Worth Reading: Not all who wander are lost

Not all who wander are lost is a favorite “Lord of the Rings” nerd-ism, and one I’ve always personally loved. Gandalf, however, never tried to learn computer programming, and also he already had a pretty

By |June 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Not all who wander are lost

Worth Reading: Ego is the enemy

When you hear the word enemy, you probably think about regular expressions, bugs, deployments, meetings, and deadlines. Actually, in our quest to reach our goals and become the software developers we want to be, we

By |June 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ego is the enemy

Worth Reading: Making providers responsible for content

When online content hosts face a risk of litigation over user-generated content, they will respond with overbroad censorship measures that limit individuals’ rights to post and access lawful, constitutionally protected speech. This is true whether

By |June 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Making providers responsible for content

Worth Reading: Liqid’s Composable System

Hardware is, by its very nature, physical and therefore, unlike software or virtual hardware and software routines encoded by FPGAs, it is the one thing that cannot be easily changed. The dream of composable systems,

By |June 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Liqid’s Composable System

Worth Reading: What if there is no money in systems?

Making money in the information technology market has always been a challenge, but it keeps getting increasingly difficult as the tumultuous change in how companies consume compute, storage, and networking rips through all aspects of

By |June 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: What if there is no money in systems?

Worth Reading: The next five years of IPv6

The qualities of this deployment seem to me (at least) to best fit a logistic supply curve. Why? Because the economics application is often to model the rate of uptake of innovation, where we know

By |June 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The next five years of IPv6

Worth Reading: vDoS for Money

At the height of vDOS’s profitability in mid-2015, the DDoS-for-hire service was earning its proprietors more than $42,000 a month in PayPal and Bitcoin payments from thousands of subscribers. That’s according to an analysis of

By |June 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: vDoS for Money

Worth Reading: World IPv6 Report

On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five

By |June 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: World IPv6 Report

Worth Reading: Keeping positive while job hunting

Like many cities, Washington DC is a place one’s job title can define his or her success or self-worth. In the digital age, many still carry business cards with our titles. Romantic meet-ups begin with

By |June 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Keeping positive while job hunting

Worth Reading: Fast changes, illustrated

A new industrial revolution has begun. Here are two small examples to illustrate what it will be like. Extrapolate these a thousand fold. Then do so again. That’s what will happen in the next 70

By |June 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fast changes, illustrated

Worth Reading: Connecting Nepal

In 1997, we finally got the Internet in Nepal. Unfortunately, it was only available in the capital, Kathmandu, which is very far from my village of Nangi. But almost immediately, I started thinking of ways

By |June 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Connecting Nepal

Worth Reading: pbgpp

pbgpp allows network operators to apply a wide range of filters, either on network layer (src IP, dst IP), but foremost BGP fields — for example, prefix, communities, or next hop. Filters are applied in

By |June 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: pbgpp

Worth Reading: The forecast is still cloudy

The technical content of this year’s BCE was, as usual, presented by some of the best and brightest minds in telecom. Unfortunately, most of those minds were in agreement that the landscape for SDN and

By |June 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The forecast is still cloudy

Worth Reading: WannaCry and Vulnerabilities

All software contains bugs or errors in the code. Some of these bugs have security implications, granting an attacker unauthorized access to or control of a computer. These vulnerabilities are rampant in the software we

By |June 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: WannaCry and Vulnerabilities

Worth Reading: Tolerance

The idea of tolerance is that reasonable people can disagree. You still believe you are right, and the other person is wrong, but you accept that they are nonetheless a reasonable person with good intentions,

By |June 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tolerance

Worth Reading: Tainted Leaks

This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then “leaked” to achieve specific propaganda

By |June 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tainted Leaks

Worth Reading: Bill would surveil Americans for life

The bill requires sharing of private student data among various federal agencies, including the U.S. Department of Education’s Office of Federal Student Aid, the Department of Treasury, the Department of Defense, the Department of Veterans

By |June 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bill would surveil Americans for life

Worth Reading: We are all groot

If you venture forth on becoming a programmer after reaching any kind of reasonable adulthood — i.e., gotten through college, survived the military, worked a “real” job or two — you’re used to feeling reasonably

By |June 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: We are all groot

Worth Reading: These words should be banned

Client: “Our Big Data Rock Star ideated a cloud-based, scalable, native programmatic tool set that produced excellent learnings.” [Consultant]: “Well, it sounds like he took it to the next level … efforting 110% to craft

By |May 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: These words should be banned

Worth Reading: The future of ransomware

Ransomware isn't new, but it's increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It's extortion taken to its networked

By |May 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The future of ransomware

Worth Reading: Hi gamut monitors

For the last 20 years, the display industry has settled on a limited, standard range of colors, called the sRGB gamut. If the lopsided, chopped-off-rainbow-disc below (technical name: the “1931 CIE Chromaticity Diagram”) represents all

By |May 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hi gamut monitors

Worth Reading: ISO 27018 for the cloud

Cloud computing technologies have revolutionized the way organizations manage and store their information. Where companies used to house and maintain their own data, a host of organizations have now made the switch to a cloud-based

By |May 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ISO 27018 for the cloud

Worth Watching: The Impact of Encryption

In episode 4 the panel discusses the ever increasing pervasiveness of encrypted traffic on our networks and how that encrypted traffic impacts the services that we run today. —The Network Collective

By |May 29th, 2017|Categories: WORTH READING|Comments Off on Worth Watching: The Impact of Encryption

Worth Reading: Who controls the Internet?

Who controls the Internet? How much influence do they have? And what would happen if one of those parties launched an attack or was compromised and used to launch an attack? Previous works have looked

By |May 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Who controls the Internet?

Worth Reading: A better way to compare yourself

Comparing your work or abilities to someone else’s can be an unproductive and self-destructive activity. Yet we compare ourselves all the time. In my own experience, it feels like every day I’m comparing my work

By |May 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A better way to compare yourself

Worth Reading: Who pays security costs?

Computer security costs money. It costs more to develop secure software, and there's an ongoing maintenance cost to patch the remaining holes. Spending more time and money up front will likely result in lesser maintenance

By |May 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Who pays security costs?

Reading List: WannaCry and Ransomware

A good bit has been written about the recent WannaCry outbreak over the last few weeks; rather than stringing the best out through Worth Reading posts, I have collected the three best posts on the

By |May 24th, 2017|Categories: LEFT, NORESHARE, SECURITY|Comments Off on Reading List: WannaCry and Ransomware

Worth Reading: Key logger audio driver

The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user's keystrokes and saves the information to a local file, accessible to

By |May 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Key logger audio driver

Worth Reading: Mapping with wifi

We think of Wi-Fi as primarily bathing our homes and offices in a comfy, invisible blanket of data and internet access, but just as a blanket can take on the shapes of the bodies it

By |May 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Mapping with wifi

Worth Reading: Security debt

Just like organizations can build up technical debt, so too can they also build up something called “security debt,” if they don’t plan accordingly... In the past, security used to be ignored by pretty much

By |May 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Security debt

Worth Reading: Hype to reality

Looking back, even long term industry veterans can’t remember so many ‘earth shattering’, ‘ground breaking’ and ‘industry changing’ solutions hitting the market, in such a short timeframe. SDN will revolutionize the way we manage networks,

By |May 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hype to reality

Worth Reading: Humans training their AI replacements

Some humans are already training the artificial intelligence systems that will take over their jobs, and reporters are wondering if their experiences offer the first glimpses of an exotic new future of diminished human utility

By |May 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Humans training their AI replacements

Worth Reading: Bartering for privacy

If data is the new currency then why isn’t exchanging data for use of a service a barter transaction? If a doctor exchanges medical services for chickens, for example, that is a taxable event at

By |May 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bartering for privacy

Worth Reading: Openstack and complexity

It was only one T-shirt amongst the crowd of attendees at Monday’s opening day of OpenStack Summit 2017 in Boston, but it spoke on behalf of a good many others: “Make OpenStack Great Again.” —The

By |May 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Openstack and complexity

Worth Reading: RDNSS enabled in Windows 10

It is a pleasant surprise for many (us included) that Microsoft implemented support for the RDNSS (RFC 8106) option in Router Advertisements beginning with the Windows 10 Creators Update. Interestingly, I wasn’t able to find

By |May 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: RDNSS enabled in Windows 10

Worth Reading: IoT devices will never be secure

The biggest problem with IoT security is that most devices are going to be relatively simple and inexpensive connected things. The bandwidth consumption of these devices should be kept to the minimum to save bandwidth.

By |May 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IoT devices will never be secure

Troubleshooting: Half Split

The best models will support the second crucial skill required for troubleshooting: seeing the system as a set of problems to be solved. The problem/solution mindset is so critical in really understanding how

By |May 16th, 2017|Categories: LEFT, SKILLS, TROUBLESHOOTING|Comments Off on Troubleshooting: Half Split

Worth Reading: Enabling DNSSEC Validation

In July 2010, we saw an important Internet milestone: the Domain Name System (DNS) root zone was signed with DNSSEC, the DNS security extensions. DNS was designed without much thought given to security, but DNSSEC

By |May 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Enabling DNSSEC Validation

Worth Reading: Improving peering relationships in Japan

Route servers are used by many Internet Exchange Points (IXPs) — including our own at Japan Internet Exchange (JPIX) — to facilitate multilateral peering among various members. To better understand the peering characteristics of our

By |May 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Improving peering relationships in Japan

Worth Reading: Partner or die

If your job is process oriented, for example, calculating make-goods for improperly filled orders, your whole department will be automated soon. Don’t let the pink slip surprise you. If you analyze numbers in Excel, craft

By |May 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Partner or die

Worth Reading: Digital advertising takes a hit

But how effectively does that information work to meet advertiser goals? As advertisers including P&G, which spends billions of dollars each year on all its advertising for brands including Crest, Old Spice, and Gillette, have

By |May 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Digital advertising takes a hit

Worth Reading: Value constrains us

I only take part in a few services, and I’m not consistently active on any of them. Despite however many followers I might have on a given platform, the world doesn’t care what I have

By |May 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Value constrains us

Worth Reading: Mind the gap

The sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security

By |May 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Mind the gap

Worth Reading: Cherry picker

For big data analytics jobs, especially recurring jobs, finding a good cloud configuration (number and type of machines, CPU, memory ,disk and network options) can make a big different to overall cost and runtimes. Likewise,

By |May 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cherry picker

Worth Reading: Who really has fast lanes?

Internet Association members sometimes say that they could actually afford to pay more for fast lanes but they are worried about the little guys, the startup, who may not be able to pay more and

By |May 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Who really has fast lanes?

Worth Reading: Be careful what you wish for

After a few minutes of hyperventilating into an empty Dunkin Donuts bag, though, I calmed down enough to appreciate that the guy is trying to provide exactly what I’ve been complaining about the lack of

By |May 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Be careful what you wish for

Worth Reading: Coding is hard

Of course, sitting in front of a computer writing code isn’t going to improve your physical health. JavaScript is great for building apps, not abs. I don’t think it’s too much of a stretch, though,

By |May 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Coding is hard

Worth Reading: Commodifying words

Words (and by extension their constituent letters) are as free to utter and use as is the air sustaining life. No one owns them. There is no toll fee to be paid to dictionary makers

By |May 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Commodifying words

Worth Reading: Hackers use drones and lasers to bypass air gap

When hackers infect computers with malware, they generally communicate with their code over the internet via a command-and-control server. But firewalls and intrusion detection systems can block communication going to and from suspicious domains and

By |May 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hackers use drones and lasers to bypass air gap

Worth Reading: Domain names fade

The internet has changed and evolved ever since it's ancestors first came to life in the late 1960's. Some technology fades away and is forgotten; other aspects continue but are overlaid, like geological sediments, so

By |May 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Domain names fade

Worth Reading: Test Strategy for Samza/Kafka Services

Over a decade ago, test strategies invested heavily in UI-driven tests. Backend and mid-tier services were tested using automated UI-based tests. While UI-based tests have certain merits, such as testing user flows, they are also

By |May 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Test Strategy for Samza/Kafka Services

Upcoming Webinar: Open Networking

I'm doing a webinar over at IP Space next week— Most modern data centers are still using vendor-driven "future proof" routers and switches with offering lots of (often unnecessary) capabilities. To build large, however, it

By |May 4th, 2017|Categories: LEFT, NORESHARE, OTHER|Tags: |Comments Off on Upcoming Webinar: Open Networking

Worth Reading: A bleak picture of internet trust

The 2017 CIGI-Ipsos Global Survey on Internet Security and Trust paints a bleak picture of the current state of trust online. A majority of those surveyed said they are more concerned about their privacy than

