Worth Reading: The Traffic Shaping Loophole

19 July 2017

Since the disclosures of Edward Snowden in 2013, the U.S. government has assured its citizens that the National Security Agency (NSA) cannot spy on their electronic communications without the approval of a special surveillance judge. Domestic communications, the government says, are protected by statute and the Fourth Amendment. In practice, however, this is no longer…

Worth Reading: Ethernet Getting back on Moore’s Law

19 July 2017

It would be ideal if we lived in a universe where it was possible to increase the capacity of compute, storage, and networking at the same pace so as to keep all three elements expanding in balance. The irony is that over the past two decades, when the industry needed for networking to advance the…

Worth Reading: Secure the Grid

18 July 2017

Over the weekend, 140,000 people in Los Angeles spent 12 steamy hours without power when a local high-voltage transformer blew up. No one knows the cause of this particular disruption of service. But it’s the latest reminder of an ominous reality. —Free Fire

Worth Reading: AI Forgeries are in the Future

18 July 2017

Today, when people see a video of a politician taking a bribe, a soldier perpetrating a war crime, or a celebrity starring in a sex tape, viewers can safely assume that the depicted events have actually occurred, provided, of course, that the video is of a certain quality and not obviously edited. But that world…

Worth Reading: The Internet and Trust

17 July 2017

This narrative refers to the understanding that trust mitigates the basic uncertainties that the Internet architecture has imposed upon its operators since its inception. To this day, network engineers cannot generally be certain about the validity of the routing announcements that they receive from interconnected networks, and they have little insight into the legitimacy of…

Worth Reading: The Value of DRM Locks

17 July 2017

My co-authors and I at the University of Glasgow are investigating how restrictions on interoperability imposed by Digital Rights Management (DRM) systems might impact the market for goods. We are doing this as part of a larger project to better understand the economics of DRM and to figure out what changes would likely occur if…

Worth Reading: Converge your network with priority flow control

14 July 2017

Back in April, we talked about a feature called Explicit Congestion Notification (ECN). We discussed how ECN is an end-to-end method used to converge networks and save money. Priority flow control (PFC) is a different way to accomplish the same goal. Since PFC supports lossless or near lossless Ethernet, you can run applications, like RDMA,…

Worth Reading: Implementing security as a set of services

14 July 2017

In this post, I will focus on the implementation of the security services in terms of an ITIL-type framework. This is a blog post that took a long time to write — but some of the considerations here are essential if you are in the process of implementing security as a service, and especially if…

Worth Reading: New German law encourages censorship

13 July 2017

Social media companies and other hosts of third-party content will soon face potential fines of €50 million in Germany if they fail to promptly censor speech that may violate German law. Last week, the German parliament approved the NetzDG legislation, which goes into effect 1 October and will require social media sites and other hosts…

Worth Reading: Journey into the hybrid cloud

13 July 2017

“In the cloud” is more now than just a phrase that describes a feeling. Although the cloud began as a vision, over the past decade it has become an integral part of everyday business decisions, even being evaluated for an enterprise’s most critical high-value operations. Thanks to the public cloud, many startups find it quick…