Worth Reading: Converge your network with priority flow control

14 July 2017

Back in April, we talked about a feature called Explicit Congestion Notification (ECN). We discussed how ECN is an end-to-end method used to converge networks and save money. Priority flow control (PFC) is a different way to accomplish the same goal. Since PFC supports lossless or near lossless Ethernet, you can run applications, like RDMA,…

Worth Reading: Implementing security as a set of services

14 July 2017

In this post, I will focus on the implementation of the security services in terms of an ITIL-type framework. This is a blog post that took a long time to write — but some of the considerations here are essential if you are in the process of implementing security as a service, and especially if…

Worth Reading: New German law encourages censorship

13 July 2017

Social media companies and other hosts of third-party content will soon face potential fines of €50 million in Germany if they fail to promptly censor speech that may violate German law. Last week, the German parliament approved the NetzDG legislation, which goes into effect 1 October and will require social media sites and other hosts…

Worth Reading: Journey into the hybrid cloud

13 July 2017

“In the cloud” is more now than just a phrase that describes a feeling. Although the cloud began as a vision, over the past decade it has become an integral part of everyday business decisions, even being evaluated for an enterprise’s most critical high-value operations. Thanks to the public cloud, many startups find it quick…

Worth Reading: Cutting through the segment routing hype

12 July 2017

Segment Routing (SR) is a new traffic-engineering technology being developed by the IETF’s SPRING Working Group. Two forwarding plane encapsulations are being defined for SR: Multiprotocol Label Switching (MPLS) and IPv6 with a Segment Routing Extension Header. This article provides some historical context by describing the MPLS forwarding plane and control plane protocols, explains how…

Worth Reading: ISPs simplifying customer IPv6 addressing

12 July 2017

One of the main issues for an ISP planning to deliver IPv6 services is to decide how to address the customers. In a generic way, we could say that the first thing to do for any IPv6 deployment is the complete network addressing plan, even before obtaining your addressing space from your Regional Internet Registry…

Worth Reading: Take a pause on ransomware

11 July 2017

As these devastating global ransomware attacks illustrate, cybersecurity is not an issue that can be ignored. Any time a device or system is connected to the Internet, it is a potential target. What was once just another lucrative means of extorting money from Internet users, ransomware is emerging as a preferred tool for causing widespread…

Worth Reading: Internet of Terror

11 July 2017

Before we get to the question of encryption and key length, I would like to point out two things. An IoT device is nothing more than an embedded system with a TCP/IP stack. It is not a magical object that is somehow protected from attackers because of how cool, interesting, or colorful it is. Second,…

Worth Reading: Moving Computing to the Edge (Again)

10 July 2017

Our perception of what makes a data center is shifting all the time. We’ve already seen a move away from the large, monolithic bricks and mortar structures of old and seeing new manifestations in smaller form factors. … Project Volutus, with hundreds of Kilowatts of compute capacity in each location, makes it possible to run…

Worth Reading: 5G and Internet Technology

10 July 2017

5G is the latest generation of cellular network standards. There’s a tremendous amount of activity around it in the industry. But how does 5G relate to Internet technology? Are there 5G-related work items that the IETF should be working on, for instance? —APNIC