement may be a bit extreme, there is no doubt that this ‘G’ is a completely different

By |June 6th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: 5G is a delicate balance

Worth Reading: The hijacking of 1.1.1.1

At 29-05-2018 08:09:45 UTC, BGPMon (A very well known BGP monitoring system to detect prefix hijacks, route leaks and instability) detected a possible BGP hijack of 1.1.1.0/24 prefix. —Aftab Siddiqui @APNIC

By |June 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The hijacking of 1.1.1.1

Worth Reading: How complaining makes us miserable

Complaining can become a state of mind, directing our orientation towards life. Comedian Lily Tomlin once quipped, “Man invented language to satisfy his deep need to complain.” —Barry Brownstein @Intellectual Takeout

By |June 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: How complaining makes us miserable

Worth Reading: It’s time to replace TCP

TCP congestion control architecture is notorious for degraded performance in numerous real-world scenarios. In this post, we present the recently proposed online learning approach to congestion control — Performance-oriented Congestion Control (PCC). —Michael Schapira @APNIC

By |June 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: It’s time to replace TCP

The Value of Community

What seems, now, like a few short months ago, I was drawn into a small community known as The Network Collective. This last week, we launched our paid membership service. The first thing that must

By |June 4th, 2018|Categories: LEFT, NORESHARE, OTHER, WRITTEN|Comments Off on The Value of Community

Worth Reading: GDPR in plain language

This post is about demystifying the core GDPR terms so everyone can understand this interesting topic. If you are European or have European users, you need to understand GDPR. —Alex Ewerlöf @Free Code Camp

By |June 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: GDPR in plain language

Worth Reading: The perfect blog post

How long should a blog be? The infinite Internet has done away with strict word counts and in theory, every online article can be as long as the author feels necessary to get their point

By |May 31st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The perfect blog post

Worth Reading: VPNfilter BOTNET

Cisco's Talos cyber intelligence unit have discovered an advanced piece of IoT botnet malware, dubbed VPNFilter, that has been designed with versatile capabilities to gather intelligence, interfere with internet communications, as well as conduct destructive

By |May 31st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: VPNfilter BOTNET

Worth Reading: The limits of HTTPS

HTTPS is a necessary condition for secure browsing, but it is not a sufficient condition. There are limits to the benefits HTTPS provides, even when deployed properly. This post explores those limits. —Eric Lawrence @APNIC

By |May 30th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The limits of HTTPS

Worth Reading: The inevitability of cloud

Public clouds for large data analysis, just like death and taxes, are clearly inevitable because of two things. One simple and now rather worn out cliché. That would be scale and the slightly more subtle

By |May 29th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The inevitability of cloud

Worth Reading: Open Optical

Network operators are intrigued by the concept open optical systems, whereby they can assemble an optical network by piecing together parts from various vendors. They are encouraged by concepts like disaggregated transponder boxes for DCI

By |May 29th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Open Optical

Worth Reading: The value of edge computing

IoT and the much anticipated 5G takeover, as well as several other data-related advances, hinge on greater network efficiencies—that is, speed. Real-time processing and streamlined data pathways are vital to seeing these next-generation technologies take

By |May 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The value of edge computing

Worth Reading: What drives IPv6 deployment

It’s been six years since World IPv6 Launch day on the 6th June 2012. In those six years we’ve managed to place ever increasing pressure on the dwindling pools of available IPv4 addresses, but we

By |May 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: What drives IPv6 deployment

Worth Reading: Buried vulnerabilities

The problem isn't just that you're introducing vulnerabilities, but that once they're there, they tend to stay there. Not just in code that you need, but, even worse, in code that you don't need. —Mike

By |May 24th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Buried vulnerabilities

Worth Reading: How much of the Internet is QUIC?

First, we investigated the QUIC-capable infrastructure in IPv4 on its common UDP port 443, from which we built a ZMap module to rapidly enumerate QUIC hosts. We exercised QUIC’s version negotiation feature within our module,

By |May 24th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: How much of the Internet is QUIC?

Worth Reading: Monitoring on End Hosts

Many enterprises monitor their networks using passive measurements techniques such as NetFlow. Although monitoring functions on routers or middleboxes can be convenient from a deployment viewpoint, they miss a lot of information about the performance

By |May 23rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Monitoring on End Hosts

Worth Reading: Increasing Bandwidth Demands

More fiber almost always solves bandwidth problems. When in doubt, lay more fiber. Fiber is king, there is no issue here with that assertion. In fact, the entire wireless spectrum can be contained in a

By |May 22nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Increasing Bandwidth Demands

What Reading: Integrity in Security

What happened to integrity in cybersecurity? I don't mean integrity in terms of a company's missteps in disclosing a data breach, nor around the ethics of sketchy security "research" practices. I'm talking about integrity as

By |May 21st, 2018|Categories: WORTH READING|Comments Off on What Reading: Integrity in Security

Worth Reading: Surviving Mediocrity

“I’m surrounded by lazy, marginally competent people. The boss is no better, and neither is the boss’ boss. What we’re doing is Not Even Wrong, it’s bureaucratically lame. I have much better ideas than my

By |May 21st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Surviving Mediocrity

Worth Reading: TLS 3.0

Rest assured, the day TLS 1.3 is official won't be a "Y2K bug" moment for encrypted traffic — and for everyday Web users, the update will likely go unnoticed. However, for security teams, the time

By |May 17th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: TLS 3.0

Worth Reading: Securing Geolocation

Geolocation is often targeted for manipulation in order to impersonate (if location is used to reinforce authentication) or other location-dependent benefits, such as access to copyright-protected media and localized news. —AbdelRahman Abdou @APNIC

By |May 16th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Securing Geolocation

Worth Reading: Supply Chain Security

All of our computerized systems are deeply international, and we have no choice but to trust the companies and governments that touch those systems. And while we can ban a few specific products, services or

By |May 16th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Supply Chain Security

Worth Reading: The Spin Bit

The spin bit and VEC were designed to be a minimal-risk, maximum-utility signal fit for a single purpose: on-path measurement of end-to-end RTT, to generate RTT samples for a variety of passive latency measurement tasks.

By |May 15th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Spin Bit

Worth Reading: Pay attention to performance

In some recent design situations, I’ve spent some time looking at routers and firewalls, looking for some fairly hefty performance characteristics. That’s where it became quite clear (if it wasn’t clear enough already), that router

By |May 15th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Pay attention to performance

Worth Reading: The Internet is going the wrong way

Facebook is taking the place of blogs, but doesn't permit linking, styles. Posts can't have titles or include podcasts. As a result these essential features are falling into disuse. We're returning to AOL. Linking, especially

By |May 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Internet is going the wrong way

Worth Reading: Back to Basics?

We, as the stewards of networking, need to help this process along. We need to spend more time talking about design and theory. We need to dissect protocols and help people understand how to use

By |May 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Back to Basics?

Weekend Reads: 051118: New spectre-class vulnerabilities, scraping data, and no middle ground on encryption

A team of security researchers has reportedly discovered a total of eight new "Spectre-class" vulnerabilities in Intel CPUs, which also affect at least a small number of ARM processors and may impact AMD processor architecture

By |May 11th, 2018|Categories: LEFT, NORESHARE, WEEKEND READS|Tags: , , , , , |Comments Off on Weekend Reads: 051118: New spectre-class vulnerabilities, scraping data, and no middle ground on encryption

Worth Reading: Why DDoS Won’t Die

Most every organization has been affected by a distributed denial-of-service (DDoS) attack in some way: whether they were hit directly in a traffic-flooding attack, or if they suffered the fallout from one of their partners

By |May 10th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Why DDoS Won’t Die

Worth Reading: Cisco to MicroTik

One of the hardest things to do quickly in network engineering, is learn a new syntax for a NOS. Especially if you have a tight deadline and need to stand up equipment you’ve never worked

By |May 8th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Cisco to MicroTik

Worth Reading: Data center interconnect and performance

What factors influence the performance of a high-speed, high-latency data center interconnect? Redundant data centers are common, providing organizations with business continuity. But how far apart is too far for good, reliable application performance? —Terry

By |May 7th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Data center interconnect and performance

Worth Reading: The development of the domain name market

If we traveled back in time, we would discover that unauthorized squatting on someone else's property is an ancient tort, but in cyberspace, it dates from the mid-1990s. Its emergence brought together governments and intellectual

By |May 7th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The development of the domain name market

Worth Reading: Feedback Fail

But buried in all the ideas and books and blogs and seminars and real-life experiences of teams everywhere is a forgotten assumption, the Achilles’ Heel of Agile. There’s one shortcut to muck up agile fast.

By |May 3rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Feedback Fail

Worth Reading: Blockchain and Telecom

Without getting into a technical description of blockchain (there are no shortage of YouTube videos for that), in my opinion there are three attributes that must satisfied to consider building a successful blockchain application... —Jonathan

By |May 1st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Blockchain and Telecom

Worth Reading: PPoE High Availability

Traditionally, PPPoE was used in DSL deployments but became one of the most adopted forms of customer device authentication in many networks. Often used with a AAA system such as RADIUS, the ability to authenticate,

By |April 30th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: PPoE High Availability

Worth Reading: Balance?

Let’s recall the earlier quote, “Balance is an excuse not to go all out.” If you have hard goals you can’t seem to achieve, the question to ask is whether you’re using “work/life balance” as

By |April 30th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Balance?

Worth Reading: Validating Internet Congestion

The rapid growth of high bandwidth demanding Internet traffic — video, online gaming and emerging applications such as virtual reality — and the growing concentration of content across a small number of providers and distribution

By |April 26th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Validating Internet Congestion

Worth Reading: Monitoring and Observability

So what is observability? Should we accept what many are stating — that it’s basically monitoring, only on steroids? Bigger, better, faster; the new Chuck Norris of DevOps tools. So better buy some observability, right?

By |April 26th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Monitoring and Observability

Worth Reading: The Edge and Cloud

Low latency, reduced bandwidth, reduced backhaul — these are the axioms of edge computing, the process of moving intensive workloads from the cloud out to the edge of the network. —Megan O’Keefe @The New Stack

By |April 24th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Edge and Cloud

Worth Reading: Samza Aeon

You can’t fix something if you don’t know there’s a problem. Measuring and tracking the latency of requests through your system is essential to identifying and resolving issues quickly. —Max Wolffe and Akhilesh Gupta @Linkedin

By |April 23rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Samza Aeon

Worth Reading: The Exploding Enpoint Problem

The future consumer will expect to access all human knowledge and services on-demand, using devices that fit in their pocket, and all for the price of a meal. This requires a digital experience that can

By |April 23rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Exploding Enpoint Problem

Worth Reading: DevOps and component chaos

Modern software development is trending more toward a componentized approach because developers would rather assemble something using a variety of well-built pieces of third-party code than reinvent the wheel every time they create something new.