By |May 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A bleak picture of internet trust

Worth Reading: Riding the virtual SAN gravy train

Being the first mover in establishing a new technology in the enterprise is important, but it is not more important than having a vast installed base and sales force peddling an existing and adjacent product

By |May 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Riding the virtual SAN gravy train

Worth Reading: Isoralio

Isolario is a not-for-profit, real-time BGP route collecting research project developed at the IIT-CNR of Pisa, Italy. Its aim is to improve the knowledge about the AS-level ecosystem of the Internet by increasing the amount

By |May 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Isoralio

Worth Reading: How to choose a sandbox

Businesses have become painfully aware that conventional approaches — virus signature scanning and URL filtering — are no longer sufficient in the fight against cyberthreats. This is in part because malware is constantly changing, generating new

By |May 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: How to choose a sandbox

Worth Reading: Joining together to fight spam

Last October, in the vibrant city of Bangkok, the Internet Society joined regulators for an in-depth conversation about how to eliminate spam and its harmful effects. Our kind hosts were the Canadian Radio-television and Telecommunications

By |April 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Joining together to fight spam

Worth Reading: Hijacking merchant accounts

Last month Yours Truly got snookered by a too-good-to-be-true online scam in which some dirtball hijacked an Amazon merchant’s account and used it to pimp steeply discounted electronics that he never intended to sell. Amazon

By |April 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Hijacking merchant accounts

Worth Reading: The Telsa Bubble

Tesla has carved out a small niche by selling a $50,000 car for $100,000 to customers who are willing to pay a premium to be able to say that they’re on the cutting edge or

By |April 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Telsa Bubble

Worth Reading: Tracing diet pill spam

Reading junk spam messages isn’t exactly my idea of a good time, but sometimes fun can be had when you take a moment to check who really sent the email. Here’s the simple story of

By |April 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tracing diet pill spam

Worth Reading: Learning blockchains

A blockchain is a digital ledger of records that’s arranged in chunks of data called blocks. These blocks then link with one another through a cryptographic validation known as a hashing function. Linked together, these

By |April 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Learning blockchains

Worth Reading: Password and security recommendations

Rather than just regurgitate the usual unworkable advice (make each password 14 different random characters, change them every week, and never write them down) we tried to look at the real threats on the current

By |April 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Password and security recommendations

Worth Reading: AI driven networks

Few realize how little has changed in the way that carriers and operators build, utilize and manage their networks. Whether due to the fact that carrier-grade performance relies on stringent, rigid equipment, or because the

By |April 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AI driven networks

Worth Reading: Three characteristics

One of the first things a person on the leadership development journey should understand is that there is intrinsic value in developing character even if one never obtains external results from one’s endeavors. This is

By |April 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Three characteristics

Worth Reading: Will self driving cars be safe?

Analysts estimate that by 2030, self-driving cars and trucks (autonomous vehicles) could account for as much as 60 percent of US auto sales. That’s great! But autonomous vehicles are basically computers on wheels, and computers

By |April 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Will self driving cars be safe?

Worth Reading: TIIME to pay attention to identity

The global Research and Education (R&E) community has led the way in developing and fine-tuning the technologies and associated policies that enable Federated IAM to work well, and the technology has become core infrastructure for

By |April 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: TIIME to pay attention to identity

Administravia 20170420

A couple of minor items for this week. First, I've removed the series page, and started adding subcategories. I think the subcategories will be more helpful in finding the material you're looking for among the

By |April 20th, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on Administravia 20170420

Worth Reading: Game of nodes

There’s a whirlwind of information on the topic of network commoditization. Seriously. Just search in your favorite search engine for “SDN,” “NFV,” or “telco cloud.” You will find dozens of open source projects, communities, forums,

By |April 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Game of nodes

Worth Reading: GraphQL

Practically speaking, the GraphQL layer lives between the client and one or more data sources, receiving client requests and fetching the necessary data according to your instructions. Confused? It’s metaphor time! The old REST model

By |April 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: GraphQL

Worth Reading: IPv6 data exfiltration

The transition to internet protocol version 6 has opened up a whole new range of threat vectors that allow attackers to set up undetectable communications channels across networks, researchers have found. A paper has been

By |April 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 data exfiltration

Worth Reading: PDoS attacks

Imagine a fast moving bot attack designed to render the victim’s hardware from functioning. Called Permanent Denial of Service attacks (PDoS attacks), this form of cyber-attack is becoming increasingly popular in 2017 as more incidents

By |April 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: PDoS attacks

Worth Reading: SGXIO

Intel’s SGX provides hardware-secured enclaves for trusted execution of applications in an untrusted environment. Previously we’ve looked at Haven, which uses SGX in the context of cloud infrastructure, SCONE which shows how to run docker

By |April 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: SGXIO

Worth Reading: Building Venice

What we do with Venice is support incremental upgrades of the cluster. Both of these approaches use a cluster of storage nodes. Given that our database is both sharded and replicated, we can bring down

By |April 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Building Venice

Worth Reading: Up!

Far from being a vibrant environment with an array of competitive offerings, the activity of providing so-called “last mile” Internet access appears to have been reduced to an environment where, in many markets, a small

By |April 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Up!

Worth Reading: Google’s TPU architecture

Four years ago, Google started to see the real potential for deploying neural networks to support a large number of new services. During that time it was also clear that, given the existing hardware, if

By |April 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Google’s TPU architecture

On the ‘net: Why a new routing stack?

In late 2016, several companies worked together to fork Quagga—that is, to pull the code based into a new Git repository, and hence into a separately maintained project. This new open source routing stack has

By |April 12th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: Why a new routing stack?

Worth Reading: Too big not to fail

It’s predictability that matters, not reliability. Stuff can fail… Stuff will fail. With tens of thousands of servers, lots of stuff fails every day! You just need to predict how often. ... Baroque is an

By |April 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Too big not to fail

Worth Reading: Microsoft’s Open Approach to Networking

At Microsoft, we’re focused on enabling our customers by supporting all the technologies they depend on, and collaborating across organizational and industrial boundaries to bring the best possible experience to the cloud. Microsoft embraces open

By |April 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Microsoft’s Open Approach to Networking

Worth Reading: Seven tips to a better profile

By now, you undoubtedly know that a strong LinkedIn profile is critical for your career. LinkedIn, the business and employment-oriented social networking service, is where 94% of recruiters search for job candidates. It also serves

By |April 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Seven tips to a better profile

Worth Reading: We are none of us imposters

Sitting in the conference room, I looked up at the whiteboard covered in a clever design. I hadn’t understood the design immediately, but then as my mentor explained it to me, I comprehended the brilliance

By |April 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: We are none of us imposters

DNS Glitch

Had a DNS glitch mid morning ET in switching some configurations around. It should be back up and running now, and rule11.tech should be coming up as a secondary domain soon'ish.

By |April 7th, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on DNS Glitch

Worth Reading: ONIE in the Data Center

ONIE stands for Open Networking Install Environment; it allows a network operating system (NOS) to be installed on any white-box switch hardware that supports this technology. Essentially it’s an extremely lightweight Linux implementation that is

By |April 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ONIE in the Data Center

Worth Reading: Intel Defends Chip Innovation

With absolute dominance in datacenter and desktop compute, considerable sway in datacenter storage, a growing presence in networking, and profit margins that are the envy of the manufacturing and tech sectors alike, it is not

By |April 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Intel Defends Chip Innovation

Worth Reading: Microservices to the Edge

There’s a hidden tension here. Once you put code at the edge you violate two of Lambda’s key assumptions: functions are composed using scalable backend services; low latency messaging. The edge will have a high

By |April 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Microservices to the Edge

Worth Reading: IPAM and RIRs

In terms of the strategy surrounding IPAM, most of the thinking was focused on a ‘downward’ approach, in as much as you define a pool of IP addresses and the role of IPAM is to

By |April 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPAM and RIRs

On the ‘net: CAP and SDN

The CAP theorem essentially states that consistency, accessibility, and portioning are three sides of a tradeoff triangle. Much like quick, cheap, and quality; or state, optimization, and surface; CAP posits that you can choose “two

By |April 4th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: CAP and SDN

Worth Reading: Botnets in the Cloud

The arms race between data security professionals and cybercriminals continues at a rapid pace. More than ever, attackers exploit compute resources for malicious purposes by deploying malware, known as “bots”, in virtual machines running in

By |April 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Botnets in the Cloud

Distributed Denial of Service Open Threat Signaling (DOTS)

When the inevitable 2AM call happens—"our network is under attack"—what do you do? After running through the OODA loop (1, 2, 3, 4), used communities to distribute the attack as much as possible, mitigated the

By |April 3rd, 2017|Categories: DDOS, LEFT, STANDARDS, TECHNOLOGY|Tags: , , , , , , |Comments Off on Distributed Denial of Service Open Threat Signaling (DOTS)

Worth Reading: A Guide to Private VPN Services

Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet service providers (ISPs) from sharing or selling customer browsing history, among other personal data.

By |April 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A Guide to Private VPN Services

Worth Reading: Is Enterprise Networking Lost in the Cloud?

In the end, only a combination of private, public and hybrid networking can deliver the levels of reliability, security, scalability and flexibility that today’s enterprises require. Traditional private WANs are simply too slow, inflexible and

By |March 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Is Enterprise Networking Lost in the Cloud?

Worth Reading: It’s Personal

Meeting people we’ve talked about, directly or not, brings a poignant perspective to creating content for a wide audience. It’s personal. Somebody made a decision to create the product that way. Some group of humans

By |March 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: It’s Personal

Worth Reading: How Many Books?

Ever wonder how many books you’ll have read by the time you die? We may never know the answer to that question, but we might be able to guess how many we have remaining. A

By |March 29th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: How Many Books?

Reaction: The Future is…

This week, I ran across two posts that follow down a path I've gone down before—but it is well worth bringing this point up again. Once more into the breach. Tom, over at the Networking

By |March 28th, 2017|Categories: CULTURE, REACTION|Comments Off on Reaction: The Future is…

Worth Reading: Frequently Asked Questions on Undersea Cable

I’ve been involved with TeleGeography’s research on submarine cables since 2000. Over the years I’ve fielded numerous questions about the submarine cable industry from journalists, investors, family and friends. It seems as good a time

By |March 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Frequently Asked Questions on Undersea Cable

Worth Reading: The Future of Networking (In One Slide)

The telecoms industry is, I believe, overdue for a 'lean' revolution. This will change its working model from 'purpose-for-fitness' to 'fitness-for-purpose'. For networks, that means switching from 'build then reason about performance' to 'reason about

By |March 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Future of Networking (In One Slide)

Worth Reading: Browser Watch

Welcome to another edition of Browser Watch, the regular feature that runs down the latest news and developments among all the most popular and up-and-coming browsers available. Whether you’re a designer, developer or both, you’ll

By |March 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Browser Watch

Worth Reading: IoT Under Siege

Dahua, the world’s second-largest maker of “Internet of Things” devices like security cameras and digital video recorders (DVRs), has shipped a software update that closes a gaping security hole in a broad swath of its

By |March 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IoT Under Siege

Worth Reading: Rescuing Network Time Protocol

The Network Time Protocol (NTP) is an Internet Engineering Task Force (IETF) protocol. It is responsible for syncing time between servers, using a variety of reference clocks as a guide. To the average user, this

By |March 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Rescuing Network Time Protocol

Worth Reading: Large scale image processing with KAFKA

The digital world is becoming ever more visual. From webcams and drones to closed-circuit television and high-resolution satellites, the number of images created on a daily basis is increasing and in many cases, these images

By |March 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Large scale image processing with KAFKA

Worth Reading: Just Press Reboot

After you pass security at Schiphol, Amsterdam's international airport, go past the Christian Dior boutique and leave the Pretentious and Overpriced Mediocre Chocolate Shop (maybe not the exact name) on your left. On the wall

By |March 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Just Press Reboot

Worth Reading: Optical encryption moves to ubiquitous

When initially introduced into the market, optical encryption was a niche application looking for a market. Optical encryption protects primarily against fiber tapping and traffic cloning, which were not viewed as widespread threats a few

By |March 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Optical encryption moves to ubiquitous

Worth Reading: My Data, Your Business

In times like these, it’s easy to be paranoid. Almost every day there is a new story about an app, a TV or a child’s toy that is collecting too much data, or a massive

By |March 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: My Data, Your Business

Middleboxes and the End-to-End Principle

The IP suite was always loosely grounded in the end-to-end principle, defined here (a version of this paper is also apparently available here), is quoted in RFC2775 as: The function in question can completely and

