Worth Reading: Discovering new ways to detect malicious flows

24 April 2019

In research presented at the 10th International Multi-Conference on Complexity, Informatics and Cybernetics March 12-15, scientists wanted to identify how to compress network traffic as much as possible without losing the ability to detect and investigate malicious activity. —Army Research Laboratory Public Affairs

Worth Reading: Visibility of IPv4 prefix lengths

24 April 2019

Prefix lengths are one aspect of this; they’re bound by common convention and current best practice, not usually by strict rules on how the underlying routing machinery must or must not work. —Stephen Strowes

Worth Reading: Decide how badly you want to fail

23 April 2019

In those sad cases, I can give the workshop attendees only one advice: face the reality, and figure out how badly you might fail. —Ivan Pepelnjak

Worth Reading: Automotive WiFi

23 April 2019

The European Commission’s push for a wifi-based standard for cars backed by Volkswagen took a big step forward on Wednesday after EU lawmakers endorsed wifi over 5G technology promoted by BMW and Qualcomm. —Foo Yun Chee

Worth Reading: Navigating AIOps

22 April 2019

AIOps (artificial intelligence for IT operations), is a relatively new industry term that is increasingly being associated with a new breed of IT management vendors. —João Marques Lima

Worth Reading: Designing a Mission Critical Network

22 April 2019

Ask 10 network engineers to design a network and you’ll most likely get 10 different designs each as intricate as their experience. —Quincy Liao

Worth Reading: Building out the edge

18 April 2019

But today’s centralized model is starting to yield to a much more distributed infrastructure that is being driven by a set of applications that must consume and process data where is generated. —Michael Feldman

Worth Reading: Amazon’s Project Kuiper

18 April 2019

I was surprised when I learned last week that Amazon had filed an application for a 3,236-satellite constellation of low-earth orbit Internet service satellites — Project Kuiper. —Larry Press

Worth Reading: 802.11ax is not a switch

17 April 2019

In case you had any doubts, 802.11ax is NOT a switch.1 But the answer to why that is takes some explanation. —Tom Hollingsworth

Worth Reading: WPA3 Hack

17 April 2019

In a research paper, dubbed DragonBlood, published today, researchers detailed two types of design flaws in WPA3—first leads to downgrade attacks and second to side-channel leaks. —Swati Khandelwal