By |April 19th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: DevOps and component chaos

Worth Reading: White box switching

White box switching seems to be all the networking hype. For some in-depth research, check out this podcast from packet pushers about ATT making its move into white box switching. Cisco is also committed to

By |April 19th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: White box switching

Worth Reading: Topology Basics Part 2

In spaces like the real numbers, there is convenient framework available to quantify closeness and proximity, and which allows naturally for a definition of limit or tendency for sequences. In a general topological space missing

By |April 18th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Topology Basics Part 2

Worth Reading: A new JPEG

Why do virtual reality headsets make users nauseous? One reason is latency, or the almost imperceptible amount of time it takes for a display image to change in response to a user’s head movement. However,

By |April 18th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: A new JPEG

Worth Reading: Microsegmentation

Network segmentation is a best-practice strategy for reducing the attack surface of data center networks. Just as the watertight compartments in a ship should contain flooding if the hull is breached, segmentation isolates servers and

By |April 17th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Microsegmentation

Worth Reading: Why people need to collide more

That's why we're observing that some of the most successful organizations today are those capable of shifting the way they think about the value of the interactions in the workplace. And to do that, they've

By |April 16th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Why people need to collide more

Worth Reading: The Easy Button

Automation has become this “all-encompassing thingy” much like SDN. It’s a software industry problem and it’s critical more now than ever that we do not slip backwards by trying to drag a broken idea forwards.

By |April 16th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Easy Button

Weekend Reading 041318: GDPR, and the ever deepening pile of security vulnerabilities

I think we are all hoping that when ICANN meets with the DPAs (Digital Protection Authorities) a clear path forward will be illuminated. We are all hoping that the DPAs will provide definitive guidance regarding

By |April 13th, 2018|Categories: LEFT, NORESHARE, WEEKEND READS|Tags: , , , , |Comments Off on Weekend Reading 041318: GDPR, and the ever deepening pile of security vulnerabilities

Worth Reading: Cisco switch exploits

Cisco is urging organizations to immediately address a critical flaw in its network switches running IOS and IOS XE software amid reports of widespread attacks against the devices in several countries. —Jai Vijayan @Dark Reading

By |April 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Cisco switch exploits

Worth Reading: Measuring ATR

One of the more pressing and persistent problems today is the treatment of fragmented packets. We are seeing a very large number of end-to-end paths that no longer support the transmission of fragmented IP datagrams.

By |April 11th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Measuring ATR

Worth Reading: Most Important Skills

It’s easy to get blinded these days by all the talk about cloud, SDN and automation leading both new and existing people in networking to make decisions in their career which may not be the

By |April 11th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Most Important Skills

Worth Reading: Stuffing the Camel into the Bikeshed

Standards bodies exist to create new standards. Leaving things well alone is not part of the proposition here, and the temptation to tweak, poke, prod and massage existing standards is sometimes irresistible. —Geoff Huston @Potaroo

By |April 10th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Stuffing the Camel into the Bikeshed

Worth Reading: Has monolithic gotten a bad rap?

We tend to depict the microservice and the monolith as two polar opposite styles of software architecture — the natively decomposed versus the self-contained, the fluid versus the solid, the mercurial versus the integral. —Scott

By |April 10th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Has monolithic gotten a bad rap?

Worth Reading: Five things to know about microservices

New architectures typically require new architectural knowledge and new ideas about how to deploy systems. The microservices pattern affects the architectures of both software and the organizations that use it. —Jonathan Owens @The New Stack

By |April 9th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Five things to know about microservices

Worth Reading: The role of cellular in the ‘net

The tremendous growth of the mobile Internet, with over 11 billion devices connected by 2020, and its economic implications, have motivated several reports. And yet, we still lack an understanding of the impact of cellular

By |April 9th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The role of cellular in the ‘net

Worth Reading: 1.1.1.1

Cloudflare, a well-known Internet performance and security company, announced the launch of 1.1.1.1—world's fastest and privacy-focused secure DNS service that not only speeds up your internet connection but also makes it harder for ISPs to

By |April 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: 1.1.1.1

Worth Reading: Oblivious DNS

The recent news that Mozilla and Cloudflare are deploying their own DNS recursive resolver has once again raised hopes that users will enjoy improved privacy, since they can send DNS traffic encrypted to Cloudflare, rather

By |April 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Oblivious DNS

Worth Reading: Firestopping

In reviewing mission-critical data centers under construction, both during the submittal phase and during on-site inspections, I’ve found that the single most misunderstood issue is penetration firestopping. —Dean Ventola @Data Center Journal

By |April 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Firestopping

Worth Reading: Disconnecting from Facebook

The smartphone has effectively transformed us into cyborgs, we have in our hands a highly efficient computing device equipped with a photo and video camera, microphone, GPS, accelerometer, gyroscope, magnetometer, light and proximity sensors, as

By |April 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Disconnecting from Facebook

Worth Reading: Connectivity as a consumer service

Having Comcast et al provide Internet connectivity is like having your barber do surgery because he knows how to use a knife. I was reminded of this when my Comcast connection failed. —Bob Frankston @CircleID

By |April 3rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Connectivity as a consumer service

Worth Reading: Latency wags the dog

The expression, the tail wags the dog, is used when a seemingly unimportant factor or infrequent event actually dominates the situation. It turns out that in modern datacenters, this is precisely the case – with

By |April 3rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Latency wags the dog

Worth Reading: Model driven telemmetry

Telemetry is a big buzzword in the networking industry these days. As any buzzword, telemetry means different things to different people; exactly like SDN or intent-based networking (I guess this one will need its own

By |April 2nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Model driven telemmetry

Worth Reading: OpenPower at the inflection point

When IBM launched the OpenPower initiative publicly five years ago, to many it seemed like a classic case of too little, too late. But hope springs eternal, particularly with a datacenter sector that is eagerly

By |April 2nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: OpenPower at the inflection point

Worth Reading: FRR turns one

The Free Range Routing project, a project we at Cumulus Networks set out to collaborate on with innovators in the industry to help shape the future of web-scale networking. —Kelsey Havens @Cumulus

By |March 29th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: FRR turns one

Worth Reading: One QUIC bit

I’m never surprised by the ability of an IETF Working Group to obsess over what to any outside observer would appear to be a completely trivial matter. —Geoff Huston @APNIC

By |March 29th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: One QUIC bit

Worth Reading: The forgotten half

In 2008, network researcher Dan Kaminsky announced a DNS vulnerability that would let any determined attacker, for the cost of about 10 minutes of packet bombing, insert data into the DNS such that any victim

By |March 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The forgotten half

Worth Reading: White papers don’t impress me much

Typically, most companies release white papers that claim to detail their architecture (or math, as one claimed). In reality, and with rare exception (Datrium actually comes to mind here), they’re little more than five to

By |March 27th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: White papers don’t impress me much

Worth Reading: GEO versus MEO

Until the advent of medium earth orbit (MEO) provider O3b (short for ‘Other 3 billion [users]’), geostationary (GEO) satellites were the only option for such ISPs. That meant huge dish antennas and, most of all,

By |March 27th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: GEO versus MEO

Worth Reading: IPv6 and containers

None of the ‘big three’ cloud providers (AWS, Azure, and GCP) have an IPv6 feature set that is capable of reasonably supporting containers. Their support ranges from non-existent (yep, it’s 2018 and there are still

By |March 26th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 and containers

Worth Reading: Blocking Malware with DNS

The Domain Name System (DNS) is known to be a valuable source of threat intelligence. With the mainstream introduction of the Response Policy Zone (RPZ) technology in popular resolver software, there is now a growing

By |March 22nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Blocking Malware with DNS

Worth Reading: Agile is values and principles

Many things get called Agile — especially by people who are selling something. But the Agile Manifesto makes it clear that it isn’t a methodology. .... Agile is a set of values and principles. —Mark Shead @Free

By |March 21st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Agile is values and principles

Worth Reading: Bufferbloat and Satellite Comm

In the case of satellite connections, it does not matter too much whether the buffer queue is managed with schemes such as random early drop (RED) and/or explicit congestion notification (ECN). The feedback path for

By |March 21st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Bufferbloat and Satellite Comm

Worth Reading: Why we need more crypto

Last week, researchers at Citizen Lab discovered that Sandvine's PacketLogic devices were being used to hijack users' unencrypted internet connections, making yet another case for encrypting the web with HTTPS. —Sydny Li @EFF

By |March 20th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Why we need more crypto

Worth Reading: Should I allow UDP over my satellite link?

ISPs that use satellite links for international IP connectivity often block User Datagram Protocol (UDP) traffic because it is deemed ‘unfriendly’ in the presence of Transmission Control Protocol (TCP) on the link and considered too

By |March 20th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Should I allow UDP over my satellite link?

Worth Reading: US versus Microsoft

On Tuesday, the Supreme Court heard oral argument in United States v. Microsoft, a case that many observers believe could have significant ramifications for how cloud computing and other technology companies interact with the US

By |March 19th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: US versus Microsoft

Worth Reading: Changes to the DNS marketplace

The new gTLD program and the introduction of 1200+ new domain name registries has significantly altered the marketplace dynamics. New domain name registries must navigate an environment that is, to an extent, stacked against them.