By |March 20th, 2017|Categories: LEFT, STANDARDS, TECHNOLOGY|Comments Off on Middleboxes and the End-to-End Principle

Worth Reading: So You Want to get Certified

So you want to get certified. Nearly every technology vendor you can think of offers a certification program. You might have a few different reasons for wanting to get certified, and vendors have just as

By |March 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: So You Want to get Certified

Worth Reading: Building better ransomware

This is kind of a funny post for me to write, since it ransomwareinvolves speculating about a very destructive type of software — and possibly offering some (very impractical) suggestions on how it might be

By |March 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Building better ransomware

Worth Reading: The Internet’s gilded age

The rise of the Internet has heralded rapid changes in our society. The opportunities presented by a capable and ubiquitous communications system and a global transportation network have taken some corporations from the multinational to

By |March 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Internet’s gilded age

Worth Reading: Web audio API

Web Audio API lets us make sound right in the browser. It makes your sites, apps, and games more fun and engaging. You can even build music-specific applications like drum machines and synthesizers. In this

By |March 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Web audio API

Worth Reading: Digital security assessment quiz

As our reliance on digital devices increases, so does our digital vulnerability. Cyber attacks and hacks are growing both in number and sophistication, making it more important than ever that we take control of our

By |March 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Digital security assessment quiz

On the ‘net: PCEP

The original Path Control Element Protocol (PCEP) work dates from the early 2000’s, with the first IETF RFC (4655) being made informational in 2006—which means PCEP predates the time when SDNs were “cool.” PCEP was

By |March 14th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Tags: |Comments Off on On the ‘net: PCEP

Worth Reading: Fat Finger Folly

You see, many newly created production systems, when they first come online, focus more on functionality and less on supportability. They are built to provide a specific capability. Of course, the services must be maintained,

By |March 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fat Finger Folly

Worth Reading: Web Scale Networking

In this episode of The New Stack Makers, we spoke to Josh Leslie, Chief Executive Officer, and JR Rivers, Chief Technology Officer and co-founder of Web-scale networking software provider Cumulus Networks. We discussed how to

By |March 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Web Scale Networking

Worth Reading: When your code has to work

Douglas Crockford famously declared browsers to be “the most hostile software engineering environment imaginable,” and that wasn't hyperbole. Ensuring that our websites work across a myriad of different devices, screen sizes and browsers our users

By |March 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: When your code has to work

Worth Reading: The nuanced future of 5G

5G sounds like the successor to 4G cellular telephony, and indeed that is the intent. While the progression from 2G to 3G, to 4G and now 5G seems simple, the story is more nuanced. At

By |March 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The nuanced future of 5G

Worth Reading: Keys to solving wicked problems

The incredible pace of change of the Internet — from research laboratory inception to global telecommunication necessity — is due to the continuing pursuit, development and deployment of technology and practices adopted to make the

By |March 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Keys to solving wicked problems

Worth Reading: Bouncing back to private clouds

There is an adage, not quite yet old, suggesting that compute is free but storage is not. Perhaps a more accurate and, as far as public clouds are concerned, apt adaptation of this saying might

By |March 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bouncing back to private clouds

Worth Reading: Creating an IXP in Denver

The word Internet is short for internetwork. It’s just a network of networks. So the more places you can connect those networks, the more robust the whole system is. That’s what Internet Exchange Points (“IXPs”)

By |March 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Creating an IXP in Denver

Worth Reading: Cisco’s identity crisis

Our Cisco team has been reaching out to get feedback on our relationship with Cisco and its products — a healthy practice for any vendor. I’ve tried to be open, honest, and consistent in all

By |March 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Cisco’s identity crisis

Worth Reading: Ransomware for Dummies

Among today’s fastest-growing cybercrime epidemics is “ransomware,” malicious software that encrypts your computer files, photos, music and documents and then demands payment in Bitcoin to recover access to the files. A big reason for the

By |March 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Ransomware for Dummies

Worth Reading: Five jobs robots will take first

Oxford University researchers have estimated that 47 percent of U.S. jobs could be automated within the next two decades. But which white-collar jobs will robots take first? First, we should define “robots” (for this article

By |March 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Five jobs robots will take first

Worth Reading: Redliner

...due to the nature of rapid-growing web services like LinkedIn, we face big challenges when trying to measure service capacity limits. These challenges come from the constantly changing traffic shape, the heterogeneous infrastructure characteristics, and

By |March 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Redliner

Administravia 030417

Just a few notes on the blog site in general. I've rebuilt the sixty books pages without tables. I don't know if this is better, but it does load a bit faster. I've also added

By |March 6th, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on Administravia 030417

Worth Reading: The digital age produces binary outcomes

The digital age produces binary outcomes. Winners tend to win overwhelmingly—in war as well as in business. The Soviet Union crumbled in the late 1980s when American technology bested Soviet military spending, then estimated at

By |March 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The digital age produces binary outcomes

Worth Reading: Current trends in machine learning

During the past decade, enterprises have begun using machine learning (ML) to collect and analyze large amounts of data to obtain a competitive advantage. Now some are looking to go even deeper – using a

By |March 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Current trends in machine learning

Worth Reading: The data deletion landscape

Delete is a word built into the vocabulary of users from the beginning of personal computing. When commanded to “del,” an operating system appeared to erase a file completely. However, right from the start, a

By |March 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The data deletion landscape

Worth Reading: The rise of SSL based threats

The majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free. On any given day in the Zscaler cloud,

By |March 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The rise of SSL based threats

Worth Reading: How to bury a breach notification

Amid the hustle and bustle of the RSA Security Conference in San Francisco last week, researchers at RSA released a startling report that received very little press coverage relative to its overall importance. The report

By |March 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: How to bury a breach notification

Worth Reading: Commercial incentives behind IPv6 deployment

The Best Practice Forum (BPF) on IPv6 at the Internet Governance Forum (IGF) explored what economic and commercial incentives drive providers, companies and organizations to deploy IPv6 on their networks and for their services. The

By |February 28th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Commercial incentives behind IPv6 deployment

Worth Reading: SHA-1 collision found

Cryptographic hash functions like SHA-1 are a cryptographer’s swiss army knife. You’ll find that hashes play a role in browser security, managing code repositories, or even just detecting duplicate files in storage. Hash functions compress

By |February 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: SHA-1 collision found

The Perfect and the Good

Perfect and good: one is just an extension of the other, right? When I was 16 (a long, long, long time ago), I was destined to be a great graphis—a designer and/or illustrator

By |February 27th, 2017|Categories: DESIGN, LEFT, SKILLS|Comments Off on The Perfect and the Good

Worth Reading: A fistful of bitcoins

The point forcefully made in ‘A Fistful of Bitcoins’ remains true today – Bitcoin offers little in the way of anonymity. In fact, we get better and better at techniques for de-anonymising block chain transactions

By |February 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A fistful of bitcoins

Worth Reading: Bare metal cloud

When you think of the public cloud, the tendency is to focus on the big ones, like Amazon Web Services, Microsoft Azure, or Google Cloud Platform. They’re massive, dominating the public cloud skyline with huge

By |February 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bare metal cloud

Worth Reading: Security in a box

Security in-a-box was created by a diverse team of experts who understand not only the conditions under which advocates work, but also the resource restrictions they face. Although the toolkit was designed primarily to address

By |February 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Security in a box

Worth Reading: AI and being left out

It is often argued that technological progress always leads to massive shifts in employment but that at the end of the day the economy grows as new jobs are created. However, that’s a far too

By |February 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: AI and being left out

On the ‘net: Net Neutrality Explained

Net Neutrality seems like a simple, easy to understand concept—but it seems the deeper you dig into the concept, this appearance of simplicity is actually just a light coat of surfacing on a very complex

By |February 22nd, 2017|Categories: ON THE NET|Comments Off on On the ‘net: Net Neutrality Explained

Worth Reading: Overcoming data center cabling challenges

Now, many users have started employing high-density 40GbE switch line cards to break out as part of 10GbE applications. For example, a high-density 10GbE SFP+ line card has 48x10GbE ports, whereas a high-density 40GbE QSFP+

By |February 22nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Overcoming data center cabling challenges

Worth Reading: A digital Geneva treaty

In a blog post published today on Microsoft's website, company President and Chief Legal Officer, Brad Smith, has raised concerns over escalating cyberattcks over the past year and the need for a Digital Geneva Convention.

By |February 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A digital Geneva treaty

Worth Reading: The Root of the DNS

The namespace of the DNS is a hierarchically structured label space. Each label can have an arbitrary number of immediately descendant labels, and only one immediate parent label. Domain names are expressed as an ordered

By |February 21st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Root of the DNS

Worth Reading: ARM gains a foothold in China

China represents a huge opportunity for chip designer ARM as it looks to extend its low-power system-on-a-chip (SoC) architecture beyond the mobile and embedded devices spaces and into new areas, such as the datacenter and

By |February 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ARM gains a foothold in China

Worth Reading: Mud Slinging

Network Engineers are redefining themselves, always learning, always trying to improve themselves and marketing still puts out things like this in 2017. Sales and marketing definitely need to up their game. As my CEO said

By |February 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Mud Slinging

Worth Reading: Putting ARM servers through the paces

When ARM officials and partners several years ago began talking about pushing the low-power chip architecture from our phones and tablets and into the datacenter, the initial target was the emerging field of microservers –

By |February 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Putting ARM servers through the paces

Worth Reading: Extend your ITIL

Defining precise cybersecurity services in the context of an IT Infrastructure Library (ITIL) is very important. From my perspective, many organizations struggle with cybersecurity because they do not understand what these essential services are. In

By |February 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Extend your ITIL

Worth Reading: Got a license for that YouTube channel?

Justin Chandler was shocked and confused when he was given a citation for operating a business out of his home without first obtaining a license. Unlike many people who run home-based businesses, Chandler doesn’t actually

By |February 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Got a license for that YouTube channel?

Metacognitive

If I could choose just a handful of skills you must learn to be a successful engineer, being metacognitive would certainly be among them. What is metacognition? OOne of my favorite books on the virtue

By |February 15th, 2017|Categories: SKILLS, Uncategorized|1 Comment

Worth Reading: The inconvenience of privacy

Unfortunately, it is not easy to assess the weight of privacy losses. Typically, in the online world, no small privacy loss will create a catastrophe. One business tracking one click of yours is not a

By |February 15th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The inconvenience of privacy

Worth Reading: IBM should buy…

We spend a lot of time contemplating what technologies will be deployed at the heart of servers, storage, and networks and thereby form the foundation of the next successive generations of platforms in the datacenter

By |February 14th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IBM should buy…

On the ‘net: I2RS Architecture

The last post on the topic of interface to the routing system (I2RS) discussed use cases; this one will provide an overview of the I2RS architecture, and then consider some challenges in the neighborhood of

By |February 14th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Tags: |Comments Off on On the ‘net: I2RS Architecture

Worth Reading: Inside the big Supermicro deal

Among the major companies that design and sell servers with their own brands, which are called original equipment manufacturers or OEMs, and those that co-design machines with customers and then make them, which are called

By |February 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Inside the big Supermicro deal

Worth Reading: Outage at Git

A short outage this week on the GitLab hosted code service struck a combination of fear and sympathy across the tech community and offered a sharp reminder of the importance of testing your backups again

By |February 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Outage at Git

Worth Reading: Dynamics on emerging spaces

The article (and the expectations set by the introduction to the paper itself) promise a little more than they deliver in my view – but what we do concretely get is a description of a

By |February 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Dynamics on emerging spaces

Worth Reading: There is no “normal” in microservices

There is no “normal” for a microservices environment. And if a groundbreaking November 2016 white paper [PDF], produced by a team of six researchers from the University of Messina, the U.K.’s Newcastle University, and IBM

By |February 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: There is no “normal” in microservices

Worth Reading: Evolving LTE for 5G

With 5G research progressing at a rapid pace, the standardization process has started in 3GPP. As the most prevalent mobile broadband communication technology worldwide, LTE constitutes an essential piece of the 5G puzzle. As such,

By |February 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Evolving LTE for 5G

Worth Reading: Security and the Internet of Things

Last year, on October 21, your digital video recorder ­- or at least a DVR like yours ­- knocked Twitter off the internet. Someone used your DVR, along with millions of insecure webcams, routers, and

By |February 9th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Security and the Internet of Things

Leave Your Ego at the Door

You are just about to walk into the interview room. Regardless of whether you are being interviewed, or interviewing—what are you thinking about? Are you thinking about winning? Are you thinking about whining? Or are

By |February 8th, 2017|Categories: CULTURE, LEFT|Comments Off on Leave Your Ego at the Door

Worth Reading: ARM challenges x86 in the cloud

The idea of ARM processors being used in datacenter servers has been kicking around more most of the decade. The low-power architecture dominates the mobile world of smartphones and tablets as well as embedded IoT

By |February 8th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: ARM challenges x86 in the cloud

Worth Reading: Addressing in 2016

The process of exhausting the remaining pools of IPv4 addresses in each of the Regional Internet Registries (RIRs) is continuing. Yet, despite this hiatus in the supply of IPv4 addresses, the Internet continues to grow.

