Red Hat is unveiling its own service mesh for OpenShift version 4, its hybrid cloud enterprise Kubernetes platform. The commercial offering packages Istio, the emerging leader in the space, as well as the Jaeger project for tracing, and Kiali for monitoring and management of Istio. —Susan Hall
DNSSEC is increasingly adopted by organizations to protect DNS data and prevent DNS attacks like DNS spoofing and DNS cache poisoning. At the same time, more DNS deployments are using proprietary DNS features like geo-routing or load balancing, which require special configuration to support using DNSSEC. —Jan Včelák
Cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Traditionally, those connections have been mainly hacked computers, mobile phones, or home routers. But this story is about so-called “bulletproof residential VPN services” that appear to be built by purchasing or otherwise acquiring discrete chunks of Internet addresses from some of the world’s largest ISPs and mobile data providers. —Krebs on Security
At first glance, the University of the South Pacific network is not your usual university network. Our network operates across 26 sites in 12 different Pacific economies and is spread over 33 million square kilometres of ocean — about three times the size of Europe. —Edwin Sandys
Facebook users are eager for alternatives to the service, but are held back by the fact that the people they want to talk with are all locked within the company’s walled garden. Interoperability presents a means for people to remain partially on Facebook, but while using third-party tools that are designed to respond to their idiosyncratic needs. —Cory Doctorow
Geoffrey A. Fowler of the Washington Post recently engaged a data expert to track everything going on behind the scenes with his iPhone. What he found was surprising since Apple touts itself as a company that doesn’t invade user privacy. The various apps on his phone were routinely handing out his personal data on a scale that shocked him. —Doug Dawson
In this post, I explore the methods that recursive resolvers use to select authoritative nameservers and why. Answering these questions informs decisions around authoritative nameserver deployment and improving recursive resolver behaviour. —Kyle Schomp
DNS Flag Day was the result of a collaborative effort and agreement of DNS implementers and DNS resolver operators to commit to no longer providing workarounds for non-standards-compliant authoritative nameservers as of 1 February 2019. —Willem Toorop
As long we’ve had electronic mass media, audiences and creators have benefited from periods of technological upheaval that force old gatekeepers to compete with brash newcomers with new ideas about what constitutes acceptable culture and art. Those newcomers eventually became gatekeepers themselves, who then faced their own crop of revolutionaries. But today, the cycle is broken: as media, telecoms, and tech have all grown concentrated, the markets have become winner-take-all clashes among titans who seek to dominate our culture, our discourse and our communications. —Cory Doctorow
Dan Bricklin, co-creator of the first killer app, VisiCalc, recently pointed out it’s been 38 years since the IBM PC was introduced. It wasn’t the first PC — when it rolled out I wrote about it on my CP/M-powered KayPro II — but it was the one that started Bill Gates and Microsoft on their way to stardom. —Steven J. Vaughan-Nichols
Related