By |March 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Changes to the DNS marketplace

Worth Reading: Intel fights for its life

The Smartphone 2.0 era has destroyed many companies: Nokia, Blackberry, Palm… Will Intel be another victim, either as a result of the proposed Broadcom-Qualcomm combination, or as a consequence of a suicidal defensive move? —Jean-Louis

By |March 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Intel fights for its life

Worth Reading: The IPv4 market

The IPv4 market has grown significantly in the last four years. It finished particularly strong in 2017, both in terms of the total volume of addresses traded and overall number of intra- and inter-RIR transactions

By |March 13th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The IPv4 market

Low Latency Networking

Low latency is coming to a network near you. In fact, it's probably coming to your network, whether or not you realize it. This article was cross posted at APNIC While bandwidth has always been

By |March 12th, 2018|Categories: LEFT, STANDARDS|Tags: |Comments Off on Low Latency Networking

Worth Reading: Why decentralization matters

The internet is the ultimate software-based network, consisting of a relatively simple core layer connecting billions of fully programmable computers at the edge. Software is simply the encoding of human thought, and as such has

By |March 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Why decentralization matters

Weekend Reads 030918: Botnet Avalanche, DNS Security, and IoT Privacy

It’s been a busy few weeks in cybercrime news, justifying updates to a couple of cases we’ve been following closely at KrebsOnSecurity. In Ukraine, the alleged ringleader of the Avalanche malware spam botnet was arrested

By |March 9th, 2018|Categories: LEFT, NORESHARE, WEEKEND READS|Tags: , , |Comments Off on Weekend Reads 030918: Botnet Avalanche, DNS Security, and IoT Privacy

Worth Reading: Meeting blur

Problem is, I've had this conversation five times today, and suddenly I can not remember what was said by whom, when, and where. Welcome to Meeting Blur. @randinrepose

By |March 8th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Meeting blur

Administravia 030818: Added Navigation

I was asked by a reader to add categories and links for videos; I actually added three new categories, one for short videos, another for long videos, and a third for written posts. You can

By |March 8th, 2018|Categories: LEFT, NORESHARE, OTHER|Comments Off on Administravia 030818: Added Navigation

Worth Reading: Finding shared IP address

...we developed a project to identify IPv4 addresses shared simultaneously by many users — we call such addresses ‘gateway’ addresses— and understand the nature of the shared address, that is if they are being used

By |March 7th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Finding shared IP address

Worth Reading: Security Disclosures

Ask any bug hunter what the most annoying part of their job is and they’ll likely point to vulnerability disclosure and vendor notification. —Lucian Constantin @The New Stack

By |March 6th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Security Disclosures

Worth Reading: Impostor Syndrome

[A significant number of individuals who achieve at a high level nevertheless] see themselves as frauds. Psychologists call this the impostor phenomenon. @Delanceyplace

By |March 6th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Impostor Syndrome

Worth Reading: Security in the Modern Data Center

As the data center becomes more complex and dynamic, growing in scale to match the business requirements and relying heavily on diverse and relatively new cloud and virtualization technologies, the task of securing it is

By |March 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Security in the Modern Data Center

Worth Reading: Informed Delivery

The USPS recently told this publication that beginning Feb. 16 it started alerting all households by mail whenever anyone signs up to receive these scanned notifications of mail delivered to that address. The notification program,

By |March 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Informed Delivery

Weekend Reads 030218:

It’s been said that software is “eating the world.” More and more, critical systems that were once controlled mechanically, or by people, are coming to depend on code. This was perhaps never clearer than in

By |March 2nd, 2018|Categories: LEFT, NORESHARE, WEEKEND READS|Comments Off on Weekend Reads 030218:

Worth Reading: Netflow sampling rates

In this post, we will try to clarify key concepts around Netflow technology and potentially correct some common misconceptions. Particularly we will explain why the “what is the sampling-rate you support?” is not the right

By |March 1st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Netflow sampling rates

Worth Reading: The magical ampersand

In a software-defined and virtualised world, who will integrate the complex dynamic systems, and take responsibility for the result? It is unclear if telcos have the skills, but someone else likely does...—Martin Geddes @CircleID

By |February 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The magical ampersand

Worth Reading: $600 billion in cyber crime

Cybercrime is costing businesses close to $600 billion, or 0.8 percent of global GDP, according to a report released today by McAfee, in partnership with the Center for Strategic and International Studies (CSIS). @CircleID

By |February 28th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: $600 billion in cyber crime

Worth Reading: The SEC issues new disclosure rules

The U.S. Securities and Exchange Commission on Wednesday updated guidance to public companies on how and when they should disclose cyber security risks and breaches, including disclosing potential weaknesses that have not yet been targeted

By |February 27th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The SEC issues new disclosure rules

Worth Reading: GDPR and what’s next

The compliance deadline for the European Union's General Data Protection Regulation (GDPR) is nearly upon us, the unveiling of a proposed model to bring WHOIS into compliance is said to come from ICANN next week,

By |February 27th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: GDPR and what’s next

Worth Reading: Peak DNSSEC?

Given that our current perceptions of the benefits of DNSSEC appear to be overshadowed by our perceptions of the risks in turning on DNSSEC, then the somewhat erratic measures of DNSSEC adoption are perhaps unsurprising.

By |February 26th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Peak DNSSEC?

Worth Reading: Big changes coming to Internet protocols

When the Internet started to become widely used in the 1990s, most traffic used just a few protocols: IPv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named

By |February 26th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Big changes coming to Internet protocols

Worth Reading: MedSec and hackable IoT

In Fall 2016 I was invited to come to Miami as part of a team that independently x0000_sjm_quadraassuramp20crt20dvalidated some alleged flaws in implantable cardiac devices manufactured by St. Jude Medical (now part of Abbott Labs).

By |February 23rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: MedSec and hackable IoT

Worth Reading: Cisco’s ASA vulnerability exploited

Hackers are actively trying to exploit a high-severity vulnerability in widely used Cisco networking software that can give complete control over protected networks and access to all traffic passing over them, the company has warned.

By |February 22nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Cisco’s ASA vulnerability exploited

Worth Reading: The dawn of OpenSource

Open Source software became a movement 20 years ago this month. To mark the occasion, Christine Peterson shared a never-before-published memoir about that day in February of 1998 when she coined the phrase Open Source.

By |February 21st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The dawn of OpenSource

History of Networking: Policy with Joel Halpern

Policy at Internet scale is a little understood, and difficult (potentially impossible) to solve problem. Joel Halpern joins the History of Networking over at the Network Collective to talk about the history of policy in

By |February 21st, 2018|Categories: HISTORY OF NETWORKING, LEFT, LONG VIDEO|Tags: , , |Comments Off on History of Networking: Policy with Joel Halpern

Worth Reading: Pushed to th Edge

Anything with a benefit in efficiency will always find its niche, and it will change to plug into new niches as they arise and make use of ever-cheaper technologies as they advance from the edges.

By |February 21st, 2018|Categories: WEEKEND READS|Comments Off on Worth Reading: Pushed to th Edge

Worth Reading: Asking the wrong questions

The National Academy of Sciences (NAS) released a much-anticipated report yesterday that attempts to influence the encryption debate by proposing a “framework for decisionmakers.” At best, the report is unhelpful. At worst, its framing makes

By |February 20th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Asking the wrong questions

Worth Reading: How bad is IPv4 address exhaustion?

I often get asked questions along the lines of “How bad is IPv4 address exhaustion, honestly?”. I take the responsibility of answering questions like these seriously; I think it’s important that a broad cross section

By |February 19th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: How bad is IPv4 address exhaustion?

Worth Reading: The Future of IPv6

In reviewing the IPv6 threat concerns identified in the 13th Annual Worldwide Infrastructure Security Report (WISR), I am stricken by how today’s perceived threats are similar to what was observed and expected by early adopters

By |February 16th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Future of IPv6

Worth Reading: SDN and tech policy

Software-defined networking (SDN) describes a type of network design where a software program runs separately from the underlying hardware routers and switches can control how traffic is forwarded through the network. —Nick Feamster @Freedom to

By |February 15th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: SDN and tech policy

On the ‘net: Rethinking Firewalls

In January of 1995, Network Translation’s PIX firewall received the “hot product of the year” award from Data Communications Magazine. While the PIX was originally designed to perform Network Address Translation (NAT), doing for the

By |February 15th, 2018|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: Rethinking Firewalls

Worth Reading: DNS resolution to protect networks

The vast majority of DNS Resolvers perform its one core function – taking a unique domain name and resolved queries for these names into IPv4/IPv6 addresses for the purpose of locating computer services and devices

By |February 15th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: DNS resolution to protect networks

Worth Reading: Automation won’t cost you your job

Sure, what you’re doing now works, but there’s so much else you could be doing if the management of these tasks were optimized. That’s where network automation solutions can step in and give you more

By |February 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Automation won’t cost you your job

Worth Reading: Understanding Spoofing

IP source address spoofing is regularly leveraged in amplification and reflection attacks. Even though we have the technical means to prevent IP spoofing through strict ingress filtering, as detailed in BCP38, we still get reports

By |February 14th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Understanding Spoofing

Worth Reading: NSX-T

VMware’s network virtualization platform, called NSX, creates network services like routing, load balancing, firewalling and more. All of it is done in software that can be implemented on any underlying infrastructure as long as it

By |February 13th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: NSX-T

Worth Reading: It’s bright, shiny, and new

Vendors and operators urgently go away in huddles to define and develop the new technology. This is closely followed by extensive promotional campaigns explaining how good the new technology will be for the industry. —David

By |February 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: It’s bright, shiny, and new

Worth Reading: Bringing DNS security to the user

All of these efforts are aimed at protecting the complete path between the user and the service. This means authentication and encryption should start at the edge of the network, with the end user. As

By |February 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Bringing DNS security to the user

Weekend Reads 020918: The Usual Stuff

The Linux Foundation which has been host to many leading open source networking projects, felt the need to streamline all its various ventures, informed Arpit Joshipura, general manager of networking and orchestration at The Linux

By |February 9th, 2018|Categories: LEFT, NORESHARE, WEEKEND READS|Comments Off on Weekend Reads 020918: The Usual Stuff

Worth Reading: Containers and Spectre

Software containers can offer some respite against Spectre and Meltdown attacks — but without the help of critical security tools and practices, they remain relatively easy targets.—B. Cameron Gain @The New Stack

By |February 6th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Containers and Spectre

Worth Reading: Tech Ethics

Do teaching and codifying ethics effectively improve Tech? Consider a new software engineer, Ardentia, thrilled with her gleaming new workspace, her new refreshments bar, and her clever new colleagues. —Robin K. Hill @ACM

By |February 6th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Tech Ethics

Worth Reading: Which Linux Kernel is Stable?

Almost every time Linus Torvalds releases a new mainline Linux kernel, there's inevitable confusion about which kernel is the "stable" one now. Is it the brand new X.Y one, or the previous X.Y-1.Z one? —Konstantin

By |February 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Which Linux Kernel is Stable?