By |February 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Addressing in 2016

Worth Reading: Shopping for tax information

The 2016 tax season is now in full swing in the United States, which means scammers are once again assembling vast dossiers of personal data and preparing to file fraudulent tax refund requests on behalf

By |February 7th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Shopping for tax information

Worth Reading: The right to an explanation

In just over a year, the General Data Protection Regulation (GDPR) becomes law in European member states. This paper focuses on just one particular aspect of the new law, article 22, as it relates to

By |February 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The right to an explanation

Worth Reading: Why SPF needs forwarding addresses

OSPF tries to solve some broken designs with Forwarding Address field in Type-5 LSA – a kludge that unnecessarily increases the already too-high complexity of OSPF. NSSA areas make the whole thing worse: OSPF needs

By |February 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Why SPF needs forwarding addresses

Worth Reading: Quantum safe glossary

The Cloud Security Alliance’s Quantum-Safe Security (QSS) Working Group announces their latest release with the Quantum-Safe Security Glossary. The QSS Working Group was formed to address key generation and transmission methods and to help the

By |February 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Quantum safe glossary

LiveLessons on Sale

My two LiveLessons are currently on sale at Pearson sites. Use the code RW60 to receive the discount. The sale price, $79 for each one, is available until the 15th of March.

By |February 3rd, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on LiveLessons on Sale

Worth Reading: Sorting through SD-WAN

I’ve written a lot about SDN and SD-WAN. SD-WAN is the best example of how SDN should be marketed to people. Instead of talking about features like APIs, orchestration, and programmability, you need to focus

By |February 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Sorting through SD-WAN

Worth Reading: Automation and ethics

As technologists, we have to mix together two concerns: relentlessly automating all aspects of business and life, while at the same time resisting the urge to become job-destroying, and, thus life-destroying jerks. “I was just

By |February 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Automation and ethics

Worth Reading: Lazy thinking and modularity

There are two flaws in the Modularity Always Wins theory. In order to succeed, “disruptive modularity” needs a stable architecture with well-defined and documented boundaries. Module innovators need to be able to slide their creations

By |February 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Lazy thinking and modularity

Worth Reading: Massive networks of fake accounts on Twitter

Massive collections of fake accounts are lying dormant on Twitter, suggests research. The largest network ties together more than 350,000 accounts and further work suggests others may be even bigger. UK researchers accidentally uncovered the

By |February 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Massive networks of fake accounts on Twitter

On the ‘net: Getting to know…

Russ White is on LinkedIn’s Infrastructure Engineering team, working on next-generation network design and architecture. He has worked in networking since the late 1980s, and has a long history contributing knowledge back to the networking

By |February 1st, 2017|Categories: ON THE NET|Comments Off on On the ‘net: Getting to know…

Worth Reading: Running from DDoS

As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks. At the beginning of 2016 we noted the largest attack

By |February 1st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Running from DDoS

Worth Reading: BGP in 2016

Figure 2 illustrates an important principle in BGP, that there is no single authoritative view of the routing table – all views are in fact relative to the perspective of the BGP speaker. It also

By |January 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: BGP in 2016

Worth Reading: The CCDE “aha” moment

The problem with my mindset was this need to 'jump to conclusions’, and the core of my issues with being successful with the CCDE practical exam. Hello, I'm Zig the preconceived notion guy! I will

By |January 31st, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The CCDE “aha” moment

Worth Reading: An infrastructure for on demand service profiling

LinkedIn has built hundreds of application services, with thousands of instances running in data centers. Optimizing the performance of these services can dramatically improve user experience and reduce operational costs, and profilers are commonly used

By |January 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: An infrastructure for on demand service profiling

Worth Reading: The CCDE Mindset

Preparing for the CCDE from a technology standpoint is relatively easy compared to getting into the right mindset and getting enough exposure to network designs. Don’t get me wrong, it’s a technically difficult exam but

By |January 30th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The CCDE Mindset

Worth Reading: IOS/XR in GNS3

Cisco IOS XRv is one of the most popular platforms among network engineers. However, this platform is only available in high-end devices, which might not be available to all engineers. For this reason, engineers prefer

By |January 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IOS/XR in GNS3

Worth Reading: Innovation at CIDR 2017

Last week was CIDR 2017, the biennial Conference on Innovative Data Systems Research. CIDR encourages authors to take a whole system perspective and especially values “innovation, experience-based insight, and vision.” That’s a very good match

By |January 27th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Innovation at CIDR 2017

Worth Reading: IPv6 server addressing strategies

In this post, I’ll discuss configuration approaches for systems that usually have been configured with “static” IP parameters in the IPv4 age/context (for example, servers in data centres). When it comes to IPv6 there are

By |January 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 server addressing strategies

Worth Reading: Every day is Monday in Operations

If Operations fails, so does your company—it is, as you might say, mission-critical. The delicate trust a company holds with its customers can be shattered by a single sustained outage. Just look at one outage

By |January 26th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Every day is Monday in Operations

Worth Reading: Windows 10 steps up ransomware defenses

Here’s some good news for the countless businesses getting ready for the migration to Windows 10: Microsoft recently announced that its Windows 10 Anniversary Update features security updates specifically targeted to fight ransomware. No defense

By |January 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Windows 10 steps up ransomware defenses

Worth Reading: Fix EULAs

Traditionally, once a person has purchased a product, she has been free to use it however she sees fit without oversight or control from the copyright owner. Purchasers have also been free to use competitors’

By |January 25th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Fix EULAs

Worth Reading: Internet routing detours

In November 2013, the Internet intelligence company Renesys (now owned by Dyn, Oracle) published an online article detailing an attack they called Targeted Internet Traffic Misdirection. Using Traceroute data, they discovered three paths that suffered

By |January 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Internet routing detours

On the ‘net: The background of I2RS

Through this (probably far too long) series on SDNs, we have looked at BGP, Fibbing, and Openflow. BGP and Fibbing would be described as augmented control planes; the distributed control plane is not replaced, but

By |January 24th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: The background of I2RS

Worth Reading: Study highlights lack of IoT security

Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organizations are ill-prepared for the risks they pose, according to a research report issued today from Ponemon Institute, IBM Security, and

By |January 24th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Study highlights lack of IoT security

Worth Reading: Videos from ION Bucharest

We held ION Bucharest last year alongside the Romanian Network Operators’ Group (RONOG). It took a little longer than usual, but now all the presentations and video archives are available online. As we gear up

By |January 23rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Videos from ION Bucharest

Worth Reading: A new propaganda agency is born

The newly created Global Engagement Center is tasked with coordinating the Federal Government’s efforts to “understand, expose, and counter foreign state and non-state propaganda and disinformation… aimed at undermining United States national security interests.” This

By |January 20th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: A new propaganda agency is born

Worth Reading: Inside the mind of cyber criminals

Information sharing amongst security specialists is crucial; in the eyes of a criminal, no company is unique. As a rule of thumb, perpetrators will initially cast a wide net and move downstream toward the easiest

By |January 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Inside the mind of cyber criminals

Large Scale Network Design LiveLesson

Alvaro and I finished recording a new LiveLesson back in December; it should be available for pre-purchase at the end of January. For those folks interested in network design, this is going to be a

By |January 19th, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on Large Scale Network Design LiveLesson

Worth Reading: Studying the IPv4 transfer market

The Internet community anticipated this almost two decades ago and standardized IPv6 as a long-term solution. IPv6 uptake is, however, still lagging. Hence, affected businesses have actively started seeking stop-gap measures to prolong the lifetime

By |January 19th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Studying the IPv4 transfer market

Worth Reading: Could zombie toasters DDoS my serverless?

With serverless, there is essentially no limit on the number of requests you could be handling — the service scales up automatically and almost instantaneously for every concurrent request. This is great if your product

By |January 18th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Could zombie toasters DDoS my serverless?

On the ‘net: Rockstar SE with Terry Kim

I was recently interviewed on Rockstar SEby Terry Kim—it's a worthwhile listen! Russ White has over 30 years of experience in network engineering; A Distinguished Architect during his time at Cisco, holds the highest certification

By |January 18th, 2017|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: Rockstar SE with Terry Kim

The Great Domain Debacle

For those who are interested—this weekend I got into a "discussion" with my old/current DNS provider, Network Solutions. I've been using them for years, but there have apparently been recent changes at the company. Part

By |January 17th, 2017|Categories: LEFT, NORESHARE, OTHER|Comments Off on The Great Domain Debacle

SDxE: Engineer Focused

As an engineer, you've probably asked yourself a thousand times—what does all this software defined stuff mean for me? Answers are out there, of course; it seems like everyone is writing about it. Some of

By |January 17th, 2017|Categories: LEFT, NORESHARE, OTHER, SCHEDULE|Comments Off on SDxE: Engineer Focused

Worth Reading: Python 3.6 released

The coding community got a nice bonus gift under our collective Christmas tree on December 23, 2016, when the Python Software Foundation released the latest version of the language, Python 3.6. While the rest of

By |January 17th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Python 3.6 released

Worth Reading: how to wade through 100’s of articles

Know why you read. Ignore content that doesn’t align with your personal consumption goals. Ignore content with clickbait titles. These articles are purposely designed to drive traffic, generating salable ad impressions. Most of the time,

By |January 16th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: how to wade through 100’s of articles

Worth Reading: Tier 1 carrier performance report

As Noction continues to intelligently optimize routing for more and more networks around the world, we find ourselves in the unique position of having great insights into the general Internet performance as well as the

By |January 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Tier 1 carrier performance report

Worth Reading: Class breaks

There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of systems. Examples might be a vulnerability in a

By |January 13th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Class breaks

Worth Reading: Let’s encrypt with DANE

If you looked at the realm of security, and X.509 certificate-based secure systems, we appear to be in the worst of all worlds: it can be expensive, inherently compromisable and slow to set up and

By |January 12th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Let’s encrypt with DANE

Worth Reading: The state of DNS security

Did you know that 89% of top-level domains are now signed with DNSSEC? Or that over 88% of .GOV domains and over 50% of .CZ domains are signed? Were you aware that over 103,000 domains

By |January 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The state of DNS security

Worth Reading: The FTC’s IoT challenge

One of the biggest cybersecurity stories of 2016 was the surge in online attacks caused by poorly-secured “Internet of Things” (IoT) devices such as Internet routers, security cameras, digital video recorders (DVRs) and smart appliances.

By |January 11th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The FTC’s IoT challenge

Worth Reading: Bleaker times for DNS registrars?

Verisign's spent the best part of 2016 putting out warnings. The .COM operator and domain industry heavyweight highlighted its Q3 earnings report with a stern "Ending Q4 '16 Domain Name Base expected to decrease by

By |January 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Bleaker times for DNS registrars?

