Worth Reading: Most home routers are insecure

9 October 2018

Research conducted by the American Consumer Institute Center for Citizen Research indicates that the routers commonly found in homes are huge security vulnerabilities for consumers and their employers. The center’s analysis shows that of 186 sampled routers, 155 (83%) were found vulnerable to potential cyberattacks. @Dark Reading

Worth Reading: Packet level network telemetry

9 October 2018

Continuous monitoring is an essential part of detecting security issues, misconfiguration, equipment failure, as well as performing traffic engineering. With networks growing in size, complexity, and traffic volume, the need for continuous and precise monitoring is greater than ever before. —Oliver Michel @APNIC

Worth Reading: Who do you trust?

8 October 2018

Trust. It’s a simple word, but I think it’s at the heart of a recent social media brouhaha surrounding Apple’s recent revelations regarding “iTunes device trust scores.” —Richard Ford @Dark Reading

Worth Reading: WiFi Rebrands

8 October 2018

According to a Wednesday press release, the new approach will name the generations in a numerical sequence relative to new advancements in Wi-Fi technology. This will make it easier for vendors to denote which standards their devices support, for service providers to explain what their network offers, and for users to understand which products work…

Worth Reading: Outing your Outages

4 October 2018

How are you supposed to handle outages? What happens when everything around you goes upside down in an instant? How much communication is “too much”? Or “not enough”? And is all of this written down now instead of being figured out when the world is on fire? —Tom @Networking Nerd

Worth Reading: How Edge Computing will Impact the Enterprise

4 October 2018

Data published at the start of 2018 reveals a prediction that spending in the edge computing sector will grow by a compound annual growth rate of more than 30 percent through 2022. That means regardless of IT professionals’ focus and the companies they work for now, their jobs paths will inevitably feature more edge computing-related…

Worth Reading: WPA3 brings new authentication to wireless

3 October 2018

WPA3 is the latest version of Wi-Fi Protected Access, a suite of protocols and technologies that provide authentication and encryption for Wi-Fi networks. WPA3, which was first announced earlier this year, is now available for inclusion in products. It brings two deployment models, personal and enterprise, along with a related security set called Easy Connect.…

Worth Reading: Beyond Cookbook Mathematics

3 October 2018

Most of you who are reading this have likely taken a calculus course or two, and probably some basic linear algebra/matrix theory (especially if you’re in computer science). You’ve been exposed to limits, differentiation, continuity, determinants, and linear maps. —Rachel Traylor @The Math Citadel

Worth Reading: Microservices and Networking

2 October 2018

With the rise of so-called mode two applications, we see significantly different approaches to software architectures. Gartner defines mode two applications as exploratory, non-linear focused on agility and speed. In order to achieve this level of agility, the underlying architecture needs to be dramatically different. —Jeroen van Rotterdam @The New Stack

Worth Reading: Measuring the KSK Roll

2 October 2018

When viewed as a network infrastructure, looks can be very deceiving when looking at the DNS. It appears to be a simple collection of resolvers and servers. Clients pass their DNS name resolution queries to resolvers, who then identify and ask an appropriate authoritative name server to resolve the DNS name, and the result is…