Worth Reading: NAT66

Network Address Translation (NAT) and Network Address Port Translation (NAPT) are technologies many people have a strong opinion about. —Marco Cilloni @APNIC

By |February 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: NAT66

Worth Reading: IPv6 Adoption Challenges

With the growing number of devices connected to the Internet—such as smart cars, smart homes and even smart cities—and with the pool of available IPv4 addresses quickly running out, space has become a more important

By |February 2nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 Adoption Challenges

Worth Reading: Networking with Intent

As servers and then storage appliances became increasingly virtualized and disaggregated over the past 15 years or so, the network stubbornly stuck with the appliance model, closed and proprietary. — Jeffrey Burt @The Next Platform

By |February 1st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Networking with Intent

Worth Reading: Addressing 2017

Let’s see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. —Geoff Huston

By |February 1st, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Addressing 2017

Worth Reading: TCP Congestion Signatures

Congestion in the Internet is an age-old problem. With the rise of broadband networks, it had been implicitly accepted that congestion is most likely to occur in the ‘last mile’, that is, the broadband link

By |January 30th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: TCP Congestion Signatures

Worth Reading: Ruru

With the increasing number of real-time applications (online games using virtual reality, multi-site financial transaction processing) and the radically new business models and use cases introduced by the 5G mobile architecture (robotics, tactile Internet) requiring

By |January 30th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Ruru

Worth Reading: Quantum Computing and Cryptography

All encryption is based on substitution, from simple schemes we did as kids to complex non-repeating patterns based on a long numerical key. Modern encryption systems construct these keys using a combination of private and

By |January 25th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Quantum Computing and Cryptography

One Weird Trick

I'm often asked what the trick is to become a smarter person—there are many answers, of course, which I mention in this video. But there is "one weird trick" many people don't think

By |January 25th, 2018|Categories: LEFT, MENTAL, SHORT VIDEO|Tags: |Comments Off on One Weird Trick

Worth Reading: Real Time Wide-Area TCP Latency Monitoring

With the increasing number of real-time applications and the radically new business models and use cases introduced by the 5G mobile architecture requiring interactive back-and-forth communication, user-perceived end-to-end latency is becoming an all-important factor for

By |January 25th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Real Time Wide-Area TCP Latency Monitoring

Worth Reading: Enabling Dual Stack on LinkedIn CDNs

A few months ago, LinkedIn surpassed the 50% IPv6 traffic milestone. In this post, we will look into the methodology we adopted to measure performance as we enabled IPv6 on our content delivery networks (CDNs),

By |January 24th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Enabling Dual Stack on LinkedIn CDNs

Worth Reading: The Architecture of RIPE ATLAS

It has been fun figuring out how to build [RIPE ATLAS] over the last seven years. Although there are other measurement networks out there besides RIPE Atlas, the unique features for each of these mean

By |January 24th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Architecture of RIPE ATLAS

Worth Reading: Spotlight on Tetration

My first impression: Tetration is clearly evolving and improving. It may be just me, but I think I heard more emphasis on agents and third-party sources, and less on Nexus 9K hardware. —Pete Welcher @Netcraftsmen

By |January 23rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Spotlight on Tetration

Worth Reading: Can routing be oversimplified?

Hiding the networking infrastructure from the end user is nothing new. It’s a trick that has been used for years to allow infrastructures to be tuned and configured in such a way as to deliver

By |January 23rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Can routing be oversimplified?

Worth Reading: Antivirus as spyware

What does an antivirus program do? It scans every file in your device looking for *signatures*, and then uploads those files which match the signatures for further analysis by the antivirus provider. So hacking antivirus

By |January 22nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Antivirus as spyware

Weekend Reads 011918: IoT, Cyberthreat Thinking, and Techlash

Throughout 2016 and 2017, attacks from massive botnets made up entirely of hacked IoT devices had many experts warning of a dire outlook for Internet security. But the future of IoT doesn’t have to be

By |January 19th, 2018|Categories: LEFT, NORESHARE, WEEKEND READS|Tags: , , , , , |Comments Off on Weekend Reads 011918: IoT, Cyberthreat Thinking, and Techlash

Worth Reading: The future of mobile network operators

Mobile networks are moving in that same direction — that is, the largest part of their network will be a utility, with currently two, three or four mobile infrastructure providers per country and little economic

By |January 19th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The future of mobile network operators

Worth Reading: The Future for Mobile Operators

The telecommunication industry is continuing to resist structural changes, but the reality is that if they don't transform, technology will do it for them. We have seen the fixed telecom operators slowly being pushed back

By |January 18th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Future for Mobile Operators

Cisco Live Barcelona 2018

I will be presenting at the CCDE Techtorial at Cisco Live in Barcelona on the 30th of January. This is a great opportunity to come out and learn about the Cisco Certified Design Expert from

By |January 18th, 2018|Categories: LEFT, NORESHARE, SCHEDULE|Comments Off on Cisco Live Barcelona 2018

Worth Reading: Browser botnets

Because of the way the web was designed, visiting a website requires your web browser to download and run code served from that website on your device. When you browse Facebook, their JavaScript code runs

By |January 18th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Browser botnets

Worth Reading: Bitcoin versus regulation

In the same way that the automobile was a big unknown in the days of horse-drawn carriages, cryptocurrencies are unknown in today’s world of cash, gold, and credit cards. But it would be a grave

By |January 17th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Bitcoin versus regulation

Worth Reading: The Linux Boot

In some ways, the boot process is surprisingly simple. The kernel starts up single-threaded and synchronous on a single core and seems almost comprehensible to the pitiful human mind. But how does the kernel itself

By |January 17th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Linux Boot

Worth Reading: The software defined future of the data center

“Future proofing” was once synonymous with long-range planning—essentially, life-cycle management that enables data center facilities and hardware investments to deliver full value before redevelopment or replacement. The definition has steadily evolved to connote a flexible,

By |January 16th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The software defined future of the data center

On the ‘web: The Value of MANRS

Route leaks and Distributed Denial of Service (DDoS) attacks have been in the news a good deal over the last several years; but the average non-transit network operator might generally feel pretty helpless in the

By |January 16th, 2018|Categories: BGP, LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘web: The Value of MANRS

Worht Reading: Misusing the IPv6 flow label

Flow state as a forwarding optimization remained exclusively in choke-points where flow-state-tracking was an actual necessity by design such as firewalls and Network Address Translation/Port Address Translation. Modern routers are bounded in performance by the

By |January 15th, 2018|Categories: WORTH READING|Comments Off on Worht Reading: Misusing the IPv6 flow label

Worth Reading: Everyone wants a data platform

Every IT organization wants a more scalable, programmable, and adaptable platform with real-time applications that can chew on ever-increasing amounts and types of data. And it would be nice if it could run in the

By |January 12th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Everyone wants a data platform

Worth Reading: How Google ditched VPNs

Today, none of Google’s employee-facing applications are on a virtual private network. They all have public IP addresses. The company feels this approach, which it has dubbed BeyondCorp, is the “new cloud model,” for doing

By |January 11th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: How Google ditched VPNs

Worth Reading: BGP in 2017

Measurements of the size of the routing table have been taken on a regular basis since the start of 1988, although detailed snapshots of the routing system only date back to early 1994. Figure 1

By |January 11th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: BGP in 2017

Worth Reading: IPv6 in enterprise networks

Many enterprises are beginning to implement IPv6, often starting with enabling IPv6 on their email and web servers. This, at least, makes it possible to communicate with the outside world via both protocols. Some are

By |January 10th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 in enterprise networks

Worth Reading: BGP as intent based networking

It’s interesting how the same pundits who loudly complain about the complexities of BGP (and how it will be dead any time soon and replaced by an SDN miracle) also praise the beauties of intent-based

By |January 10th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: BGP as intent based networking

Adminstravia 010918

I've reorganized the menu on the left just a little, combining some items under "reading," and adding a new item called "topics." Under this new item, you'll find collections of articles on specific topics from

By |January 9th, 2018|Categories: LEFT, NORESHARE, OTHER|Comments Off on Adminstravia 010918

Worth Reading: Why the FCC will prevail

At the outset, it should be noted that the Reversal Order exudes its own political blather — kissing the internet vibrancy ring, extolling the virtues of the free market, and reciting the "internet freedom" incantation.

By |January 9th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Why the FCC will prevail

Worth Reading: eVPNs for Layer 2

EVPN gives us the ability to deploy VXLAN tunnels without controllers. Plus, it offers a range of other benefits such as reduction of data center traffic through ARP suppression, quick convergence during mobility, one routing

By |January 8th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: eVPNs for Layer 2

Worth Reading: 2018-2019 Data Center Technology Trends

The data center technology evolution is going through an inflection point that will be very strongly driven during 2018/2019. Until now the industry was driving for cloud services centralization and transition of small and mid-sized

By |January 8th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: 2018-2019 Data Center Technology Trends

Worth Reading: Internet Protocols are Changing

When the Internet started to become widely used in the 1990s, most traffic used just a few protocols: IPv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named

By |January 5th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Internet Protocols are Changing

Worth Reading: Is Multi-Stakeholder Internet Governance Dying?

As a result, ICANN, although notionally multi-stakeholder, in practice fails to fulfil the criterion of balance. Its processes do not place a priority on the facilitation of understanding and consensus between warring stakeholder groups, and

By |January 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Is Multi-Stakeholder Internet Governance Dying?

Worth Reading: Changing Slack to break down silos

Collaboration and information silos are a reality in most organizations today. People tend to regard them as huge barriers to innovation and organizational efficiency. They're also a favorite target for solutions from software tool vendors

By |January 4th, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Changing Slack to break down silos

Worth Reading: The Smart Home Battle Front

The fragility of “smart homes” was brought to the forefront this week as a letter made the rounds allegedly sent by an ISP to its customers noting that those accused of repeated online copyright infringement

By |January 3rd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: The Smart Home Battle Front

Worth Reading: Network Applications are Interactive

The proliferation of mobile devices and the interconnectivity between them has created new application opportunities. These new applications are no longer limited to a single system space but are spread across many system spaces. This

By |January 2nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Network Applications are Interactive

Worth Reading: Workshop on Internet Economics

In the United States the debate between advocates of market-based resolution of competitive tensions and regulatory intervention has seldom reached the fever pitch that we’ve seen over the vexed on-again off-again question of Net Neutrality

By |January 2nd, 2018|Categories: WORTH READING|Comments Off on Worth Reading: Workshop on Internet Economics

Weekend Reads 122217

Because this is the last "weekend reads" of the year, I'm supersizing it, and including a few articles at the end on culture I found interesting. The majority of the other stories relate to security,

By |December 22nd, 2017|Categories: LEFT, NORESHARE, WEEKEND READS|Comments Off on Weekend Reads 122217

Worth Reading: The Russian Alternate Internet

Actually practical and not necessarily a problem. The Security Council of the Russian Federation, headed by Vladimir Putin, has ordered the "government to develop an independent internet infrastructure for BRICS nations, which would continue to

By |December 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Russian Alternate Internet

Worth Reading: Opening the Gate to Quantum

In a major step toward making a quantum computer using everyday materials, a team led by researchers at Princeton University has constructed a key piece of silicon hardware capable of controlling quantum behavior between two

By |December 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Opening the Gate to Quantum

Worth Reading: Asynchronous Decision Making

Asynchronous decision-making is a strategy that enables geographically and culturally distributed software teams to make decisions more efficiently. In this article, I'll discuss some of the principles and tools that make this approach possible. Synchronous

By |December 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Asynchronous Decision Making

Worth Reading: Google and Latency

If you want to build infrastructure that scales larger than a single image of a server and an operating system, you have no choice but to network together multiple machines. And so, the network becomes

By |December 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Google and Latency

On the ‘net: Just Two Switches?

Deploying two switches provided by a vendor seems, on the surface, to be a very simple solution. The vendor’s solution is going to provide a strong suite of vertically integrated solutions, such as layer 2

By |December 20th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: Just Two Switches?