Worth Reading: Notes on the lawsuit against D-Link

Today, the FTC filed a lawsuit[*] against D-Link for security problems, such as backdoor passwords. I thought I'd write up some notes. The suit is not "product liability", but "unfair and deceptive" business practices for

By |January 10th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Notes on the lawsuit against D-Link

Worth Reading: Lights at war

The stadium lights ripped the darkness over an empty field. They weren’t supposed to be on. The lights at Princeton University’s stadium, recently upgraded, should have followed an automated cycle, reducing the need for human

By |January 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Lights at war

Worth Reading: DRM versus civil liberties

Imagine a world where your Internet-connected car locks you in at the behest of its manufacturer—or the police. Where your media devices only let you consume mass media, not remix it to publish a counter-narrative

By |January 6th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: DRM versus civil liberties

Woth Reading: Domain name proxies for privacy

Privacy/proxy services carry no per se stigma of nefarious purpose, although when first introduced circa 2006 there was some skepticism they could enable cybersquatting and panelists expressed different views in weighing the legitimacy for their

By |January 5th, 2017|Categories: WORTH READING|Comments Off on Woth Reading: Domain name proxies for privacy

Worth Reading: eVPN in Cumulus LINUX

Many data centers today rely on layer 2 connectivity for specific applications and IP address mobility. However, an entire layer 2 data center can bring challenges such as large failure domains, spanning tree complexities, difficulty

By |January 5th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: eVPN in Cumulus LINUX

Worth Reading: Before you pay that ransom…

A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind. Five years ago you were more likely to get whacked by a

By |January 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Before you pay that ransom…

Worth Reading: The Wandera Report

The Wandera 2017 Mobile Leak Report, a global analysis of almost 4 billion requests across hundreds of thousands of corporate devices, found more than 200 mobile websites and apps leaking personally identifiable information across a

By |January 4th, 2017|Categories: WORTH READING|Comments Off on Worth Reading: The Wandera Report

Worth Reading: Smile vector

Smile Vector is a Twitter bot that can make any celebrity smile. It scrapes the web for pictures of faces, and then it morphs their expressions using a deep-learning-powered neural network. Its results aren’t perfect,

By |January 3rd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Smile vector

Worth Reading: Monitoring in containers

Monitoring is the hidden hero inside container infrastructure. Much like driving a car, we don’t think about what’s happening under the hood until something goes wrong. We want to pivot away from being reactive with

By |January 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Monitoring in containers

Worth Reading: Getting started with coding

If you work with computers in any aspect of your life, being able to code can be a very powerful tool. All too often however, I hear people say things like “it’s too difficult” or

By |January 2nd, 2017|Categories: WORTH READING|Comments Off on Worth Reading: Getting started with coding

Worth Reading: Leaving it to the last second

Thanks to the moon, the earth's rate of rotation is slowing down. It's a subtle interaction and the modeling of planetary dynamics predicts that the earth's rotation should be slowing down by an average of

By |December 23rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Leaving it to the last second

Worth Reading: The year of silicon photonics

Computing historians may look back on 2016 as the Year of Silicon Photonics. Not because the technology has become ubiquitous – that may yet be years away – but because the long-awaited silicon photonics offerings

By |December 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The year of silicon photonics

Worth Reading: The coming era of edge computing

Edge computing is a natural next step from cloud computing. The computer industry shifts back and forth from centralized computing, which has lots of power but is far away from the person or device using

By |December 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The coming era of edge computing

Worth Reading: Driverless infrastructure

It turns out machines can deploy software much better than humans can. Why? Because software deployment is a set of mechanical procedures that can be driven by a declarative language. It is a process primed

By |December 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Driverless infrastructure

Worth Reading: The spillover effect

At the same time that default and end-to-end encryption enables dissidents to communicate, it also enables terrorists and other criminals to plot and plan without fear of detection. It means that even when a judge

By |December 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The spillover effect

Worth Reading: Information paralysis

Modern Western man is suffering from an information overload. There are now over one million new books published each year in just the U.S., large newspapers publish anywhere from 1,000 to 5,000 pieces of content

By |December 20th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Information paralysis

Worth Reading: Ransom by spreading the infection

Researchers say they have uncovered ransomware still under development that comes with a novel and nasty twist. Infected victims of the ransomware known as Popcorn Time, have the option to either pay up, or they

By |December 20th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Ransom by spreading the infection

Worth Reading: The canary

Using a canary is no longer a nice-to-have capability for internet companies—it’s a necessity. The traditional operational models of software system development, qualification, deployment, and operation simply cannot keep up with the velocity of change

By |December 19th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The canary

Worth Reading: The economic model of Marai

Several media outlets have reported that a botnet based on the TR-064/TR-069 Mirai variant is being used to provide DDoS as a Service. These so-called Booter/Stresser or DDoS-for-hire services allow anyone willing to pay the

By |December 19th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The economic model of Marai

Worth Reading: The bandwidth paradox

If consumers are always on, so is the data center. From mobile applications to wearables, the number of devices that are always connected continues to grow. Surprisingly, many consumers don’t understand that behind wicked-fast music

By |December 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The bandwidth paradox

Worth Reading: Broadcom’s two ASIC lines

Just like every kind of compute job cannot be handled by a single type of microprocessor, the diversity of networking tasks in the datacenters of the world require a variety of different switch and router

By |December 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Broadcom’s two ASIC lines

Worth Reading: The new security normal

Today, the industry average time for finding an active attacker is about five months, reflecting the colossal failure of conventional security. The state of the union for federal security is that few if any non-defense

By |December 15th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The new security normal

Worth Reading: Sledgehammer DDoS

Monetization of DDoS attacks has been core to online crime way before the term cybercrime was ever coined. For the first half of the Internet's life, DDoS was primarily a mechanism to extort money from

By |December 15th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Sledgehammer DDoS

Worth Reading: The private path to censorship

Governments have a legitimate objective in preventing the commission of terrorist acts, but security concerns can also motivate policies that jeopardize fundamental rights. Yesterday’s announcement comes after several years of demands from governments in the

By |December 14th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The private path to censorship

Worth Reading: Hype driven development

HDD happens when a development team picks the “newest, hottest technology” to use on a project, based on how the technology is trending on Twitter, or on a number of enthusiastic blog posts or conference

By |December 13th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hype driven development

Worth Reading: W3C at the crossroads

The World Wide Web Consortium (W3C) has a hard decision to make: a coalition including the world's top research institutions; organizations supporting blind users on three continents; security firms; blockchain startups; browser vendors and user

By |December 13th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: W3C at the crossroads

Worth Reading: Network Time Protocol

Of these most important Internet protocols, NTP (Network Time Protocol) is the likely least understood and has the least attention and support. Until very recently, it was supported (part-time) by just one person — Harlen

By |December 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Network Time Protocol

snaproute Go BGP Code Dive (14): First Steps in Processing an Update

In the last post on this topic, we found the tail of the update chain. The actual event appears to be processed here— case BGPEventUpdateMsg: st.fsm.StartHoldTimer() bgpMsg := data.(*packet.BGPMessage) st.fsm.ProcessUpdateMessage(bgpMsg) —which is found around line

By |December 12th, 2016|Categories: BGP, BGP CODE, CODING, LEFT|Tags: , , |Comments Off on snaproute Go BGP Code Dive (14): First Steps in Processing an Update

Worth Reading: FPGA Accelerated Cloud

FPGAs have been an emerging topic on the application acceleration front over the last couple of years, but despite increased attention around use cases in machine learning and other hot areas, hands have been tied

By |December 9th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: FPGA Accelerated Cloud

Worth Reading: Car Makers Align with 5G

5G wireless technology has become a little like fully automated cars. Nearly every day some new study is forecasting an earlier than previously anticipated arrival of fully autonomous cars, while some respected expert is claiming

By |December 9th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Car Makers Align with 5G

Worth Reading: Binge Watching Makes You Stupid

Binge is the new black. That’s what Netflix, and other media outlets tell us as they rev up for the holiday season. Are your in-laws too much? Kids driving you nuts? Had enough holiday cooking,

By |December 8th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Binge Watching Makes You Stupid

Worth Reading: Hyper Moore’s Law

Over the last year in particular, we have documented the merger between high performance computing and deep learning and its various shared hardware and software ties. This next year promises far more on both horizons

By |December 8th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hyper Moore’s Law

Worth Reading: Marai Strikes Again

More than 900,000 customers of German ISP Deutsche Telekom (DT) were knocked offline this week after their Internet routers got infected by a new variant of a computer worm known as Mirai. The malware wriggled

By |December 7th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Marai Strikes Again

Worth Reading: Social Media is Entertainment

Like TV it now increasingly entertains us, and even more so than television it amplifies our existing beliefs and habits. It makes us feel more than think, and it comforts more than challenges. The result

By |December 7th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Social Media is Entertainment

Worth Reading: SF Subway Hacked

The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, “You are Hacked. ALL Data Encrypted.” Turns out, the miscreant behind this

By |December 6th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: SF Subway Hacked

Worth Reading: Kraken

How do you know how well your systems can perform under stress? How can you identify resource utilization bottlenecks? And how do you know your tests match the condititions experienced with live production traffic? You

By |December 6th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Kraken

Worth Reading: Navigating the Pentest World

The demand for penetration testing and security assessment services worldwide has been growing year-on-year. Driven largely by Governance, Risk, and Compliance (GRC) concerns, plus an evolving pressure to be observed taking information security and customer

By |December 5th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Navigating the Pentest World

Worth Reading: Akamai on the Krebs DDoS

Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this

By |December 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Akamai on the Krebs DDoS

Worth Reading: 4G and 5G Mobile Backhaul

The aim of LTE was to make anytime, anywhere services a reality. To achieve this, LTE increased capacity, improved coverage and provided high-speed mobile data. Demand for data has since increased beyond all expectations and

By |December 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: 4G and 5G Mobile Backhaul

Worth Reading: How do I start an IXP?

The hard part with establishing an IXP is not really the technical part, but building a community and trust. Also, an IXP needs to be sustainable beyond the establishment phase. This includes having enough funds

By |December 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: How do I start an IXP?

Worth Reading: When will SD-WAN be Adopted?

The survey respondents were given a wide range of options and asked to indicate which options described their company’s approach to implementing an SD-WAN. Their responses, which are shown in Figure 1, show that there

By |November 30th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: When will SD-WAN be Adopted?

Worth Reading: Social Media for Social Influence

A global conference of senior military and intelligence officials taking place in London this week reveals how governments increasingly view social media as “a new front in warfare” and a tool for the Armed Forces.

By |November 30th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Social Media for Social Influence

Worth Reading: Security and BYOD

According to the Identity Theft Resource Center, more than 169 million personal records were exposed as a result of 781 publicized security breaches across the financial, business, education, government and health-care sectors in 2015. As

By |November 29th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Security and BYOD

Worth Reading: Hacking WiFi for $25

US and Chinese security researchers have discovered that it is possible to detect a user's private information by studying the radio signals emitted to provide Wi-Fi internet coverage and how they interact with a person's

By |November 29th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hacking WiFi for $25

Worth Reading: Cybersecurity Due Diligence

Cybersecurity is no longer a corporate or private affair. What once was simply good business practice is now a legal obligation for ISPs, large and small. In Europe, this is the direct consequence of the

By |November 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Cybersecurity Due Diligence

Worth Reading: Personalized Ransomware

Smart entrepreneurs have long employed differential pricing strategies to get more money from customers they think will pay a higher price. Cyber criminals have been doing the same thing on a small scale with ransomware:

By |November 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Personalized Ransomware

Light Blogging Week

This week I'm working on a paper for a PhD seminar, as well as some other things I need to catch up on... I'm just going to be posting worth reading and pointers to some presentations

By |November 28th, 2016|Categories: LEFT, NORESHARE, OTHER|Comments Off on Light Blogging Week

Worth Reading: Vehicle CAN denial of service

Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle safety and efficiency, they are accompanied with new vulnerabilities. In this paper, we

By |November 23rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Vehicle CAN denial of service

Worth Reading: Backdoor in Android phones

For about $50, you can get a smartphone with a high-definition display, fast data sendee and, according to security contractors, a secret feature: a backdoor that sends all your text messages to China every 72

By |November 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Backdoor in Android phones

Worth Reading: The long decline of online freedom

“Freedom on the Net,” Freedom House’s annual study on internet freedom around the world, sheds light on the fact that in many parts of the world, access to the free and open internet is simply

By |November 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The long decline of online freedom

Worth Reading: Scoring the DNS Root Servers

The process of rolling the DNS Root’s Key Signing Key of the DNS has now started. During this process, there will be a period where the root zone servers’ response to a DNS query for

By |November 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Scoring the DNS Root Servers

The One Car

Imagine, for a moment, that you could only have one car. To do everything. No, I don't mean, "I have access to a moving van through a mover, so I only need a minivan," I

By |November 21st, 2016|Categories: CULTURE, DESIGN, LEFT|Tags: |Comments Off on The One Car

Worth Reading: High Speed Optical Networking

The alchemists of our age, scientists and engineers, have transformed chemical compounds like gallium-arsenide, indium-phosphide, and silicon into miniaturized lasers, light detectors, and thin tubes of glass that combine to communicate information over long distances

By |November 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: High Speed Optical Networking

Worth Reading: SAN and NAS Basics

You can learn about Storage Area Network and Network Attached Storage storage basics with the training videos on this page. I’ve also included full explanations with text and screenshots. The videos are mainly designed for

By |November 18th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: SAN and NAS Basics

Worth Reading: Regulating IoT

Your security on the Internet depends on the security of millions of Internet-enabled devices, designed and sold by companies you've never heard of to consumers who don't care about your security. The technical reason these

By |November 18th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Regulating IoT

