Skip to content

Worth Reading: ICT supply chain integrity

6 November 2019

The global tumult over the integrity of Huawei products and the U.S. administration’s campaign to persuade other countries to ban them exemplifies the scale of the emerging challenge. —Ariel Levite

Worth Reading: Network time security

6 November 2019

For many years, NTP has been offering solutions such as a Symmetric Key based method and the Autokey approach. However, both have serious disadvantages, for which reason they are rarely used to secure NTP connections. —Martin Langer

Worth Reading: Opening up 5G RAN development

5 November 2019

Behind the headline grabbing transition from 4G to 5G wireless networks there is a significant shift in the radio access network (RAN) from a centralised architecture to a virtualized/cloud (vRAN) architecture. —Simon Stanley

Worth Reading: Internet clouds are also unpredictable

5 November 2019

How does the largest cloud provider worldwide perform traffic engineering? What are the implications for the geo-distributed applications running in the cloud? —Marco Chiesa

Worth Reading: Red Flags

4 November 2019

One of the most widely cited metrics in the IT industry is for availability, expressed in the form of a number of nines: three nines for 99.9% availability (minutes of downtime per year), extending to six nines — 99.9999% — or even, very rarely, seven nines. —Andy Lawrence

Worth Reading: Installing an RPKI Validator

4 November 2019

The choice of which validator to use is yours, but please make sure you run at least two validators, not just for redundancy, but also because the validation states change to NOT FOUND for all routes when RPKI-enabled routers lose connection with the validators. —Tashi Phuntsho

Worth Reading: Using wireless backhaul

31 October 2019

This prompts me today to write about the issues involved with wireless backhaul. Done well it can greatly expand the reach of a network. Done poorly it can degrade performance or cause other problems. —Doug Dawson

Worth Reading: Planting tiny spy chips

31 October 2019

Now researchers have gone further, showing just how easily and cheaply a tiny, tough-to-detect spy chip could be planted in a company’s hardware supply chain. And one of them has demonstrated that it doesn’t even require a state-sponsored spy agency to pull it off—just a motivated hardware hacker with the right access and as little…

Worth Reading: Cheering on the optical inflection point

30 October 2019

While there are still good times ahead, there will come a day in the not-too-distant future where things will get more difficult, and the inevitable Moore’s Law wall will slow down the pace of change as it has done in compute engines for the past several years. —Timothy Prickett Morgan

Worth Reading: Incorrect working IPv6 NTP clients

30 October 2019

I was quite astonished how many different ICMP error codes I found. Note that since I am using IPv6-only, you’ll only see ICMPv6 messages rather than legacy IP ones. —Johannes Weber

Scroll To Top