Worth Reading: Excel == Project Failure

Excel is comfortable. It’s our go-to software for scheduling employee time, resources for a project, lists and any other data we think needs “organization.” Chances are you already have a subscription to MS Office, you’re

By |December 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Excel == Project Failure

Worth Reading: Big Software Failure

Why would anyone undertake a multi-year software project today? Or upgrade an in-house-hosted legacy application? Or build—or use—anything that behaved like a monolithic software application? Big software project failure data is legendary.11 There are myriad

By |December 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Big Software Failure

Worth Reading: Chaos Engineering

Chaos engineering is, therefore, embracing the potential for failure and looking at it as an opportunity to become a more flexible, adaptable team with more flexible, adaptable architecture. And by accepting that you’ll have failure,

By |December 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Chaos Engineering

Falco joins SONiC

One of the key components of our vision for LinkedIn’s global infrastructure is to ultimately build a programmable data center fabric on top of an open network operating system. While scaling our data centers out,

By |December 18th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on Falco joins SONiC

Worth Reading: MEC the Future

If there’s anything our industry is good at, it’s creating ever new hype cycles and continuing to fall into the same traps of overestimating what they can do for mankind as a whole, or at

By |December 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: MEC the Future

Weekend Reads 121517

Crooks who make and deploy ATM skimmers are constantly engaged in a cat-and-mouse game with financial institutions, which deploy a variety of technological measures designed to defeat skimming devices. The latest innovation aimed at tipping

By |December 15th, 2017|Categories: WEEKEND READS|Comments Off on Weekend Reads 121517

Worth Reading: Deployment Strategies

Let’s talk about deployments. This topic used to be considered an uninteresting implementation detail, but is now becoming a fundamental element for modern systems. I feel like everyone understand its importance, and is working to

By |December 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Deployment Strategies

Worth Reading: The Math Behind Reliabity

So last week I was looking at some things around Reliability and I realized how big the Reliability Engineering field is. Then I thought why not share it with others on what I have learned

By |December 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Math Behind Reliabity

‘net Neutrality Collection

I've run across a lot of interesting perspectives on 'net Neutrality; to make things easier, I've pulled them onto a single page. For anyone who's interested in hearing every side of the issue, this is

By |December 14th, 2017|Categories: LEFT, OTHER|Comments Off on ‘net Neutrality Collection

Worth Reading: The Costs and Concerns of Cloud

Moving large-scale enterprise operations into the cloud is not a decision to be made lightly. There are engineering and financial considerations, and the process of determining the costs pros and cons of such a move

By |December 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Costs and Concerns of Cloud

Worth Reading: Dim Fiber

Perhaps you have not yet heard the term “dim fiber services”. If so, allow me to introduce you to a concept that is growing in popularity among fiber network owners. Dim services fall in between

By |December 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Dim Fiber

Worth Reading: Battle of the Infinibands

When it comes to HPC, compute is like the singers in a rock band, making all of the noise and soaking up most of the attention. But the network that lashes the compute together is

By |December 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Battle of the Infinibands

Worth Reading: Big Data and Social Change

Our authors will argue the big data challenge is the not technical problem of moving the maximum amount of bits in the minimum amount of time, but the scientific challenge of formulating methods to represent

By |December 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Big Data and Social Change

Worth Reading: VXLAN Designs

With VXLAN design, the easiest thing to overlook is how communication occurs between subnets. I think many times, network engineers take for granted that our traffic will flow in a VXLAN environment. And it’s also

By |December 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: VXLAN Designs

Weekend Reads: The Relay Box Attack

West Midlands Police believe it is the first time the high-tech crime has been caught on camera. Relay boxes can receive signals through walls, doors and windows but not metal. The theft took just one

By |December 8th, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Weekend Reads: The Relay Box Attack

Worth Reading: The Future is Conversational Systems

It’d be difficult to downplay the impact Amazon Web Services has had on the computing industry over the past decade. Since launching in 2006, Amazon’s cloud computing division has become the set the pace in

By |December 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Future is Conversational Systems

Worth Reading: Let’s talk about RFC6980

Following my work with the FreeBSD implementation of RFC 6980 I was happy to present my work at last week’s DENOG 9 meeting. To make it available to anyone who did not meet me there

By |December 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Let’s talk about RFC6980

Worth Reading: Debating Exascale Commodity Hardware

Building the first exascale systems continues to be a high-profile endeavor, with efforts underway worldwide in the United States, the European Union, and Asia – notably China and Japan – that focus on competition between

By |December 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Debating Exascale Commodity Hardware

Worth Reading: The Dead DRM Canary

EFF has been fighting against DRM and the laws behind it for a decade and a half, intervening in the US Broadcast Flag, the UN Broadcasting Treaty, the European DVB CPCM standard, the W3C EME

By |December 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Dead DRM Canary

DDOS and The DNS

The Mirai DDOS attack happened just over a year ago, on the 21st October 2016. The attack was certainly a major landmark regarding the sorry history of "landmark" DDOS attacks on the Internet. It's up

By |December 5th, 2017|Categories: WORTH READING|Comments Off on DDOS and The DNS

Worth Reading: The Tradeoffs of NVM-Express

NVM-Express isn’t new. Development on the interface, which provides lean and mean access to non-volatile memory, first came to light a decade ago, with technical work starting two years later through a work group that

By |December 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Tradeoffs of NVM-Express

Worth Reading: Hiding the DNS

Among all the working groups that met at IETF 100 in Singapore was the first meeting of the DNS over HTTPs Working Group (DOH). I wrote on a related topic of DNS privacy a little

By |December 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hiding the DNS

Worth Reading: Big Four Shift Open Source Licensing

The GNU Public License version 2 (GPLv2) is arguably the most important open-source license for one reason: It's the license Linux uses. On November 27, three Linux-using technology powers, Facebook, Google, and IBM, and the

By |December 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Big Four Shift Open Source Licensing

Upcoming Seminar: Brighttalk on the future of networking

On Tuesday the 5th, I'm participating in a webcast discussion about the future of networking over at Brighttalk. The details and registration linked below. I'll be in a hotel room; I'm hoping the audio and

By |December 1st, 2017|Categories: LEFT, OTHER|Comments Off on Upcoming Seminar: Brighttalk on the future of networking

Weekend Reads 120117

There’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have

By |December 1st, 2017|Categories: WEEKEND READS|Comments Off on Weekend Reads 120117

Worth Reading: Open Source Supply Chain

Diversity and inclusivity in the technology industry—and in open source communities more specifically—have received a lot of coverage, both on Opensource.com and elsewhere. One approach to the issue foregrounds arguments about concepts that are more

By |December 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open Source Supply Chain

Worth Reading: Openstack and CITC

In this blog post I will be discussing how I leveraged a flat network to initially create simple instance deployments. Then I’ll dive more deeply into how I created a VXLAN network for my OpenStack

By |November 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Openstack and CITC

Worth Reading: Gen-Z

Servers have become increasingly powerful in recent years, with more processing cores being added and accelerators like GPUs and field-programmable gate arrays (FPGAs) being added, and the amount of data that can be processed is

By |November 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Gen-Z

Worth Reading: ONAP Amsterdam

The Open Network Automation Platform, a Linux Foundation project, has released ONAP Amsterdam, an open-source platform to enable network automation for carriers and service providers. ONAP Amsterdam includes open-source software for orchestration and automation, as

By |November 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ONAP Amsterdam

Worth Reading: Quad9

In a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection.

By |November 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Quad9

Worth Reading: DNS performance metrics

Most of these benchmarks focus on denial-of-service resistance: What is the maximum query load that can be served? This is indeed a metric that is good to know. Less discussed, however, is performance under normal

By |November 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DNS performance metrics

Worth Reading: Assessing Cloud Vendors

When it comes to evaluating new vendors, it can be challenging to know how best to communicate the requirements of your vendor assessment process and ultimately select the right partner to help your business move

By |November 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Assessing Cloud Vendors

‘Net Neutrality Reader

There is a lot of talk about the "end of 'net neutrality" because of the recent announcements made by the United State Federal Communications Commission (FCC). With so much out there, it is often important

By |November 27th, 2017|Categories: LEFT, OTHER|Tags: |Comments Off on ‘Net Neutrality Reader

Worth Reading: Tech Ageism

A majority of workers over 30 are worried about losing their jobs because of the ageism in tech, according to a recent report from Visier, an employee data analytics company. It pulled HR data from

By |November 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tech Ageism

Holiday Weekend Reads (22nov17)

The coming holiday is cutting my publishing schedule short, but I didn't want to leave too many interesting stories on the cutting room floor. Hence the weekend read comes early this week, and contains a

By |November 22nd, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Holiday Weekend Reads (22nov17)

Worth Reading: A Request for Clarity

The other day I was researching a product for a blog I was writing. After twenty or so minutes on the Web page, I still had no clear idea what the product did or how

By |November 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A Request for Clarity

Worth Reading: Amazon is the new Microsoft

Microsoft in the Bill Gates era was truly full of itself, pushing competitors around, crushing enemies and occasionally breaking the law as a bevy of anti-trust settlements show. Microsoft was the second most valuable company

By |November 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Amazon is the new Microsoft

Worth Reading: Intel moves into 5G

The Intel XMM 8000-series of 5G-capable modems will bring the next generation of wireless connectivity to PCs, smartphones and infrastructure devices with a target consumer-product launch in mid-2019. Intel INTC, -2.23% also updated plans for

By |November 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Intel moves into 5G

Worth Reading: Infiniband Quantum Leap

InfiniBand and Ethernet are in a game of tug of war and are pushing the bandwidth and price/performance envelopes constantly. But the one thing they cannot do is get too far out ahead of the

By |November 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Infiniband Quantum Leap

Worth Reading: Docker Networking

There’s been a lot of talk about container networking in the industry lately (heck, we can’t even stop talking about it). And it’s for a good reason. Containers offer a fantastic way to develop and

By |November 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Docker Networking

Weekend Reading: 2017-11-17

There’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have

By |November 17th, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Weekend Reading: 2017-11-17

Worth Reading: Court Overreach with SOPA

Nearly six years ago, Internet user communities rose up and said no to the disastrous SOPA copyright bill. This bill proposed creating a new, quick court order process to compel various Internet services—free speech’s weak

By |November 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Court Overreach with SOPA

Worth Reading: Accoung Hijacks

Account takeover, or ‘hijacking’, is unfortunately a common problem for users across the web. More than 15% of Internet users have reported experiencing the takeover of an email or social networking account. However, despite its

By |November 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Accoung Hijacks

Worth Reading: Anonymous Speech Takes a Hit

First Amendment protections for anonymous speech online were dealt a serious blow earlier today when the United States Court of Appeals for the Ninth Circuit issued its opinion in United States v. Glassdoor. In its