Worth Reading: Large BGP Communities

But there is one sub-area of BGP which can’t handle 4-byte ASNs: the BGP communities mechanism. BGP uses special sub-packets inside the protocol to exchange values that encode as 32-bit values, and use one of

By |November 17th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Large BGP Communities

Worth Reading: Beware of Linking Ads

Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers. The ultrasonic

By |November 17th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Beware of Linking Ads

Worth Reading: Cheap IoT Threatens the Internet

Bring a screwdriver and build your own PC: chassis here, power supply there, motherboard, overclocked processor, liquid cooling for the tortured chip, fans, neon lights… Those were the PC organ bank days. Today, we have

By |November 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Cheap IoT Threatens the Internet

Worth Reading: IPv6 Inside LinkedIn

One person, or a small team, can install, configure, and manage a limited number of devices (servers, switches, routers, etc.) manually. In any large network, with hundreds or even thousands of devices, it gets more

By |November 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 Inside LinkedIn

Worth Reading: SDN versus NMS

Under the new paradigm, the standards bodies have said that it may be a long time before optical equipment has a standardized set of open protocols that can comprehensively control all possible options. Instead, carriers

By |November 15th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: SDN versus NMS

Worth Reading: IoT Goes Nuclear

Within the next few years, billions of IoT devices will densely populate our cities. In this paper we describe a new type of threat in which adjacent IoT devices will infect each other with a

By |November 14th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IoT Goes Nuclear

Worth Reading: The Future of Enterprise is Data

Fundamentally, a database just stores retrieves data. But the future, declared Eifrem, belongs to those who can connect the data and make it instantly useful to decision-makers, whether they be customers seeing recommendations in real

By |November 14th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Future of Enterprise is Data

Worth Reading: IT is too expensive to operate

Today, you aren’t required to be a mechanic to drive your car. But in the first few decades of the automobile, ownership did require drivers to be mechanics. Vehicle sales could only grow if the

By |November 11th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IT is too expensive to operate

Worth Reading: Rough guide to IETF 97

It’s time for the third and last IETF meeting of 2016. Starting on Sunday, 13 November, the Internet Engineering Task Force will be in Seoul, South Korea, for IETF 97, where about 1000 engineers will

By |November 11th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Rough guide to IETF 97

Worth Reading: Why cybersecurity is so hard

Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the "theater of

By |November 10th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Why cybersecurity is so hard

Worth Reading: The Facebook Optical Switch

Facebook Inc. has created a high-speed, long-distance networking system it plans to share with other companies, in the social network’s latest push to spur technological advances and drive down hardware prices. The company, which has

By |November 9th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Facebook Optical Switch

On the ‘net: The Death of Transit

To tie the two situations together, public transport and transit providers lose money for the same reason — people are willing to pay for what they see and enjoy, not for the means required to

By |November 9th, 2016|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: The Death of Transit

Worth Reading: Hacking Smart Bulbs

Researchers from Israel's Weizmann Institute of Science and Dalhousie University in Halifax, Nova Scotia, Canada released a report today, titled "IoT Goes Nuclear: Creating a ZigBee Chain Reaction," detailing alarming ways hackers can rapidly cause

By |November 9th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hacking Smart Bulbs

Worth Reading: Google quietly crosses a privacy line

When Google bought the advertising network DoubleClick in 2007, Google founder Sergey Brin said that privacy would be the company’s “number one priority when we contemplate new kinds of advertising products.” And, for nearly a

By |November 8th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Google quietly crosses a privacy line

Worth Reading: Blocking DDoS at Domain Registration

PREDATOR which stands for 'Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration,' is based on the notion that criminals need to obtain many domains to ensure profitability and attack agility, leading to abnormal registration

By |November 8th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Blocking DDoS at Domain Registration

Worth Reading: DDoS’ing a Country

Bumping a small nation off the Internet map worries everybody, including those that are most friendly to the open nature of the Internet. These sort of actions will cause reactionary measures that lead to fragmentation,

By |November 7th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: DDoS’ing a Country

Worth Reading: Said no CEO, ever

“We think we’re going to get magical powers when we use other people’s servers,” said Casey West, Principal Technologist for Pivotal’s Cloud Foundry platform, during his OSCON Europe talk, in which he provided a humorous,

By |November 4th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Said no CEO, ever

Worth Reading: Multiple DNS providers and DDoS

How can your company continue to make its website and Internet services available during a massive distributed denial-of-service (DDoS) attack against a DNS hosting provider? In light of last Friday’s attack on Dyn’s DNS infrastructure,

By |November 4th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Multiple DNS providers and DDoS

Worth Reading: Insurance companies and free stuff

When your “smart” home is hacked, who is to blame — and importantly — who pays for it? As connected items in our homes move beyond laptops and mobile phones to baby monitors, refrigerators, door

By |November 3rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Insurance companies and free stuff

Worth Reading: Engineering infrastructure at scale

As shown in above diagram, LinkedIn has a native app for iOS and Android, and the linkedin.com website for mobile and desktop browsers. The four clients all call the same shared API frontend to exchange

By |November 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Engineering infrastructure at scale

Worth Reading: Using rowhammer to root Android

Researchers have devised an attack that gains unfettered "root" access to a large number of Android phones, exploiting a relatively new type of bug that allows adversaries to manipulate data stored in memory chips. The

By |November 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Using rowhammer to root Android

Worth Reading: Energy Efficiency and Data Centers

With October marking Energy Awareness Month and with World Energy Day having taken place on October 22, energy efficiency is at the forefront of many data center managers’ minds. Although it’s an important consideration for

By |November 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Energy Efficiency and Data Centers

Worth Reading: Dyn’s DDoS Reveals IoT Weak Points

The massive internet outage last Friday that took out Twitter, GitHub, Spotify and others, was caused by a tsunami of incoming requests to Dyn, the DNS service provider supporting these companies. Where did all these

By |October 31st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Dyn’s DDoS Reveals IoT Weak Points

Worth Reading: The Internet Needs a Security Upgrade

The recent Internet outages caused by the DDoS attack on Dyn's infrastructure highlights deep architectural issues that need resolution. Security and performance are intertwined, and both need fundamental upgrades. A few days ago I was

By |October 31st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Internet Needs a Security Upgrade

Worth Reading: Seven (more) deadly sins of microservices

It seems like the development community is quite excited about microservices these days, but at OSCON Europe, Daniel Bryant, who is chief scientist at OpenCredo, continued to point out some of the mistakes that architects

By |October 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Seven (more) deadly sins of microservices

Worth Reading: The Facebook Wedge 100

Facebook is back in the news again. This time, it’s because of the release of their new Wedge 100 switch into the Open Compute Project (OCP). Wedge was already making headlines when Facebook announced it

By |October 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Facebook Wedge 100

Worth Reading: Implementing multifactor authentication in the enterprise

IT systems must manage users and control access privileges to protect sensitive resources. This function is usually implemented in enterprise networks through authentication (verification of identity), authorization (control of access privileges) and accounting (recording of

By |October 27th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Implementing multifactor authentication in the enterprise

Worth Reading: IoT devices and DDoS attacks

Embedded Internet-of-Thing (IoT) botnets are not a new phenomenon – we’ve seen them leveraged to launch DDoS attacks, send spam, engage in man-in-the-middle (MitM) credentials hijacking, and other malicious activities for several years. For example,

By |October 27th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IoT devices and DDoS attacks

Worth Reading: The need for loud cyber weapons

In general, a tool used for offensive cyber operations involves a penetration mechanism and a payload. It’s often been observed that tools for exploitation (intelligence collection) and for attack (destruction or degradation) make use of

By |October 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The need for loud cyber weapons

Worth Reading: The hidden world of news cameras

Most professional photographers are familiar with the fact that their cameras embed a wealth of metadata hidden in the images they create in formats like EXIF, IPTC and XMP. This metadata typically records the camera,

By |October 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The hidden world of news cameras

Worth Reading: IPv6 and the DNS

The exhortations about the Internet’s prolonged transition to version 6 of the Internet Protocol continue, although after some two decades the intensity of the rhetoric has faded and, possibly surprisingly, it has been replaced by

By |October 25th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 and the DNS

Worth Reading: Microsoft and FPGAs

Microsoft’s embrace of programmable chips knowns as FPGAs is well documented. But in a paper released Monday the software and cloud company provided a look into how it has fundamentally changed the economics of delivering

By |October 25th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Microsoft and FPGAs

Worth Reading: Some notes on today’s DDoS

As a techy, I want to know the composition of the traffic. Is it blindly overflowing incoming links with junk traffic? Or is it cleverly sending valid DNS requests, overloading the ability of servers to

By |October 24th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Some notes on today’s DDoS

Worth Reading: Hack Cameras, DVRs, and DDoS

A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as

By |October 24th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hack Cameras, DVRs, and DDoS

Worth Reading: Facebook’s video views

The takeaway from Facebook’s bombshell that it had overstated a key measure of video ad viewership on its pages by about 80%: It’s not that the social-media giant “miscalculated” its numbers. It’s a fresh view

By |October 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Facebook’s video views

Worth Reading: The psychology of bad passwords

A Lab42 survey, which polled consumers across the United States, Germany, France, New Zealand, Australia and the United Kingdom, highlights the psychology around why consumers develop poor password habits despite understanding the obvious risk, and

By |October 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The psychology of bad passwords

Worth Reading: Increasing the strength of the root zone

A few weeks ago, on Oct. 1, 2016, Verisign successfully doubled the size of the cryptographic key that generates Domain Name System Security Extensions (DNSSEC) signatures for the internet's root zone. With this change, root

By |October 20th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Increasing the strength of the root zone

Worth Reading: What the IoT means to you

In the broadest possible terms, the Internet of Things is the connectivity of things that are able to communicate data about themselves to the “network” or to be controlled from the network. This means that

By |October 20th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: What the IoT means to you

Worth Reading: The balancing act of freelancing

By the end of the work day, the last thing you want to do is look at another pixel. Since 8:30am, you’ve been firing on all cylinders. Deadlines, meetings and requests have been swarming your

By |October 19th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The balancing act of freelancing

Worth Reading: The EU is pushing new IoT security rules

The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras, routers and digital video recorders (DVRs). News of the expected proposal

By |October 19th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The EU is pushing new IoT security rules

Worth Reading: Flowspec is a step forward

Do you recall when service providers typically had to call upon Remote Trigger Blackhole (RTBH) to mitigate DDOS attacks? With RTBH, we only had two methods, source-based and destination-based. We would basically take the hardest

By |October 18th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Flowspec is a step forward

Worth Reading: MANRs gains steam

The Internet Society's Mutually Agreed Norms for Routing Security (MANRS), which launched nearly two years ago as a plan for advancing the security and resilience of the Net's routing infrastructure, has signed up network operators

By |October 17th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: MANRs gains steam

Worth Reading: Stop Trying to Deter Cyber Criminals

With the foregoing in mind, the key question today is, "Given the very problematic historical record, why should anybody think that cyber deterrence will somehow now become a useful and functional policy option?" And when

By |October 17th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Stop Trying to Deter Cyber Criminals

Worth Reading: Building the LinkedIn Knowledge Graph

At LinkedIn, we use machine learning technology widely to optimize our products: for instance, ranking search results, advertisements, and updates in the news feed, or recommending people, jobs, articles, and learning opportunities to members. An

By |October 14th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Building the LinkedIn Knowledge Graph

Worth Reading: Data Centric Computing

Unlike enterprise business applications of the 1990s, systems processing this growing deluge of unstructured data have to deal with an entirely different class of problems. As data scales beyond petabytes, simply ingesting, storing, retrieving, and

By |October 13th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Data Centric Computing

Worth Reading: The Wild West of Performance Measurement

Data-driven decision making relies on contextual understanding of how data is gathered and the type of analysis used to arrive at an outcome. The popularity of data-driven decision-making has increased the number of companies using

By |October 13th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Wild West of Performance Measurement

Worth Reading: Why I care about Segment Routing

As a WAN guy by chance and opportunity, and a service provider engineer and architect by choice (and also chance and opportunity), segment routing (SR) is one of those wonderful new technologies that keeps rearing

By |October 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Why I care about Segment Routing

Worth Reading: Predictive Policing

Can predictive policing prevent crime before it happens? It sounds like an idea out of science fiction — specifically, out of Philip K. Dick’s “Minority Report,” a 1956 short story about a “Precrime Division” that

By |October 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Predictive Policing

Worth Reading Digital Monoculture

While Waze leads us to our destinations via the quickest route, our dependence on this kind of decision support system may also be the quickest route to a monocultural society. You’ve said the word “algorithm”

By |October 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading Digital Monoculture

