Worth Reading: Optical Grooming and the Simplification of IP

4 December 2018

Fundamental to any new network model is the reality that IP is the service protocol of choice, and that any attempt to replace it is surely doomed to failure. Thus, a new network model has to focus on creating something different below the IP service layer. —Tom Nolle @CIMI

Worth Reading: New MRT-BGP Reader

3 December 2018

Route collectors — including the Route Views project of the University of Oregon and the Routing Information Service (RIS) of RIPE NCC — have been an invaluable source of information about the Internet inter-domain ecosystem over the last 20 years. —Lorenzo Cogotti @APNIC

Worth Reading: How accurate are the clocks?

3 December 2018

The clock is not just there to tell the time, although it can do that, nor is it there just to record the time when data files are created or modified, though it does that too. Knowing the time is important to many functions, and one of those is security. —Geoff Huston @CircleID

Deep dive into cloud transformation

29 November 2018

Early cloud conceptualization was based on “server consolidation” and “migration”. Enterprises were expected to move things to the cloud, either because those things were currently hosted on inefficient siloed servers or because overall cloud economies would be better than those in the data center. —Tom Nolle @CIMI

On the future of cloud computing

29 November 2018

Many folks in the IT industry consider containers, a technology used to isolate applications with their own environment, to be the future. However, serverless enthusiasts think that containers will gradually fade away. —Peter Sbarski @The New Stack

How to live in a post-Meltdown world

28 November 2018

Spectre and Meltdown create a risk landscape that has more questions than answers. This article addresses how these vulnerabilities were triaged when they were announced and the practical defenses that are available. @ACM

8 security buzzwords that are too good to be true

28 November 2018

It is in this spirit that I offer my thoughts to help organizations navigate eight specific buzzwords that I have repeatedly encountered in the security field… —Joshua Goldfarb @Dark Reading

How operators might influence SD-WAN

27 November 2018

SD-WAN has been evolving in a number of ways, but the most important of the lot is the way an enterprise buys it. —Tom Nolle @CIMI

5G slicing concepts

27 November 2018

Digitalization/softwarization of the network is one catalyst of network slicing. Technologies like Software-Defined Networking (SDN) and Network Function Virtualization (NFV), have already separated the data plane from the control plane. —Amit Cohen @ECI

How to get things done when you don’t feel like it

26 November 2018

Have you ever come into work, sat down at your computer to begin a project, opened your editor, and then just stared at the screen? This happens to me all the time, so I understand your struggle. —Kate Matsudaira @ACM