By |November 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Anonymous Speech Takes a Hit

Worth Reading: Continuous Infrastructure

Continuous delivery (CD) and continuous integration (CI) are two well-known aspects of DevOps. But the CI in vogue today is missing a critical “I:” infrastructure. There was a time when "infrastructure" meant headless black boxes,

By |November 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Continuous Infrastructure

Worth Reading: Route Leaks

Route leaks are a fact of life on the Internet. According to one ISP's observations, on any given day of the week, between 10-20% of announcements are actually leaks. Type 6 route leaks can be

By |November 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Route Leaks

Worth Reading: GPL Licenses

The GPL family of licenses is unique among open source licenses in how past, current, and future versions of the license may apply to the software program. By not fully understanding this unique license feature,

By |November 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: GPL Licenses

Worth Reading: Fog and Open Source

Edge computing, like public cloud at scale, requires a convenient, powerful cloud software stack that can be deployed in a unified, efficient and sustainable way. Open source is leading the way. -- Mark Collier @

By |November 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fog and Open Source

Weekend Reads 2017-05-11

We're quietly replacing an open web that connects and empowers with one that restricts and commoditizes people. We need to stop it. I quit Facebook seven months ago. Despite its undeniable value, I think Facebook

By |November 10th, 2017|Categories: LEFT, WEEKEND READS|Comments Off on Weekend Reads 2017-05-11

Worth Reading: Fixing the Plumbing

At LinkedIn, we pay attention to site speed at every step of the release process, from code development to production ramp. But inevitably, the performance of our pages degrades over time (we use the word

By |November 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fixing the Plumbing

Worth Reading: Choosing a developer job

See, in my employment searches, I’ve always focused on which tech stack a company used or if I thought I would be a successful employee from a technical perspective. If I liked the people and

By |November 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Choosing a developer job

Worth Reading: The ROCA Encryption Vulnerability

Yes. It’s serious in practice and in principle. Infineon used a flawed key generation routine, which means those keys are easier to crack, and the routine is used in chips embedded in a wide variety

By |November 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The ROCA Encryption Vulnerability

Worth Reading: New Exploits, Old Techniques

The use of tunnelling to subvert traffic is in no way new and the article itself covers many of the tunnelling approaches that have been used to set up covert channels for well over a

By |November 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: New Exploits, Old Techniques

Worth Reading: Why 5G is in trouble

I have a somewhat unconventional view of 5G. I just happen to believe it is the right one. It is trapped inside a category error about the nature of packet networking, and this means it

By |November 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why 5G is in trouble

A glance back at the looking glass: Will IP really take over the world?

In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical

By |November 6th, 2017|Categories: LEFT, RESEARCH, ROUTING, WRITTEN|Tags: , , |Comments Off on A glance back at the looking glass: Will IP really take over the world?

Worth Reading: Should we trust geolocation?

Geolocation databases are often used by both researchers and network operators to learn the real-world location of a given IP address. But how reliable are these in terms of coverage and accuracy at both country-

By |November 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Should we trust geolocation?

Weekend Read: Don’t be true to yourself

A dedication to egalitarianism can cut both ways: uplifting the lower or bringing down the higher. I would argue that this happens not only in society but also within our souls. For egalitarianism would have

By |November 3rd, 2017|Categories: WORTH READING|Comments Off on Weekend Read: Don’t be true to yourself

Worth Reading: Days of our stolen identities

The Equifax saga continues like a soap opera, Days of Our Stolen Identity. Every time it appears the Equifax drama is ending, a new report surfaces confirming additional security issues. —Kate Donofrio @ CSA

By |November 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Days of our stolen identities

Worth Reading: Checklists

Thirty-six seconds after launch, lightning struck the Apollo 12 and its six million pounds of high explosive fuel. The instruments blacked out. Twenty-two seconds later lightning struck again. What few instruments remained started flashing red

By |November 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Checklists

Worth Reading: Low Earth Satellite Internet Access

Satellites are now cheaper, smaller and lighter. OneWeb and their manufacturing partner Airbus say automation and re-design will enable them to manufacture three satellites per day at a cost of less than $1 million each

By |November 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Low Earth Satellite Internet Access

Worth Reading: Hack it back is a bad idea

If there were a prize for the worst cybersecurity policy idea that just won’t die, it would have to go to “hacking back,” or making it legal for people to attack the computers that are

By |October 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hack it back is a bad idea

Worth Reading: The Look It Up Fallacy

The first problem behind the “Look it Up” fallacy has to do with definitions of words. Most words have more than one definition, and even when they don't have more than one main definition, there

By |October 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Look It Up Fallacy

Worth Reading: An observatory for path transparency measurement

Though the end-to-end principle and the four-layer TCP/IP architecture suggest that what happens above the IPv4 or IPv6 header isn’t any of the network’s business, the widespread deployment of firewalls, network address translators, proxies, and

By |October 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: An observatory for path transparency measurement

Worth Reading: Raw sockets in IPv6

As part of a measurement experiment, we wanted an implementation of an IPv6 UDP server and a TCP server that generated fragmented IPv6 packets. However, as an added condition, we wanted the application to directly

By |October 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Raw sockets in IPv6

Several on KRACK

Three articles of interest on the new WiFi KRACK— This is not a crypto bug but a protocol bug (a pretty obvious and trivial protocol bug). When a client connects to the network, the access-point

By |October 26th, 2017|Categories: LEFT, NORESHARE, SECURITY|Comments Off on Several on KRACK

Worth Reading: 4 Tips to Fight Propoganda

Disturbingly, both men confirmed the totality of propaganda in our society. And they did that many, many decades ago and well before the internet, social media, cable TV, or data mining. By 2017, many generations

By |October 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: 4 Tips to Fight Propoganda

On the ‘web: Failure Isn’t an Option

As I have been told many times, these sorts of Chaos Monkey things simply cannot be applied to the average “enterprise grade” network. For instance, “if you think the hospital administration is going to allow

By |October 24th, 2017|Categories: ON THE NET|Comments Off on On the ‘web: Failure Isn’t an Option

Worth Reading: TLS and Data Center Monitoring

Over the course of four years, Transport Layer Security (TLS) 1.3 has been designed to be more secure in order to prevent the interception of sessions over the Internet. It has a more secure key

By |October 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: TLS and Data Center Monitoring

Worth Reading: The Economics of DDoS

These days, there are typically three parties to a distributed denial of service attack. You probably know about two of them: the perpetrator and the target. Less well known is the vast and growing number

By |October 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Economics of DDoS

Worth Reading: Stealing Passwords by Asking

Do you want the user's Apple ID password, to get access to their Apple account, or to try the same email/password combination on different web services? Just ask your users politely, they'll probably just hand

By |October 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Stealing Passwords by Asking

Worth Reading: Stop Blaming Open Source

Despite the known threats, many organisations continue to point fingers at open source platforms for poor security practices. But do you really think these platforms are the ones that need to be blamed? Coming back

By |October 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Stop Blaming Open Source

Worth Reading: Responsible Encryption Fallacies

Moreover, instead being a solution to cyber threats, law enforcement has become a threat itself. The DNC didn't have the FBI investigate the attacks from Russia likely because they didn't want the FBI reading all

By |October 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Responsible Encryption Fallacies

Worth Reading: 10 Layers of Container Security

Containers provide an easy way to package applications and deliver them seamlessly from development to test to production. This helps ensure consistency across a variety of environments, including physical servers, virtual machines (VMs), or private

By |October 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: 10 Layers of Container Security

Worth Reading: The Largest Hole in Cloud Security

Configuration errors made while using cloud-storage services are common, security experts say, and often occur when users set access permissions so someone outside of the company—say, a vendor—can see data. “More data has been lost

By |October 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Largest Hole in Cloud Security

Worth Reading: GDPR and Personal Data

With the General Data Protection Regulation (GDPR) becoming effective May 25, 2018, organizations (or rather, organisations) seem to be stressing a bit. Most we speak with are asking, “where do we even start?” or “what

By |October 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: GDPR and Personal Data

Worth Reading: The Importance of Setting Goals

As Tom Garriga, president of Tang Wei Martial Arts Institute, tells us, “A goal is an enemy to be conquered with a battle strategy and the commitment of a warrior. The leadership process is founded

By |October 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Importance of Setting Goals

Worth Reading: The Madness of Speed Tests

We know how to X-ray a network, and the results are rather revealing. If you use the right metrics, you can also model the performance limits of any application from the measurements you take. Even

By |October 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Madness of Speed Tests

Adminstravia 20171009

Where's Russ? This is my second week of PhD seminars this fall—the only time in this program I intend to take two seminars back to back. One of the two was, in fact, very deep

By |October 9th, 2017|Categories: LEFT, OTHER|Comments Off on Adminstravia 20171009

Worth Reading: Open Source Licenses

Today, the GPL license that Stallman pioneered is in its third version (GNU GPLv3) and is only one of several dozen types of open source licenses. The Open Source Initiative, an organization founded in 1998

By |October 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open Source Licenses

Light/No Blogging this Week

I'm trying to get through the final bits of this new book (which should publish at the end of December, from what I understand), and the work required for a pair of PhD seminars (a

By |September 25th, 2017|Categories: LEFT, OTHER|Comments Off on Light/No Blogging this Week

Worth Reading: Distrusting Symantic Certificates

At the end of July, the Chrome team and the PKI community converged upon a plan to reduce, and ultimately remove, trust in Symantec’s infrastructure in order to uphold users’ security and privacy when browsing

By |September 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Distrusting Symantic Certificates

Worth Reading: BlueBorne

Bluetooth is ubiquitous, commonly connecting accessories like headsets and keyboards, but is also used throughout the brave new Internet of Things (IoT) world. An attacker exploiting these BlueBorne vulnerabilities can mount a man-in-the-middle attack, or

By |September 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: BlueBorne

Worth Reading: Hacking through subaudible commands

Chinese researchers have discovered a terrifying vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei. It affects every iPhone and Macbook running Siri, any Galaxy phone, any PC running Windows 10, and

By |September 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hacking through subaudible commands

Worth Reading: Docbook

Computers were first invented to do math, and they do it really well. But it didn't take long for users to repurpose their futuristic calculators into fancy, dynamic typewriters. Now human-readable text drives computing, so

By |September 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Docbook

Reaction: Networks are not cars or cell phones

The network engineering world has long emphasized the longevity of the hardware we buy; I have sat through many vendor presentations where the salesman says "this feature set makes our product future proof! You can

By |September 20th, 2017|Categories: BGP|Comments Off on Reaction: Networks are not cars or cell phones

Worth Reading: WeChat spying revelations

It has long been known that due to WeChat keeping its servers inside China, the lack of legal protection of privacy data, and the control over companies by police, that WeChat data is not safe,