Worth Reading: Elliptic Curve Cryptography and DNS

Erasthosthenes of Cyrene was an ancient Greek of some astounding learning, becoming the Chief Librarian at that fabled wonder of the ancient world, the library of Alexandria, in the third century BCE. Not only has

By |October 11th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Elliptic Curve Cryptography and DNS

On the ‘net: BGP as an SDN

There are probably a dozen other ways to influence the path in this situation using a route reflector in BGP. Each of these methods have advantages and disadvantages; for instance, flowspec and segment routing can

By |October 11th, 2016|Categories: LEFT, NORESHARE, ON THE NET|Tags: |Comments Off on On the ‘net: BGP as an SDN

Worth Reading: Stop Trying to Change Users

The problem isn't the users: it's that we've designed our computer systems' security so badly that we demand the user do all of these counterintuitive things. Why can't users choose easy-to-remember passwords? Why can't they

By |October 11th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Stop Trying to Change Users

Worth Reading: Creating a PCE Prototype

So almost, a little bit over an year ago, when I wasn’t working for a Vendor and was looking for a PCE to fool around with RSVP-TE/SR-TE but I wasn’t able to find anything. At

By |October 10th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Creating a PCE Prototype

Worth Reading: Three great lies of cloud computing

It’s elastic! It’s on-demand! It scales dynamically to meet your needs! It streamlines your operations, gives you persistent access to data, and it’s always, always cheaper. It’s cloud computing, and it’s here to save your

By |October 7th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Three great lies of cloud computing

Worth Reading: The fall of Theranos

This year has witnessed the spectacular fall from grace for the former Silicon Valley darling Theranos, the Palo Alto-based blood-testing startup, and its high-powered millennial co-founder, Elizabeth Holmes. Once valued at over $9 billion, Theranos

By |October 6th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The fall of Theranos

Worth Reading: a troubling new chapter for the ‘net

For the better part of a day, KrebsOnSecurity, arguably the world's most intrepid source of security news, has been silenced, presumably by a handful of individuals who didn't like a recent series of exposés reporter

By |October 5th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: a troubling new chapter for the ‘net

Worth Reading: The telco quality transformation

The telecoms industry has two fundamental issues whose resolution is a multi-decade business and technology transformation effort. This re-engineering programme turns the current "quantities with quality" model into a "quantities of quality" one. Those who

By |October 4th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The telco quality transformation

Worth Reading: Decryption mandates and global internet freedom

The debate over law enforcement and widespread strong encryption implicates powerful competing values. On one side, the liberty, privacy, and cybersecurity of American consumers and companies; on the other, the need to investigate serious crimes

By |October 4th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Decryption mandates and global internet freedom

Worth Reading: The biggest attack in internet history

For a long time, Akamai offered their DOS protection service to Krebs pro bono, both as a public service and because it's fantastic advertising. Brian is perhaps the most high-profile target for cyber-criminals: if Akamai

By |September 30th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The biggest attack in internet history

Worth Reading: Upstream surveillence

First disclosed as part of the Snowden revelations, Upstream surveillance involves the NSA’s bulk interception and searching of Americans’ international Internet communications — including emails, chats, and web-browsing traffic — as their communications travel the

By |September 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Upstream surveillence

Worth Reading: Project autobuild

LinkedIn’s data center infrastructure has grown at a massive scale. Starting with one server setup, one cabinet at a time, we’re now powering on hundreds of servers at a time and seeing them come online

By |September 27th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Project autobuild

Worth Reading: Pre-Internet digital communications

The Internet is a platform for universal communication. You can plug a device into any Internet connection, and provided it speaks TCP/IP, you can communicate with any other point on earth. But before the Internet,

By |September 27th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Pre-Internet digital communications

Worth Reading: The Internet revolution is nothing to email home about

Economist Robert Gordon argues that the Second Industrial Revolution, entailing developments in electricity, internal combustion engines, modern communications, entertainment, petroleum/hydrocarbons, and chemicals, has had the most impact on productivity and living standards. By comparison, the

By |September 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Internet revolution is nothing to email home about

Worth Reading: Source code is not standards

One of the oft-repeated messages of the Software-Defined Pundits is “Standard bodies are broken, (open) source code is king”… and I’d guess that anyone who was too idealistic before being exposed to how the sausage

By |September 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Source code is not standards

Worth Reading: Organizational Doxing and Disinformation

In the past few years, the devastating effects of hackers breaking into an organization's network, stealing confidential data, and publishing everything have been made clear. It happened to the Democratic National Committee, to Sony, to

By |September 23rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Organizational Doxing and Disinformation

Worth Reading: Google as an advertising gatekeeper

When Google decided in May to stop accepting online ads for short-term, ultra-high-cost personal loans known as payday loans, some people wondered whether the company was acting more like a publisher exercising editorial control than

By |September 23rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Google as an advertising gatekeeper

Worth Reading: Slack is less bad than the rest

A topic I complain about with some regularity is my inability to keep up with incoming messages. I’m too busy creating something for someone else to consume to bother trying to keep up. That’s the

By |September 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Slack is less bad than the rest

On the ‘net: Author Interview at the LeanPub Blog

Len: Hi, I’m Len Epp from Leanpub, and in this Leanpub podcast I’ll be interviewing Daniel Dib and Russ White. Russ is based in North Carolina and has been working with large-scale networks for more

By |September 22nd, 2016|Categories: ON THE NET|Comments Off on On the ‘net: Author Interview at the LeanPub Blog

Worth Reading: Cryptocurrency mining malware infecting NAS’

A malware variant named Mal/Miner-C (also known as PhotoMiner) is infecting Internet-exposed Seagate Central Network Attached Storage (NAS) devices and using them to infect connected computers to mine for the Monero cryptocurrency. Miner-C, or PhotoMiner,

By |September 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Cryptocurrency mining malware infecting NAS’

Worth Reading: The lean and antifragile data center

Cloud is a new technology domain, and data centre engineering is still a developing discipline. I have interviewed a top expert in cloud infrastructure, senior leader and consultant, Pete Cladingbowl of Skozo. He has a

By |September 21st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The lean and antifragile data center

Worth Reading: laptop killing USB stick

For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo booths -- you name it. Once a proof-of-concept, the pocket-sized USB

By |September 20th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: laptop killing USB stick

Worth Reading: Exascale might prove difficult

The supercomputing industry is accustomed to 1,000X performance strides, and that is because people like to think in big round numbers and bold concepts. Every leap in performance is exciting not just because of the

By |September 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Exascale might prove difficult

Worth Reading: Joining forces against mass collection

Some of the world’s biggest companies and organizations joined forces with Microsoft to fend off the U.S. government’s habitual practice of demanding access to customers’ personal information. Microsoft filed a lawsuit against the U.S. Department

By |September 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Joining forces against mass collection

Worth Reading: IPv6 versus v4 performance map

This is a world map showing the average value of the relative performance of observed connections in IPv6 compared to IPv4. The values are in units of milliseconds. For each observed dual stack end device,

By |September 15th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 versus v4 performance map

Nenshou Fire: Recoil

My daughter has started a new fiction series on her blog; I'll just link to it here for anyone who's interested. A cold circular object is pressed to my head, a hand reaching around to

By |September 15th, 2016|Categories: LEFT, NORESHARE, OTHER|Comments Off on Nenshou Fire: Recoil

Worth Reading: Big buffers and reality

This whole big buffer nonsense has gotten out of hand (kinda like Trump and his H-yuge Border Wall or Clinton and her lack of ethics) and it’s time for this issue to be put to

By |September 15th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Big buffers and reality

Worth Reading: Binding to an IPv6 subnet

In the original framework of the IP architecture, hosts had network interfaces, and network interfaces had single IP addresses. The list of active network interfaces, and the manner in which they acquire IP addresses, either

By |September 14th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Binding to an IPv6 subnet

Worth Reading: HPE trims back

The trouble that Dell and HPE found themselves in is that they did not build platforms fast enough as the market shifted away from selling or reselling licensed software and putting platforms together piecemeal for

By |September 14th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: HPE trims back

Worth Reading: Ransomware and backups

Read through the recent Wall Street Journal ransomware article and you’ll find some great stats on the growing threat and cost. One thing you won’t find: the word “backup.” We’re happy to see ransomware finally

By |September 13th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Ransomware and backups

Worth Reading: gRPC

HTTP’s convenience comes with a huge performance trade-off, which takes us back to the issue of finding the most optimal communication framework for microservices. Enter gRPC, the modern, lightweight communication protocol from Google. It’s a

By |September 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: gRPC

Worth Reading: On decomposing systems

Flexibility (we tend to call it agility) and faster development times remain top of mind today. Comprehensibility less so, but perhaps we should be paying more attention there? Say you’re all bought into cloud native

By |September 9th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: On decomposing systems

Worth Reading: Do we still need OSPF areas?

When OSPF was created it used areas to minimize the size of the topology graph (and the time it took to run Dijkstra algorithm). In the meantime, the CPU speeds increased by orders of magnitude,

By |September 9th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Do we still need OSPF areas?

Worth Reading: The Verisign DDoS Report (Q2 2016)

This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from April 1, 2016 through

By |September 8th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Verisign DDoS Report (Q2 2016)

Worth Reading: An internet for identity

Every online identity you have was given to you by someone else. This simple fact makes every online identity completely different from identity in the physical world where you exist first, independently, as a sovereign

By |September 7th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: An internet for identity

Worth Reading: More huge tech acquisitions

The market for tech acquisitions is booming in 2016 as legacy technology companies shed old assets and consolidate, and companies in other industries scoop up tech assets at a historic pace. This comes despite 2015’s

By |September 6th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: More huge tech acquisitions

Worth Reading: Connecting Python to Slack

The scripting language Python can retrieve information from or publish information into the messaging app Slack. This means you can write a program that puts info into Slack for you, or accepts your queries using

By |September 6th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Connecting Python to Slack

Worth Reading: Your QUIC Questions Answered

Watch our second Facebook Live broadcast, where George Michaelson, APNIC’s Senior R&D Scientist, and Byron Ellacott, APNIC’s Senior Software Architect, discussed QUIC – Quick UDP Internet Connection. QUIC is a new protocol that supports a

By |September 5th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Your QUIC Questions Answered

Worth Reading: Hybrid and the last common denominator problem

Hybrid cloud only works when applications are designed to run predictably across all the infrastructure choices in the IT portfolio. Most organizations achieve this through a “least common denominator” approach to design, one in which

By |September 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hybrid and the last common denominator problem

Worth Reading: Cisco, Arista, and shades of grey

Cisco has effectively designated Arista as their number one competitor by way of this lawsuit. Arista represents a larger threat that HPE, Brocade, or Juniper. Yes, I agree that it is easy to argue that

By |September 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Cisco, Arista, and shades of grey

Worth Reading: Biometrics are less secure than passwords

Many technology pundits talk about biometrics as the ultimate authentication solution -- the technology that will make the 'imperfect' password obsolete. Despite the hype, most companies are approaching with caution. In fact, CEB found that

By |September 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Biometrics are less secure than passwords

Worth Reading: Legally Defining Metadata

One of the foundational questions in surveillance law is how to distinguish between the contents of communications and non-content metadata. Contents generally receive very high privacy protection, while metadata generally receive very low protection. Identifying

By |September 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Legally Defining Metadata

Worth Reading: Open Flow Controller Performance

OpenFlow's architecture is inefficient, and caps performance while sucking unnecessary power. That's the conclusion of a bunch of Comp. Sci boffins from researchers at Australian brain box Data61 and Sydney University, who assessed four major

By |August 31st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Open Flow Controller Performance

Worth Reading: The Internet of Poorly Working Things

Of course, not all connected devices are so easily mocked; some devices are dead serious: home security, HVAC, almost any kitchen appliance — even our very smart toaster. And it’s not that the IoT doesn’t work. The

By |August 31st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Internet of Poorly Working Things

Worth Reading: Disregarding Security Warnings

Software developers listen up: if you want people to pay attention to your security warnings on their computers or mobile devices, you need to make them pop up at better times. A new study from

By |August 30th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Disregarding Security Warnings

Worth Reading: Intel’s Snap

Scale is creating the demand for new enterprise tooling to better understand and manage ever disparate workloads across devices, cars, buildings, etc. There were examples of this trend in almost all of the IDF keynotes

By |August 30th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Intel’s Snap

Worth Reading: Cloud Key and Key Escrow

The problem Apple wanted to solve is this. Suppose that you have some sort of iToy — an iPhone, an iPad, etc. — or Mac. These systems allow you to back up your keychain to

By |August 29th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Cloud Key and Key Escrow

Worth Reading: Stream Processing’s Hard Problems

Before we dive into why data access is a hard problem in stream processing, here is some background information. At LinkedIn, we develop and use Apache Samza as our stream processing framework, Apache Kafka as

By |August 29th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Stream Processing’s Hard Problems

Worth Reading: Is Openstack becoming Trumpstack?

Tired of hearing about Pets vs. Cattle? Most of us are. The underlying concept is important. While OpenStack, and most private and public cloud platforms, is geared towards workloads that have resiliency build into the

By |August 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Is Openstack becoming Trumpstack?

Worth Reading: Go versus Python performance

It may be that I’m doing something in Python that’s an obvious don’t do or that I’m simply using a very computationally expensive way to achieve my goal, and any experienced Python programmer would suggest

By |August 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Go versus Python performance

Worth Reading: Remember the lead time

Disaster recovery is one of those important things that seldom seems to get the attention it deserves. My experience is that most large organizations, and some smaller organizations, have disaster recovery plans that at least

By |August 25th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Remember the lead time

Reaction: Forced Updates

The controversy over Microsoft forcing upgrades on users is in the news again, as the EFF has posted an article once again about the forced upgrades to Windows 10, and the various data collection schemes

By |August 25th, 2016|Categories: LEFT, NORESHARE, REACTION|Comments Off on Reaction: Forced Updates

Worth Reading: Apcera NATS messaging service

With the ever-increasing amounts of data sent and received by today’s applications, developers are turning to tried-and-true technologies to help them address message brokering across different applications, or between different microservices within an application. Stripping

By |August 25th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Apcera NATS messaging service

Worth Reading: One old guy’s advice

Having grown in my career since college, I have learned many lessons. I started out in computers back in 1986, at the precipice of the “Clone” era. I cut my teeth and my hands by

By |August 24th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: One old guy’s advice

Worth Reading: IPv6 performance (again)

Every so often I hear the claim that some service or other has deliberately chosen not to support IPv6, and the reason cited is not because of some technical issue, or some cost or business

By |August 24th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 performance (again)

Worth Reading: Photographing the Internet

Shuli Hallak photographs the Internet. And when we say she photographs it, we’re not just talking about cool pictures of wires (although those are in her portfolio) but entire worlds that are up and running

By |August 23rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Photographing the Internet

Do what you love?

How many times have you heard this? Or this? Two of the most oft repeated, and driven home, ideas in modern times are be true to yourself and do what you love. But just because

By |August 23rd, 2016|Categories: CULTURE, LEFT|Tags: |Comments Off on Do what you love?

Worth Reading: A new bit flipping attack

We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to induce bit flips overarbitrary physical memory in a fully controlled way. FFS relies on hardware bugs to induce bit flips

By |August 23rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: A new bit flipping attack

Worth Reading: What Sauron Tells Us

Last week, both Symantec and Kaspersky released a series of reports on a nation-state malware attacker dubbed alternately "Strider" or "Sauron." Although neither formally attributes the attack to any particular country, reading between the lines

By |August 22nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: What Sauron Tells Us

Worth Reading: Lawless government hacking

In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. To give a simple example, even when chasing a fleeing murder suspect, the

By |August 19th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Lawless government hacking

Worth Reading: Hosts versus the network

There are a number of ways to view the relationship between hosts and the network in the Internet. One view is that this is an example of two sets of cooperating entities that share a

By |August 19th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hosts versus the network

Worth Reading: Reopening the going dark debate

Just over a week ago, at the BlackHat hacker convention in Las Vegas, Ivan Krstić, Head of Security Engineering and Architecture at Apple gave a talk entitled “Behind the scenes of iOS Security,” the slides

By |August 18th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Reopening the going dark debate

Worth Reading: Container defense in depth

The new age of image-based containers exploded onto the scene in early to mid-2013. Since the early days of the Docker container engine, we heard questions of whether they were secure enough. Our very own

By |August 18th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Container defense in depth

Worth Reading: Your chance to say no

“Passport and flight number, please. What brings you to the States? Duration of stay?” “LinkedIn username? OKCupid handle?” No, the U.S. Customs officer is not trolling you. If the Department of Homeland Security has its

By |August 17th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Your chance to say no

Worth Reading: Tracking the hackers

The e-mail from Google arrived at 4:09 AM on March 22 and contained an ominous alert for its recipient, William Rinehart, a staffer with Hillary Clinton’s presidential campaign. “Someone has your password,” the e-mail’s subject

By |August 17th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Tracking the hackers

Worth Reading: Network monitoring

I encounter a lot of sites that ignore syslog. Yes, there’s a large noise-to-signal ratio there. There are free tools that summarize the syslog data, and there are golden needles in the haystack as well.

By |August 16th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Network monitoring

Worth Reading: IPv6 inside LinkedIn

Adding a new network stack requires that the security is at least equivalent to the previous IPv4 security. One approach could be to use a filter to deny all IPv6 traffic and work from there.

By |August 15th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: IPv6 inside LinkedIn

Worth Reading: Email optimization

In Part 1 of this series, we introduced the problem of email volume optimization. We showed that on the one hand, email is among the principal drivers of engagement, but on the other hand, excessive

By |August 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Email optimization

Worth Reading: NTP is still a security risk

The Network Time Protocol (NTP) has been in the news a number of times over the past couple of years because of attacks on the protocol, vulnerabilities in the daemon, and the use of NTP

By |August 12th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: NTP is still a security risk

Worth Reading: Living in an age of cyber extortion

One of the most famous examples of DDoS attacks used for extortion was attributed to an attacker using the moniker “DD4BC,” which stands for “DDoS for Bitcoin.” ASERT wrote about this in June. Due to

By |August 11th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Living in an age of cyber extortion

Worth Reading: Physics and distributed systems

If you squint hard enough, many of the challenges of distributed computing appear similar to the work done by the great physicists. Dang, those fellows were smart! Here, we examine some of the most important

By |August 11th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Physics and distributed systems

Worth Reading: Hacking wireless keyboards

You should be able to trust your wireless keyboard. And yet security researchers have been warning people to be suspicious of wireless computer accessories using sketchy radio protocols for years. Those warnings peaked five months

By |August 10th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hacking wireless keyboards

Worth reading: The making of algorithm markets

Algorithmia’s approach is to containerize algorithms, packaging them as microservices and hosting on their scalable and serverless cloud infrastructure, and which are called up through their API, via a few lines of code. ... Since

By |August 9th, 2016|Categories: WORTH READING|Comments Off on Worth reading: The making of algorithm markets

Reaction: Standardization versus Innovation

Should the Docker container image format be completely standardized? Or should Docker not be held back from evolving the format ahead of the open specification? This was the topic of a heated Twitter tussle last

By |August 9th, 2016|Categories: CULTURE, LEFT, REACTION|Comments Off on Reaction: Standardization versus Innovation

Worth Reading: The languages that almost became CSS

When HTML was announced by Tim Berners-Lee in 1991 there was no method of styling pages. How given HTML tags were rendered was determined by the browser, often with significant input from the user’s preferences.

By |August 8th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The languages that almost became CSS

Worth Reading: Top performance items to watch

What’s eating your network? What is (quietly) killing performance? What performance items should you be watching, but probably are not? I’m a big fan of appropriate network management data, with the right tool(s). If you

By |August 5th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Top performance items to watch

Worth Reading: Hot Commodities

A Booz Allen Hamilton Industrial Cybersecurity Threat Briefing reports that cyber incidents targeting Integrated Control Systems (ICS), like the ones used to run the nation’s electric grid, reached an all-time high in 2015. The briefing

By |August 5th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Hot Commodities

On the ‘net: The future of networking

Lately I have been thinking a lot about the future of networking and the career paths in this domain. As you probably know I like to guide and mentor people and with everything going on

By |August 4th, 2016|Categories: LEFT, ON THE NET|Comments Off on On the ‘net: The future of networking

Worth Reading: Ten years of Cisco Live

Technology changes every day. We change from hardware to software and back again. Routers give way to switches. Fabrics rise. Analytics tell all. But all this technology still has people behind it. Those people make

By |August 4th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Ten years of Cisco Live

Worth Reading: One second warning

Time, as measured according to the Earth’s rotation, is getting slower. If we want 86,400 seconds to measure precisely one rotation of the earth on its axis then over time each second will have to

By |August 3rd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: One second warning

Worth Reading: Learning from email breaches

It isn't at all uncommon for people to share colorful thoughts about superiors, co-workers, subordinates and customers over email. But think for a moment: What business benefit does this add? Email is auditable. Having done

By |August 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Learning from email breaches

Worth Reading: A Game of Pwns

Despite their perpetual status as old news, passwords and their security weaknesses continue to make headlines and disrupt security in ever-expanding ways, and the usual advice about better protection continues to go unheeded or, more

By |August 2nd, 2016|Categories: WORTH READING|Comments Off on Worth Reading: A Game of Pwns

Worth Reading: Days of the Week

With deep, purple bags under his eyes, Beagin Tiredly plops down into his swivel chair with a loud whoosh. His unsweetened, black coffee sloshes onto the desk as he sets it down, adding new spots

By |August 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Days of the Week

Worth Reading: Happy Eyeballs

A recent study to measure the impact of the Happy Eyeballs (HE) algorithm has shown that 18% of Alexa’s top 10,000 websites are faster over IPv6 than IPv4. —APNIC

By |August 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Happy Eyeballs

Worth Reading: Learning is hard

Easy access to the tl;dr version of everything a google search away has eroded that foundation in the IT community. I can’t exclude myself from that either, having fallen into that trap of thinking that

By |August 1st, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Learning is hard

Worth Reading: How to Interpret Cisco math

The attributes of transparency, choice, and degrees of freedom, not price, are driving all of the mega-scale customers to bare-metal networking solutions, whether they do it in house or leverage companies like Cumulus Networks. Make

By |July 29th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: How to Interpret Cisco math

Worth Reading: Sniffing and censoring in real life

Airtel is sniffing and intercepting ALL unencrypted traffic going upstream from CloudFlare’s India data centres, irrespective of what ISP the user is on. This potentially affects everyone in India accessing ANY of the 2 million+

By |July 29th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Sniffing and censoring in real life

Worth Reading: Google Site Reliability

How does Google keep all its services up and running? They almost never seem to fail. If you've ever wondered we get a wonderful peek behind the curtain in a talk given at GCP NEXT

By |July 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Google Site Reliability

Worth Reading: The History of the URL

On the 11th of January 1982 twenty two computer scientists met to discuss an issue with ‘computer mail’ (now known as email). Attendees included the guy who would create Sun Microsystems, the guy who made

By |July 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The History of the URL

Worth Reading: Developing the Internet of Things

The Internet is undergoing an evolutionary transformation resulting from the explosive growth of things that are interconnected. From humble beginnings connecting single institutions, and then multiple institutions, to the first major computer-networking explosion in the

By |July 28th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: Developing the Internet of Things

Worth Reading: The Cyber Security market mid-life crisis

There are now several hundred security vendors vying for advanced threat “spend” and there continues to be good demand side indicators of investment in these newer areas. There is yet more security spend overall allocated

By |July 27th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Cyber Security market mid-life crisis

Worth Reading: The Microsoft Ireland Case

Back in December 2013, federal law enforcement was conducting a criminal narcotics investigation. During the course of this investigation, the government sought a search warrant, pursuant to Section 2703(a) of the SCA, to seize the

By |July 26th, 2016|Categories: WORTH READING|Comments Off on Worth Reading: The Microsoft Ireland Case

On the ‘net: You keep using that SDN word…

Software Defined Networks (SDNs), are everywhere, and everyone is either building one, selling one, or using one. Everyone, that is, except—probably—you. Don’t feel too bad if you’re feeling left out, because it’s hard to know,

By |July 24th, 2016|Categories: LEFT, NORESHARE, ON THE NET|Comments Off on On the ‘net: You keep using that SDN word…

Light Posting Week—IETF in Berlin

Y'all—I'm in Berlin at the IETF this week, so I won't be posting as many "long articles" as usual. I will have my usual slate of worth reading/etc. If anyone has questions about the IETF

By |July 19th, 2016|Categories: LEFT, NORESHARE, OTHER|Comments Off on Light Posting Week—IETF in Berlin

Short Cuts

It was going to be a long evening, anyway—the flight check bird was coming in, and both Instrument Landing Systems (ILSs) needed to be tuned up and ready for the test. So we took some

By |July 6th, 2016|Categories: CULTURE, LEFT|Tags: |Comments Off on Short Cuts