By |September 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: WeChat spying revelations

Worth Reading: Hyperconvergence and silos

Hyperconverged infrastructure (HCI) promises benefits in several dimensions: streamlining deployments across compute, storage and networking; scaling linearly as needs grow; and unifying and simplifying management. When examining prospective HCI solutions, it’s important to ensure this

By |September 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hyperconvergence and silos

Worth Reading: Why you should have a CAA DNS record

This Friday, all certificate authorities will have to honor a Domain Name System (DNS) record that allows HTTPS website owners to restrict who can issue SSL certificates for their domain names. It’s a long-needed defense

By |September 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why you should have a CAA DNS record

Worth Reading: Work life balance

Miserable at work? You’re not alone. More than half of U.S. employees were not engaged at work between 2010 and 2012 according to Gallup’s recent State of the American Workplace report, which collected data from

By |September 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Work life balance

Worth Reading: Hunting AdwindRAT

An increasing number of malware families employ SSL/TLS encryption in order to evade detection by Network Intrusion Detection Systems (NIDS). In this blog post I’m gonna have a look at Adwind, which is a cross-platform

By |September 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hunting AdwindRAT

Worth Reading: How blockchain really works

A distributed database that is used to maintain a continuously growing list of records, called blocks. That sounds nice, but how does it work? To illustrate a blockchain, we will use an open source command-line

By |September 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: How blockchain really works

Worth Reading: Planning for cloud’s limitations

Protecting data from losses requires a well-planned data-management strategy. Many strategic plans include using cloud services, but IT and other departments must understand the cloud’s strengths and limitations when it comes to protection. The benefits

By |September 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Planning for cloud’s limitations

Worth Reading: Retrieval and relevance

Our expectations for search have gotten higher and higher since Google has gotten better and better. These days, very few people search beyond the first page. If those search results aren’t good enough, they’ll either

By |September 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Retrieval and relevance

Worth Reading: Global content removals

From the Internet's earliest days, the tension between a global communication network and local geography-based laws has been obvious. One scenario is that every jurisdiction's local laws apply to the Internet globally, meaning that the

By |September 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Global content removals

Worth Reading: Common issue detection for CPU profiling

Profiling of services is a useful method to find optimizations to improve service performance; the ODP (“On-Demand Profiling”) framework has helped identify many performance problems at LinkedIn. However, as these analyses and subsequent optimizations are

By |September 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Common issue detection for CPU profiling

On the ‘web: The Future of Data Center Fabrics

Recorded live at IETF 99, this Priority Queue episode is a roundtable conversation on new and emerging ideas for data center fabrics. Greg Ferro is joined by Jeff Tantsura, a chair of the routing working

By |September 12th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘web: The Future of Data Center Fabrics

Worth Reading: Gen-Z

It has been almost a year now since Gen-Z launched, and the consortium is growing and the specifications are being cooked up by the techies. The core Gen-Z spec was published in December 2016 and

By |September 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Gen-Z

Worth Reading: In defense of NATs

Network Address Translation (NAT) has often been described as an unfortunate aberration in the evolution of the Internet, and one that will be expunged with the completion of the transition to IPv6. I think that

By |September 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: In defense of NATs

Worth Reading: Security is a System Property

here's lots of security advice in the press: keep your systems patched, use a password manager, don't click on links in email, etc. But there's one thing these adages omit: an attacker who is targeting

By |September 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Security is a System Property

Worth Reading: Time is not on your side

Many of the presenters, like Truman Boyes of Bloomberg and Peyton Maynard-Koran of EA, discussed the idea of building boxes from existing components instead of buying them from established networking vendors like Cisco and Arista.

By |September 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Time is not on your side

Worth Reading: Improving metrics in cyber resiliency

With the growth in cloud computing, businesses rely on the network to access information about operational assets being stored away from the local server. Decoupling information assets from other operational assets could result in poor

By |September 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Improving metrics in cyber resiliency

Worth Reading: Cloud data storage data planes

And while such backup solutions solved the traditional data center backup to tape, and eventually disk, really well, the solution does not readily translate into a distributed multicloud solution. That’s where a data protection solution

By |September 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cloud data storage data planes

Worth Reading: Why culture company matters

The impact of a company’s culture is reflected in a company’s ability to achieve their goals and productivity levels, and in their employees’ satisfaction. The company culture can make or break a business. Yet, company

By |September 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why culture company matters

Worth Reading: When the cloud deletes our data

When we talk about people losing their data in the cloud, the conversation typically revolves around hackers, violating terms of service or sites going out of business. However, it is important to remember that in

By |September 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: When the cloud deletes our data

Worth Reading: The rise of fourth wave computing

According to a recent Jefferies report, the fourth wave of computing has started and it is being driven by the adoption of IoT with parallel processing as the solution. Tectonic shifts in computing have been

By |September 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The rise of fourth wave computing

Worth Reading: Is your mobile carrier your weakest link?

More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying

By |September 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is your mobile carrier your weakest link?

Worth Reading: Malware in your screen

Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by thirdparty manufacturers and not by the phone vendors themselves. Third-party driver source code to

By |September 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Malware in your screen

Worth Reading: Wave System’s DPU architecture

Their view is that dataflow architectures are the only way to efficiently train networks with high performance. The CPU is carved out of their systems entirely and as we explained when first details were clear

By |September 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Wave System’s DPU architecture

Worth Reading: Updating Surveillance Laws

For decades, Americans have forfeited their privacy rights for a false sense of safety. Broad, sweeping surveillance laws––such as, but certainly not limited to Section 702 of the FISA Amendments Act––have given the federal government

By |September 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Updating Surveillance Laws

Worth Reading: Multitasking without Thrashing

Human context switching is more complicated than computer context switching. Whereas the computer context switch replaces a fixed number of bytes in a few CPU registers, the human has to recall what was "on the

By |August 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Multitasking without Thrashing

Worth Reading: The calculus of service availability

The vast majority of software services and systems should aim for almost-perfect reliability rather than perfect reliability—that is, 99.999% or 99.99% rather than 100%—because users cannot tell the difference between a service being 100% available

By |August 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The calculus of service availability

Worth Reading: IoT needs a paradigm shift

Building IoT ventures from scratch by prototyping hardware devices and their backend systems as well as working for a large company that tries to sell IoT devices itself, we learned a lot about the pitfalls

By |August 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IoT needs a paradigm shift

Worth Reading: ROI is not a cybersecurity concept

In the cybersecurity community, much time is spent trying to speak the language of business, in order to communicate to business leaders our problems. One way we do this is trying to adapt the concept

By |August 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ROI is not a cybersecurity concept

Worth Reading: Is it time to build an anti-DDoS alliance?

A functional “anti-DOS alliance” is only feasible if SP”s are ready to commit to specific frugal investments. These ‘ prudent commitments’ will not require millions of dollars in anti-DOS technology. The commitments will require a

By |August 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is it time to build an anti-DDoS alliance?

Worth Reading: The rise of info-monopolies

Salil Mehta is a statistician and well-known public intellectual. See his impressive bio. He has been cited in major publications, such as the NYT. But Google closed his email and website (Statistical Ideas) down without

By |August 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The rise of info-monopolies

Worth Reading: Open core, open perimeter

Today, software development is built around APIs. Instead of embedding a vendor's product into their application, developers can call an API to consume services from a vendor. The developers don't need to know what's responding

By |August 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Open core, open perimeter

Worth Reading: Detecting network outages with RIPE ATLAS

As much as we dislike it, large-scale Internet outages do happen, sometimes as a result of technical problems or sometimes even politically motivated. We’d like to be notified when these outages occur, ideally in real-time,

By |August 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Detecting network outages with RIPE ATLAS

Worth Reading: IPv6, large packets, and DNS

It appears that rather than effecting a slight improvement from IPv4, the manner of fragmentation handling in IPv6 appears to be significantly worse than IPv4. Little wonder that there have been calls from time to

By |August 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv6, large packets, and DNS

Worth Reading: Testing in Production

There are lots of things you already test in prod—because there's no other way you can test them. Sure, you can spin up clones of various system components or entire systems, and capture real traffic

By |August 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Testing in Production

Worth Reading: The changing UX of European Banking

How you see and interact with your online bank accounts is about to change. That’s because Europe is forcing change into the financial market. Digital transformation is a thing this decade. “Digital disruption,” startups who

By |August 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The changing UX of European Banking

Worth Reading: Transitioning to a single root

APNIC is in the process of transitioning from the current Resource Public Key Infrastructure (RPKI) trust anchor arrangement to a new configuration which has been agreed among the RIRs, and announced by the NRO. In

By |August 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Transitioning to a single root

Worth Reading: On ISO standardization of blockchains

So ISO, the primary international standards organization, is seeking to standardize blockchain technologies. On the surface, this seems a reasonable idea, creating a common standard that everyone can interoperate with. But it can be silly

By |August 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: On ISO standardization of blockchains

Worth Reading: DNS query name minimization

One new thing you need to add your DNS security policies is "query name minimizations" (RFC 7816). I thought I'd mention it since many haven't heard about it. Right now, when DNS resolvers lookup a

By |August 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DNS query name minimization

Worth Reading: Supporting new DNS RR types

The Domain Name System has always been intended to be extensible. The original spec in the 1980s had about a dozen resource record types (RRTYPEs), and since then people have invented many more so now

By |August 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Supporting new DNS RR types

Worth Reading: Hacking through the random number generator

Late Last Autumn, a Russian mathematician and programmer named Alex decided he’d had enough of running his eight-year-old business. Though his St. Petersburg firm was thriving, he’d grown weary of dealing with payroll, hiring, and

By |August 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hacking through the random number generator

Worth Reading: Why you should document first

Programmers and project managers sometimes think the phrase "doc-driven development" means putting a lot of comments in code or working closely with doc writers as development happens. That's because it's hard to imagine how development

By |August 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why you should document first

Worth Reading: We’re Still on Whois?

Here we are in a modern age, and yet the load on the public whois service at APNIC continues unabated. It’s believed they’re mostly queries from automatic systems, checking the authority over an IP address,

By |August 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: We’re Still on Whois?

Worth Reading: The TCP Tortoise

As LinkedIn migrated to serving its pages on HTTP/2 earlier this year, it became imperative that we identify and use the most optimal transport layer strategy for our users’ network. Being a Transmission Control Protocol-centric

By |August 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The TCP Tortoise

Worth Reading: NVMe for Data Centers

The Non-Volatile Memory Express (NVMe) specification defines a new method to access solid-state drives (SSDs) over a PCIe bus, and it’s forecasted to grow exponentially over the next few years thanks to its performance advantages

By |August 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: NVMe for Data Centers

Worth Reading: The Coco Block Chain

Today I am proud to introduce the Coco Framework, an open-source system that enables high-scale, confidential blockchain networks that meet all key enterprise requirements—providing a means to accelerate production enterprise adoption of blockchain technology. Coco

By |August 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Coco Block Chain

Thoughts on Grey Failures

Grey failures happen on a regular basis in all networks, but in larger networks the law of large numbers can take over and cause additional redundancy to actually reduce availability. This video considers some of aspects of grey failures.

By |August 14th, 2017|Categories: LEFT, RESEARCH, SHORT VIDEO, TECHNOLOGY|Comments Off on Thoughts on Grey Failures

Worth Reading: Automated Safe Cracking

In the process of building his safecracking robot, which he will demonstrate live at the Defcon cybersecurity conference next week, Seidle discovered a series of real vulnerabilities in the relatively cheap, but popular, SentrySafe he

By |August 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Automated Safe Cracking

Worth Reading: Deep dive into Sky Lake

The architecture of Skylake is very different from that of the prior “Haswell” and “Broadwell” Xeon chips, and will be carried forward with the next-generation “Cascade Lake” processors that will very likely be implemented in

By |August 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Deep dive into Sky Lake

Worth Reading: Ops is everyone’s job now

Distributed systems are never "up"; they exist in a constant state of partially degraded service. Accept failure, design for resiliency, protect and shrink the critical path. You can't hold the entire system in your head

By |August 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ops is everyone’s job now

Worth Reading: Making mainstream switches malleable

While the hyperscalers of the world are pushing the bandwidth envelope and are rolling out 100 Gb/sec gear in their Ethernet switch fabrics and looking ahead to the not-too-distant future when 200 Gb/sec and even

By |August 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Making mainstream switches malleable

On the ‘web: Hyperconvergence in the Network

First there is white box; the networking world is already moving in this direction. While network devices, such as firewalls, routers, and switches were once purchased in an “appliance” model, many parts of the networking

By |August 9th, 2017|Categories: LEFT, ON THE NET|Comments Off on On the ‘web: Hyperconvergence in the Network

Worth Reading: Speeding up doesn’t help

The evolution then began, first at 1.5x speed, and eventually working up to twice the speed. At first, it made me laugh. Those distinct voices I had grown so accustomed to had turned into high-speed

By |August 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Speeding up doesn’t help

Worth Reading: Ageism in technology

Age is the silent career killer in the tech industry. While companies openly wrestle with the lack of racial and gender diversity, regularly releasing workforce demographics, they refuse to disclose the average age of their

By |August 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ageism in technology

Worth Reading: A code camps getting the boot?

Within the past week, two major learn-to-code boot camp programs have announced that they are going out of business. Iron Yard, a boot camp-style tech and coding school, was founded in 2012 and grew to

By |August 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A code camps getting the boot?

Worth Reading: Erasing Tech Debt

I worked on projects based on the following premise: “We’re going to switch to a different technology and everything will get discarded. For now, as long as it works, don’t worry too much about coding

By |August 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Erasing Tech Debt

Worth Reading: AMD Thread Ripper

The AMD Ryzen Threadripper processor offers higher core and thread counts, which equates to more capability and performance than any other consumer-level processor for high-end computing functionality. By doubling the core count found in the

By |August 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AMD Thread Ripper

Worth Watching: The big four

Worth more than $2.3 trillion combined, the Big Four (Apple, Amazon, Facebook, and Google) continue to grab share from media companies, brands, and retailers. Scott Galloway, Professor of Marketing at the NYU Stern School of

By |August 4th, 2017|Categories: WORTH READING|Comments Off on Worth Watching: The big four

Worth Reading: Google rewires the Internet

When all of your business is driven by end users coming to use your applications over the Internet, the network is arguably the most critical part of the infrastructure. That is why search engine and

By |August 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Google rewires the Internet

Worth Reading: The observer effect

What is needed in any monitoring system is the ability to increase or reduce the level of polling and data collection as system needs dictate. If you are actively debugging a system, then you probably

By |August 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The observer effect

Worth Reading: The IPv4 market

In September 2015, the free pool of IPv4 numbers available through the American Registry for Internet Numbers (ARIN) ran dry. In 2016, the IPv4 market was the only reliable source of IPv4 numbers, globally, and

By |August 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The IPv4 market

Worth Reading: Encryption substitutes

Policy experts have suggested that the rise of encrypted data is not the end of intelligence collection because law enforcement can look to substitutes other sources of intelligence, such as metadata that prove to be

By |August 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Encryption substitutes

Worth Reading: The economics of port breakout

Port-breakout deployments have become a popular networking tool and are driving the large industry demand for parallel optics transceivers. Today, port breakout is commonly used to operate 40/100Gbps (40/100G) parallel optics transceivers as four 10/25Gbps

By |August 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The economics of port breakout

Worth Reading: Is cloud moving too fast for security?

That’s at least five-major cloud application and infrastructure data breach incidents for 2017, and we’re only in July. Add in the number of ransomeware and other attacks during the first half of this year and

By |August 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is cloud moving too fast for security?

Worth Reading: Do startup employees make more?

Since the average startup founder who makes it to Series A earns more than a large company employee, many believe that early-stage startup employees also earn more (albeit less than founders). Dustin Moskovitz has even

By |July 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Do startup employees make more?

Worth Reading: Crafted DDoS

We’d like to introduce you to one of the most devastating ways to cause service instability in modern micro-service architectures: application DDoS. A specially crafted application DDoS attack can cause cascading system failures often for

By |July 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Crafted DDoS

Worth Reading: IPv4 route lookup on Linux

During the lifetime of an IPv4 datagram inside the Linux kernel, one important step is the route lookup for the destination address through the fib_lookup() function. From essential information about the datagram (source and destination

By |July 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv4 route lookup on Linux

Worth Reading: DNS Hijacking is Real

Over the years hackers have hijacked many domain names by manipulating their DNS records to redirect visitors to malicious servers. While there’s no perfect solution to prevent such security breaches, there are actions that domain

By |July 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DNS Hijacking is Real

Worth Reading: IPv6 flags and DNS configuration

One of the several capabilities provided by IPv6 is that hosts are provided two options to configure their IPv6 addressles) and other parameters like the Recursive DNS Server(RDNSS) information [2]; that is either by using

By |July 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 flags and DNS configuration

Worth Reading: Cisco’s Viptella Challenge

When Cisco announced its intent to acquire leading SD-WAN vendor Viptela in May of 2017, the network industry buzzed with conversation. Now, we’re in the quiet purgatory while we wait for regulatory approval. Since the

By |July 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cisco’s Viptella Challenge

Worth Reading: Internet Resource Course

Following the success of the first course ‘Introduction to Cybersecurity’, the APNIC Academy has launched its second course: ‘Internet Resource Management’. The course is for anyone interested in managing their Internet number resources more effectively,

By |July 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Internet Resource Course

Worth Reading: The Great Ethereum HAck

Around 12:00 PST, an unknown attacker exploited a critical flaw in the Parity multi-signature wallet on the Ethereum network, draining three massive wallets of over $31,000,000 worth of Ether in a matter of minutes. Given

By |July 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Great Ethereum HAck

Worth Reading: Docker Part 0

Containers (and microservices) are the future of application delivery, at least until the next Great Tech Leap Forward comes along, and Docker is the category killer platform. Companies are adopting Docker at a remarkable rate

By |July 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Docker Part 0

Worth Reading: Pursue Meaning

A recent article in The Washington Post identified a rising “sea of despair” among the white working class and a surge in suicides from 1999 to 2015, when a record high of 600,000 Americans took

By |July 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Pursue Meaning

Worth Reading: The future is hardware

Since the advent of open source in telecoms, customers have increasingly fallen in love with the idea of getting all software for free. That keeps vendors scratching their heads when thinking about long term survival,

By |July 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The future is hardware

Worth Reading: BCP79bis and Patents in the IETF

Working on technical standards in the computing, communications and networking industries often involves dealing with patents. Like most standards-development organizations (SDOs), the IETF has policies that deal with patents covering IETF protocols, specifications and standards.

By |July 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: BCP79bis and Patents in the IETF

Administravia 20170703

Just a short note: I've updated the sixty book section of the site with a new plugin designed to keep track of book libraries. Along the way, I've added an Amazon affiliate code, so maybe

By |July 24th, 2017|Categories: LEFT, OTHER|Comments Off on Administravia 20170703

Worth Reading: AMD and the Infinity Fabric

Starting with AMD’s Ryzen desktop processor and Epyc server architecture, AMD will implement their scalable Infinity Fabric across all its SoC and MCM products. Think of Infinity Fabric as a superset of HyperTransport, AMD’s previous

By |July 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AMD and the Infinity Fabric

Worth Reading: Is Decentralized Storage Sustainable?

There are many reasons to dislike centralized storage services. They include business risk, as we see in le petit musée des projets Google abandonnés, monoculture vulnerability and rent extraction. There is thus naturally a lot

By |July 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is Decentralized Storage Sustainable?

Worth Reading: Silicon Valley’s Overstuffed Unicorns

Here's what's happening: Young tech companies have been backed by unprecedented sums of investment money in the last three or four years. Those startup financiers in turn have collected record amounts of money from their

By |July 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Silicon Valley’s Overstuffed Unicorns

Worth Reading: Identifying Intrusive Apps

Mobile apps entertain and assist us, make it easy to communicate with friends and family, and provide tools ranging from maps to electronic wallets. But these apps could also seek more device information than they

By |July 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Identifying Intrusive Apps

Worth Reading: The Traffic Shaping Loophole

Since the disclosures of Edward Snowden in 2013, the U.S. government has assured its citizens that the National Security Agency (NSA) cannot spy on their electronic communications without the approval of a special surveillance judge.

By |July 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Traffic Shaping Loophole

Worth Reading: Secure the Grid

Over the weekend, 140,000 people in Los Angeles spent 12 steamy hours without power when a local high-voltage transformer blew up. No one knows the cause of this particular disruption of service. But it’s the

By |July 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Secure the Grid

Worth Reading: AI Forgeries are in the Future

Today, when people see a video of a politician taking a bribe, a soldier perpetrating a war crime, or a celebrity starring in a sex tape, viewers can safely assume that the depicted events have

By |July 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AI Forgeries are in the Future

Worth Reading: The Internet and Trust

This narrative refers to the understanding that trust mitigates the basic uncertainties that the Internet architecture has imposed upon its operators since its inception. To this day, network engineers cannot generally be certain about the

By |July 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Internet and Trust

Worth Reading: The Value of DRM Locks

My co-authors and I at the University of Glasgow are investigating how restrictions on interoperability imposed by Digital Rights Management (DRM) systems might impact the market for goods. We are doing this as part of

By |July 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Value of DRM Locks